{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T21:20:03Z","timestamp":1776115203461,"version":"3.50.1"},"reference-count":173,"publisher":"Association for Computing Machinery (ACM)","issue":"7","license":[{"start":{"date-parts":[[2026,10,16]],"date-time":"2026-10-16T00:00:00Z","timestamp":1792108800000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2321649,2114911,2013671"],"award-info":[{"award-number":["2321649,2114911,2013671"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Hum.-Comput. Interact."],"published-print":{"date-parts":[[2025,10,18]]},"abstract":"<jats:p>Censorship and the distribution of false information, tools used to manipulate what users see and believe, are seemingly at opposite ends of the information access spectrum. Most previous work has examined them in isolation and within individual countries, leaving gaps in our understanding of how these information manipulation tools interact and reinforce each other across diverse societies. In this paper, we study perceptions about the interplay between censorship, false information, and influence operations, gathered through a mixed-methods study consisting of a survey (n = 384) and semi-structured interviews (n = 30) with participants who have experienced these phenomena across diverse countries in both the Global South and Global North, including Bangladesh, China, Cuba, Iran, Venezuela, and the United States. Our findings reveal perceptions of cooperation across various platforms between distinct entities working together to create information cocoons, within which censorship and false information become imperceptible to those affected. Building on study insights, we propose novel platform-level interventions to enhance transparency and help users navigate information manipulation. In addition, we introduce the concept of plausibly deniable social platforms, enabling censored users to provide credible, benign explanations for their activities, protecting them from surveillance and coercion.<\/jats:p>","DOI":"10.1145\/3757572","type":"journal-article","created":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T17:32:00Z","timestamp":1760635920000},"page":"1-35","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Cooperative Dynamics of Censorship, Misinformation, and Influence Operations: Insights from the Global South and U.S."],"prefix":"10.1145","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4236-0349","authenticated-orcid":false,"given":"Zaid","family":"Hakami","sequence":"first","affiliation":[{"name":"Florida International University, Miami, FL, USA and Jazan University, Jazan, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-6787-0518","authenticated-orcid":false,"given":"Yuzhou","family":"Feng","sequence":"additional","affiliation":[{"name":"Florida International University, Miami, FL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4950-9751","authenticated-orcid":false,"given":"Bogdan","family":"Carbunar","sequence":"additional","affiliation":[{"name":"Florida International University, Miami, FL, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,10,16]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"[n. d.]. ChatGPT. https:\/\/chatgpt.com\/."},{"key":"e_1_2_1_2_1","unstructured":"[n. d.]. Children's Online Privacy Protection Rule ('COPPA'). Federal Trade Commission https:\/\/www.ftc.gov\/legal-library\/browse\/rules\/childrens-online-privacy-protection-rule-coppa."},{"key":"e_1_2_1_3_1","unstructured":"[n. d.]. Conditions applicable to child's consent in relation to information society services. Art. 8 GDPR https:\/\/gdpr-info.eu\/art-8-gdpr\/."},{"key":"e_1_2_1_4_1","unstructured":"[n. d.]. EU Digital Services Act. https:\/\/commission.europa.eu\/strategy-and-policy\/priorities-2019-2024\/europe-fit-digital-age\/digital-services-act_en."},{"key":"e_1_2_1_5_1","unstructured":"[n. d.]. ExpressVPN. https:\/\/www.expressvpn.com\/."},{"key":"e_1_2_1_6_1","unstructured":"[n. d.]. Freedom on the Net. https:\/\/freedomhouse.org\/report\/freedom-net."},{"key":"e_1_2_1_7_1","unstructured":"[n. d.]. Government Requests for User Data | Transparency Center. https:\/\/transparency.meta.com\/reports\/government-data-requests\/country\/us\/."},{"key":"e_1_2_1_8_1","unstructured":"[n. d.]. Meta Content Restrictions Based on Local Law. https:\/\/transparency.meta.com\/reports\/content-restrictions\/."},{"key":"e_1_2_1_9_1","unstructured":"[n. d.]. NordVPN. https:\/\/www.nordvpn.com."},{"key":"e_1_2_1_10_1","unstructured":"[n. d.]. OpenArt. https:\/\/openart.ai\/home."},{"key":"e_1_2_1_11_1","volume-title":"d.]. Post-9\/11 U.S. Mass Surveillance","unstructured":"[n. d.]. Post-9\/11 U.S. Mass Surveillance. Watson Institute for International and Public Affairs, https:\/\/watson.brown.edu\/costsofwar\/costs\/social\/rights\/surveillance."},{"key":"e_1_2_1_12_1","unstructured":"[n. d.]. Report a Post List or Direct Message. https:\/\/help.x.com\/en\/safety-and-security\/report-a-post."},{"key":"e_1_2_1_13_1","unstructured":"[n. d.]. Report a post or profile on Instagram. https:\/\/help.instagram.com\/192435014247952."},{"key":"e_1_2_1_14_1","unstructured":"[n. d.]. SocialAI. https:\/\/socialai.co\/."},{"key":"e_1_2_1_15_1","unstructured":"[n. d.]. TC 7-100.2 Opposing Force Tactics. Army Knowledge Online https:\/\/odin.tradoc.army.mil\/TC\/3e4ccbecf9ab4eba2ca242495cd005aa."},{"key":"e_1_2_1_16_1","unstructured":"[n. d.]. The Brutal Militia Trained to Kill for Iran's Islamic Regime. Time Magazine https:\/\/time.com\/6238623\/iran-basij-militia-meaning-mahsa-amini\/."},{"key":"e_1_2_1_17_1","unstructured":"[n. d.]. Tor Project. https:\/\/www.torproject.org\/."},{"key":"e_1_2_1_18_1","unstructured":"2011. Alleged Hacker Charged with Stealing Over Four Million Documents From MIT Network. US DOJ https:\/\/www.justice.gov\/archive\/usao\/ma\/news\/2011\/July\/SwartzAaronPR.html."},{"key":"e_1_2_1_19_1","unstructured":"2016. How media smuggling took hold in North Korea. PBS https:\/\/www.pbs.org\/newshour\/world\/media-smuggling-north-korea."},{"key":"e_1_2_1_20_1","unstructured":"2020. Turkey Issued New Rules for Social Media. That May Mean That Media Censorship Wasn't Working. Washington Post https:\/\/carnegieendowment.org\/posts\/2020\/07\/turkey-issued-new-rules-for-social-media-that-may-mean-that-media-censorship-wasnt-working?lang=en."},{"key":"e_1_2_1_21_1","unstructured":"2022. Iran's government accesses the social media accounts of those it detains. Tech companies appear ill-equipped to stop it. CNN https:\/\/www.cnn.com\/2022\/12\/19\/business\/iran-social-media-accounts-intl-cmd."},{"key":"e_1_2_1_22_1","volume-title":"Turkey's strict new press and social media 'disinformation' law","year":"2022","unstructured":"2022. Turkey's strict new press and social media 'disinformation' law. Reuters, https:\/\/www.reuters.com\/world\/middle-east\/turkeys-strict-new-press-social-media-disinformation-law-2022-10-14\/."},{"key":"e_1_2_1_23_1","volume-title":"Mute, Restrict, Report - What's the difference? https:\/\/about.instagram.com\/blog\/tips-and-tricks\/restrict-mute-block-report-guide. [Online","year":"2025","unstructured":"2024. Block, Mute, Restrict, Report - What's the difference? https:\/\/about.instagram.com\/blog\/tips-and-tricks\/restrict-mute-block-report-guide. [Online; accessed April 3, 2025]."},{"key":"e_1_2_1_24_1","volume-title":"Censorship and Deception: How Social Media Controls Fuel Misinformation in Turkey","year":"2024","unstructured":"2024. Censorship and Deception: How Social Media Controls Fuel Misinformation in Turkey. Democratic Erosion Consortium, https:\/\/democratic-erosion.org\/2024\/11\/04\/censorship-and-deception-how-social-media-controls-fuel-misinformation-in-turkey\/."},{"key":"e_1_2_1_25_1","unstructured":"2024. Cuban government faces backlash amid massive blackout. Le Monde https:\/\/www.lemonde.fr\/en\/international\/article\/2024\/10\/22\/cuban-government-faces-backlash-amid-massive-blackout_6730096_4.html."},{"key":"e_1_2_1_26_1","unstructured":"2024. Digital media in Venezuela collaborate to overcome press restrictions and disinformation ahead of presidential elections. LatAm Journalism Review https:\/\/latamjournalismreview.org\/articles\/digital-media-in-venezuela-collaborate-to-overcome-press-restrictions-and-disinformation-ahead-of-presidential-elections."},{"key":"e_1_2_1_27_1","unstructured":"2024. Freedom on the Net: China. https:\/\/freedomhouse.org\/country\/china\/freedom-net\/2024."},{"key":"e_1_2_1_28_1","unstructured":"2024. Freedom on the Net: Cuba. https:\/\/freedomhouse.org\/country\/cuba\/freedom-net\/2024."},{"key":"e_1_2_1_29_1","unstructured":"2024. Freedom on the Net: India. https:\/\/freedomhouse.org\/country\/india\/freedom-net\/2024."},{"key":"e_1_2_1_30_1","unstructured":"2024. India's general election is being impacted by deepfakes. Le Monde https:\/\/www.lemonde.fr\/en\/pixels\/article\/2024\/05\/21\/india-s-general-election-is-being-impacted-by-deepfakes_6672168_13.html."},{"key":"e_1_2_1_31_1","unstructured":"2024. Prosecutors in Iran target a newspaper over its cartoon mocking internet restrictions. AP News https:\/\/apnews.com\/article\/iran-newspaper-charged-job-cartoon-fef9d7b705e1595744ed0dfd476439a2."},{"key":"e_1_2_1_32_1","volume-title":"X takes down accounts that media say are linked to India farmers protests","year":"2024","unstructured":"2024. X takes down accounts that media say are linked to India farmers protests. Reuters, https:\/\/www.reuters.com\/world\/india\/x-says-indias-demand-block-accounts-curtails-freedom-expression-2024-02-22\/."},{"key":"e_1_2_1_33_1","unstructured":"2025. Apple Bows to Pressure: UK Government Forces End-to-End Encryption Removal for iCloud Service. Cryptomator https:\/\/cryptomator.org\/blog\/2025\/02\/25\/apple-bows-to-pressure-by-uk-government\/."},{"key":"e_1_2_1_34_1","unstructured":"2025. Mute Someone on X. https:\/\/help.hootsuite.com\/hc\/en-us\/articles\/1260804252310-Mute-someone-on-X."},{"key":"e_1_2_1_35_1","unstructured":"2025. Phone inspections when crossing the U.S. border: What you need to know about your rights and security. Mashable https:\/\/mashable.com\/article\/protecting-phone-data-when-entering-the-united-states."},{"key":"e_1_2_1_36_1","unstructured":"Last accessed on March 2025. How to See Sensitive Content on Twitter: A Step-by-Step Guide. AVG https:\/\/www.avg.com\/en\/signal\/how-to-view-sensitive-content-twitter."},{"key":"e_1_2_1_37_1","unstructured":"Last accessed on March 2025. Why you may see a warning before you can view a photo or video on Facebook. https:\/\/www.facebook.com\/help\/814083248683500."},{"key":"e_1_2_1_38_1","unstructured":"Sinem Adar. 2024. Turkey's Electoral Map Explained: Actors Dynamics and Future Prospects. Carnegie Endowment for International Peace https:\/\/carnegieendowment.org\/research\/2024\/06\/turkeys-electoral-map-explained-actors-dynamics-and-future-prospects?lang=en."},{"key":"e_1_2_1_39_1","volume-title":"Proc. ACM Hum.-Comput. Interact. 4, CSCW3 (jan","author":"Akbar Syeda Zainab","year":"2021","unstructured":"Syeda Zainab Akbar, Anmol Panda, Divyanshu Kukreti, Azhagu Meena, and Joyojeet Pal. 2021. Misinformation as a Window into Prejudice: COVID-19 and the Information Environment in India. Proc. ACM Hum.-Comput. Interact. 4, CSCW3 (jan 2021)."},{"key":"e_1_2_1_40_1","volume-title":"Cyber Surveillance and Digital Authoritarianism in Iran. Global Policy. March","author":"Akbarzadeh Shahram","year":"2024","unstructured":"Shahram Akbarzadeh, Amin Naeni, Ihsan Yilmaz, and Galib Bashirov. 2024. Cyber Surveillance and Digital Authoritarianism in Iran. Global Policy. March (2024)."},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3502040"},{"key":"e_1_2_1_42_1","first-page":"2617","volume-title":"DeResistor: Toward Detection-Resistant Probing for Evasion of Internet Censorship. In 32nd USENIX Security Symposium (USENIX Security 23)","author":"Amich Abderrahmen","year":"2023","unstructured":"Abderrahmen Amich, Birhanu Eshete, Vinod Yegneswaran, and Nguyen Phong Hoang. 2023. DeResistor: Toward Detection-Resistant Probing for Evasion of Internet Censorship. In 32nd USENIX Security Symposium (USENIX Security 23). 2617-2633."},{"key":"e_1_2_1_43_1","volume-title":"Dimming the Internet: Detecting throttling as a mechanism of censorship in Iran. arXiv preprint arXiv:1306.4361","author":"Anderson Collin","year":"2013","unstructured":"Collin Anderson. 2013. Dimming the Internet: Detecting throttling as a mechanism of censorship in Iran. arXiv preprint arXiv:1306.4361 (2013)."},{"key":"e_1_2_1_44_1","volume-title":"Internet Censorship in Iran: A First Look. In 3rd USENIX Workshop on Free and Open Communications on the Internet (FOCI 13)","author":"Aryan Simurgh","year":"2013","unstructured":"Simurgh Aryan, Homa Aryan, and J Alex Halderman. 2013. Internet Censorship in Iran: A First Look. In 3rd USENIX Workshop on Free and Open Communications on the Internet (FOCI 13)."},{"key":"e_1_2_1_45_1","unstructured":"Warwick Ashford. 2019. Top VPNs Secretly Owned by Chinese Firms. ComputerWeekly https:\/\/www.computerweekly.com\/news\/252466203\/Top-VPNs-secretly-owned-by-Chinese-firms."},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1037\/xge0000729"},{"key":"e_1_2_1_47_1","volume-title":"pressure, and agenda: The discursive fight on Twitter in Turkey. Media and Communication","author":"Baloglu Ugur","year":"2021","unstructured":"Ugur Baloglu. 2021. Trolls, pressure, and agenda: The discursive fight on Twitter in Turkey. Media and Communication (2021)."},{"key":"e_1_2_1_48_1","volume-title":"Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (CHI).","author":"Baumer Eric PS","year":"2015","unstructured":"Eric PS Baumer, Katie Senger, Jed R Brubaker, and Paul Dourish. 2015. When the Implication is Not to Design (Technology). In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (CHI)."},{"key":"e_1_2_1_49_1","volume-title":"Proceedings of KnOD@ WWW.","author":"Beltr\u00e1n Javier","year":"2021","unstructured":"Javier Beltr\u00e1n, Rub\u00e9n M\u00edguez, and Irene Larraz. 2021. ClaimHunter: An Unattended Tool for Automated Claim Detection on Twitter.. In Proceedings of KnOD@ WWW."},{"key":"e_1_2_1_50_1","volume-title":"Snowball Sampling: Problems and Techniques of Chain Referral Sampling. Sociological methods & research 10, 2","author":"Biernacki Patrick","year":"1981","unstructured":"Patrick Biernacki and Dan Waldorf. 1981. Snowball Sampling: Problems and Techniques of Chain Referral Sampling. Sociological methods & research 10, 2 (1981), 141-163."},{"key":"e_1_2_1_51_1","volume-title":"Proceedings of the 2017 ACM conference on computer supported cooperative work and social computing. 1591-1604","author":"Morshed Mehrab Bin","year":"2017","unstructured":"Mehrab Bin Morshed, Michaelanne Dye, Syed Ishtiaque Ahmed, and Neha Kumar. 2017. When the Internet Goes Down in Bangladesh. In Proceedings of the 2017 ACM conference on computer supported cooperative work and social computing. 1591-1604."},{"key":"e_1_2_1_52_1","volume-title":"10th USENIX Workshop on Free and Open Communications on the Internet (FOCI 20)","author":"Bock Kevin","year":"2020","unstructured":"Kevin Bock, Yair Fax, Kyle Reese, Jasraj Singh, and Dave Levin. 2020. Detecting and evading Censorship-in-Depth: A case study of Iran's protocol whitelister. In 10th USENIX Workshop on Free and Open Communications on the Internet (FOCI 20)."},{"key":"e_1_2_1_53_1","volume-title":"Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. 2199-2214","author":"Bock Kevin","year":"2019","unstructured":"Kevin Bock, George Hughey, Xiao Qiang, and Dave Levin. 2019. Geneva: Evolving censorship evasion strategies. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. 2199-2214."},{"key":"e_1_2_1_54_1","volume-title":"Proceedings of the ACM SIGCOMM 2021 Workshop on Free and Open Communications on the Internet. 1-7.","author":"Bock Kevin","year":"2021","unstructured":"Kevin Bock, Gabriel Naval, Kyle Reese, and Dave Levin. 2021. Even censors have a backup: Examining china's double https censorship middleboxes. In Proceedings of the ACM SIGCOMM 2021 Workshop on Free and Open Communications on the Internet. 1-7."},{"key":"e_1_2_1_55_1","unstructured":"Lauren Brown. 2023. Springer Nature hails growth in annual progress report after weathering 'volatile year'. The Bookseller https:\/\/www.thebookseller.com\/news\/springer-nature-hails-growth-in-annual-progress-report-after-weathering-volatile-year."},{"key":"e_1_2_1_56_1","volume-title":"Proceedings of the CHI conference on human factors in computing systems. 1-12","author":"Chandra Priyank","year":"2019","unstructured":"Priyank Chandra and Joyojeet Pal. 2019. Rumors and collective sensemaking: Managing ambiguity in an informal marketplace. In Proceedings of the CHI conference on human factors in computing systems. 1-12."},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.2023301118"},{"key":"e_1_2_1_58_1","unstructured":"Harindrini Corea and Nazia Erum. 2024. What is happening at the quota-reform protests in Bangladesh? Amnesty International https:\/\/www.amnesty.org\/en\/latest\/news\/2024\/07\/what-is-happening-at-the-quota-reform-protests-in-bangladesh\/."},{"key":"e_1_2_1_59_1","first-page":"1","volume-title":"Proceedings of the ACM on human-computer interaction 6, CSCW2","author":"Cui Yichao","year":"2022","unstructured":"Yichao Cui, Naomi Yamashita, and Yi-Chieh Lee. 2022. ''We gather together we collaborate together'': Exploring the challenges and strategies of Chinese lesbian and bisexual women's online communities on Weibo. Proceedings of the ACM on human-computer interaction 6, CSCW2 (2022), 1-31."},{"key":"e_1_2_1_60_1","first-page":"120","volume-title":"Proceedings of the International AAAI Conference on Web and Social Media","volume":"7","author":"Das Sauvik","year":"2013","unstructured":"Sauvik Das and Adam Kramer. 2013. Self-censorship on Facebook. In Proceedings of the International AAAI Conference on Web and Social Media, Vol. 7. 120-127."},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3675760"},{"key":"e_1_2_1_62_1","volume-title":"Proceedings of the 2019 CHI conference on human factors in computing systems. 1-12","author":"de Castro Leal D\u00e9bora","year":"2019","unstructured":"D\u00e9bora de Castro Leal, Max Kr\u00fcger, Kaoru Misaki, David Randall, and Volker Wulf. 2019. Guerilla Warfare and the Use of New (and some old) Technology: Lessons from FARC's Armed Struggle in Colombia. In Proceedings of the 2019 CHI conference on human factors in computing systems. 1-12."},{"key":"e_1_2_1_63_1","volume-title":"Access denied: The practice and policy of global internet filtering","author":"Deibert Ronald","unstructured":"Ronald Deibert, John Palfrey, Rafal Rohozinski, and Jonathan Zittrain. 2008. Access denied: The practice and policy of global internet filtering. The MIT Press."},{"key":"e_1_2_1_64_1","volume-title":"Black Code: Inside the Battle for Cyberspace. Signal.","author":"Deibert Ronald J","year":"2013","unstructured":"Ronald J Deibert. 2013. Black Code: Inside the Battle for Cyberspace. Signal."},{"key":"e_1_2_1_65_1","volume-title":"The Global War for Internet Governance","author":"DeNardis Laura","unstructured":"Laura DeNardis. 2014. The Global War for Internet Governance. Yale University Press."},{"key":"e_1_2_1_66_1","volume-title":"Proceedings of the 19th ACM conference on computer-supported cooperative work & social computing. 1295-1309","author":"Dye Michaelanne","year":"2016","unstructured":"Michaelanne Dye, Annie Ant\u00f3n, and Amy S Bruckman. 2016. Early adopters of the Internet and social media in Cuba. In Proceedings of the 19th ACM conference on computer-supported cooperative work & social computing. 1295-1309."},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1111\/bjop.12383"},{"key":"e_1_2_1_68_1","unstructured":"Facebook. [n. d.]. Taking Action Against People Who Repeatedly Share Misinformation. https:\/\/about.fb.com\/news\/2021\/05\/taking-action-against-people-who-repeatedly-share-misinformation\/."},{"key":"e_1_2_1_69_1","first-page":"2017","article-title":"Threat Report","year":"2021","unstructured":"Facebook. 2021. Threat Report: The State of Influence Operations 2017-2020. https:\/\/tinyurl.com\/bdcx5m4n.","journal-title":"The State of Influence Operations"},{"key":"e_1_2_1_70_1","volume-title":"Proceedings of the Fifteenth ACM Conference on Data and Application Security and Privacy (CODASPY).","author":"Feng Yuzhou","year":"2025","unstructured":"Yuzhou Feng, Sandeep Kiran Pinjala, Radu Sion, and Bogdan Carbunar. 2025. Trilobyte: Plausibly Deniable Communications Through Single Player Games: Data\/Toolset Paper. In Proceedings of the Fifteenth ACM Conference on Data and Application Security and Privacy (CODASPY)."},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.5555\/3620237.3620383"},{"key":"e_1_2_1_72_1","doi-asserted-by":"crossref","first-page":"208","DOI":"10.1089\/cyber.2014.0443","article-title":"Was it something I said?''''No, it was something you posted!'' A study of the spiral of silence theory in social media contexts","volume":"18","author":"Gearhart Sherice","year":"2015","unstructured":"Sherice Gearhart and Weiwu Zhang. 2015. ''Was it something I said?''''No, it was something you posted!'' A study of the spiral of silence theory in social media contexts. Cyberpsychology, Behavior, and Social Networking 18, 4 (2015), 208-213.","journal-title":"Cyberpsychology, Behavior, and Social Networking"},{"key":"e_1_2_1_73_1","volume-title":"2017 IEEE European symposium on security and privacy (EuroS&P). IEEE, 417-432","author":"Gebhart Genevieve","year":"2017","unstructured":"Genevieve Gebhart and Tadayoshi Kohno. 2017. Internet censorship in Thailand: User practices and potential threats. In 2017 IEEE European symposium on security and privacy (EuroS&P). IEEE, 417-432."},{"key":"e_1_2_1_74_1","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1093\/psquar\/qqad037","article-title":"Keeping your mouth shut: Spiraling self-censorship in the United States","volume":"138","author":"Gibson James L","year":"2023","unstructured":"James L Gibson and Joseph L Sutherland. 2023. Keeping your mouth shut: Spiraling self-censorship in the United States. Political Science Quarterly 138, 3 (2023), 361-376.","journal-title":"Political Science Quarterly"},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/2700339"},{"key":"e_1_2_1_76_1","first-page":"1","volume-title":"Proceedings of the ACM on Human-Computer Interaction 6, CSCW2","author":"Grinko Margarita","year":"2022","unstructured":"Margarita Grinko, Sarvin Qalandar, Dave Randall, and Volker Wulf. 2022. Nationalizing the internet to break a protest movement: Internet shutdown and counter-appropriation in Iran of late 2019. Proceedings of the ACM on Human-Computer Interaction 6, CSCW2 (2022), 1-21."},{"key":"e_1_2_1_77_1","doi-asserted-by":"crossref","unstructured":"Greg Guest Kathleen M MacQueen and Emily E Namey. 2011. Applied Thematic Analysis. sage publications.","DOI":"10.4135\/9781483384436"},{"key":"e_1_2_1_78_1","doi-asserted-by":"crossref","DOI":"10.4135\/9781483384436","volume-title":"Introduction to Applied Thematic Analysis. Applied thematic analysis 3, 20","author":"Guest Gregory","year":"2012","unstructured":"Gregory Guest, Kathleen M MacQueen, and Emily E Namey. 2012. Introduction to Applied Thematic Analysis. Applied thematic analysis 3, 20 (2012), 1-21."},{"key":"e_1_2_1_79_1","volume-title":"The money behind academic publishing. Tidsskrift for Den norske legeforening","author":"Hagve Martin","year":"2020","unstructured":"Martin Hagve. 2020. The money behind academic publishing. Tidsskrift for Den norske legeforening (2020)."},{"key":"e_1_2_1_80_1","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1177\/186810261504400205","article-title":"Manufacturing consent in cyberspace: China's ''fifty-cent army","volume":"44","author":"Han Rongbin","year":"2015","unstructured":"Rongbin Han. 2015. Manufacturing consent in cyberspace: China's ''fifty-cent army''. Journal of Current Chinese Affairs 44, 2 (2015), 105-134.","journal-title":"Journal of Current Chinese Affairs"},{"key":"e_1_2_1_81_1","first-page":"1","volume-title":"Proceedings of the ACM on Human-Computer Interaction 4, CSCW2","author":"Haque Md Mahfuzul","year":"2020","unstructured":"Md Mahfuzul Haque, Mohammad Yousuf, Ahmed Shatil Alam, Pratyasha Saha, Syed Ishtiaque Ahmed, and Naeemul Hassan. 2020. Combating misinformation in Bangladesh: Roles and responsibilities as perceived by journalists, fact-checkers, and users. Proceedings of the ACM on Human-Computer Interaction 4, CSCW2 (2020), 1-32."},{"key":"e_1_2_1_82_1","first-page":"465","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Harrity Michael","year":"2022","unstructured":"Michael Harrity, Kevin Bock, Frederick Sell, and Dave Levin. 2022. GET\/out: Automated discovery of Application-Layer censorship evasion strategies. In 31st USENIX Security Symposium (USENIX Security 22). 465-483."},{"key":"e_1_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098131"},{"key":"e_1_2_1_84_1","first-page":"3381","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Hoang Nguyen Phong","year":"2021","unstructured":"Nguyen Phong Hoang, Arian Akhavan Niaki, Jakub Dalek, Jeffrey Knockel, Pellaeon Lin, Bill Marczak, Masashi Crete-Nishihata, Phillipa Gill, and Michalis Polychronakis. 2021. How Great is the Great Firewall? Measuring China's DNS Censorship. In 30th USENIX Security Symposium (USENIX Security 21). 3381-3398."},{"key":"e_1_2_1_85_1","doi-asserted-by":"crossref","unstructured":"Bert Hoffmann. 2011. Civil society 2.0?: How the Internet changes state-society relations in authoritarian regimes: The case of Cuba. (2011).","DOI":"10.2139\/ssrn.1763846"},{"key":"e_1_2_1_86_1","volume-title":"Proceedings of the 2016 internet measurement conference. 349-364","author":"Ikram Muhammad","year":"2016","unstructured":"Muhammad Ikram, Narseo Vallina-Rodriguez, Suranga Seneviratne, Mohamed Ali Kaafar, and Vern Paxson. 2016. An Analysis of the Privacy and Security Risks of Android VPN Permission-Enabled Apps. In Proceedings of the 2016 internet measurement conference. 349-364."},{"key":"e_1_2_1_87_1","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1080\/09584935.2020.1855113","article-title":"Students, movements, and the threat to authoritarianism in Bangladesh","volume":"29","author":"Jackman David","year":"2021","unstructured":"David Jackman. 2021. Students, movements, and the threat to authoritarianism in Bangladesh. Contemporary South Asia 29, 2 (2021), 181-197.","journal-title":"Contemporary South Asia"},{"key":"e_1_2_1_88_1","volume-title":"ClaimRank: Detecting check-worthy claims in Arabic and English. arXiv preprint arXiv:1804.07587","author":"Jaradat Israa","year":"2018","unstructured":"Israa Jaradat, Pepa Gencheva, Alberto Barr\u00f3n-Cede\u00f1o, Llu\u00eds M\u00e0rquez, and Preslav Nakov. 2018. ClaimRank: Detecting check-worthy claims in Arabic and English. arXiv preprint arXiv:1804.07587 (2018)."},{"key":"e_1_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491055"},{"key":"e_1_2_1_90_1","first-page":"1163","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Kaiser Ben","year":"2021","unstructured":"Ben Kaiser, Jerry Wei, Eli Lucherini, Kevin Lee, J Nathan Matias, and Jonathan Mayer. 2021. Adapting security warnings to counter online disinformation. In 30th USENIX Security Symposium (USENIX Security 21). 1163-1180."},{"key":"e_1_2_1_91_1","volume-title":"Political astroturfing on twitter: How to coordinate a disinformation campaign. Political communication 37, 2","author":"Keller Franziska B","year":"2020","unstructured":"Franziska B Keller, David Schoch, Sebastian Stier, and JungHwan Yang. 2020. Political astroturfing on twitter: How to coordinate a disinformation campaign. Political communication 37, 2 (2020), 256-280."},{"key":"e_1_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1111\/1467-7717.00218"},{"key":"e_1_2_1_93_1","first-page":"443","volume-title":"Proceedings of the Internet Measurement Conference","author":"Khan Mohammad Taha","year":"2018","unstructured":"Mohammad Taha Khan, Joe DeBlasio, Geoffrey M Voelker, Alex C Snoeren, Chris Kanich, and Narseo Vallina-Rodriguez. 2018. An Empirical Analysis of the Commercial VPN Ecosystem. In Proceedings of the Internet Measurement Conference 2018. 443-456."},{"key":"e_1_2_1_94_1","first-page":"37","volume-title":"Proceedings of the Symposium of Privacy Enhancing Technologies 2016","author":"Khattak Sheharbano","year":"2016","unstructured":"Sheharbano Khattak, Mohammad Tariq Elahi, Laurent Simon, Colleen M Swanson, Steven J Murdoch, and Ian Goldberg. 2016. SOK: Making sense of censorship resistance systems. Proceedings of the Symposium of Privacy Enhancing Technologies 2016, 4 (2016), 37-61."},{"key":"e_1_2_1_95_1","volume-title":"How censorship in China allows government criticism but silences collective expression. American political science Review 107, 2","author":"King Gary","year":"2013","unstructured":"Gary King, Jennifer Pan, and Margaret E Roberts. 2013. How censorship in China allows government criticism but silences collective expression. American political science Review 107, 2 (2013), 326-343."},{"key":"e_1_2_1_96_1","volume-title":"How the Chinese government fabricates social media posts for strategic distraction, not engaged argument. American political science review 111, 3","author":"King Gary","year":"2017","unstructured":"Gary King, Jennifer Pan, and Margaret E Roberts. 2017. How the Chinese government fabricates social media posts for strategic distraction, not engaged argument. American political science review 111, 3 (2017), 484-501."},{"key":"e_1_2_1_97_1","first-page":"1","volume-title":"Proceedings of the ACM on Human-computer Interaction 4, CSCW2","author":"Kirchner Jan","year":"2020","unstructured":"Jan Kirchner and Christian Reuter. 2020. Countering fake news: A comparison of possible solutions regarding user acceptance and effectiveness. Proceedings of the ACM on Human-computer Interaction 4, CSCW2 (2020), 1-27."},{"key":"e_1_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.1145\/3473604.3474560"},{"key":"e_1_2_1_99_1","volume-title":"7th USENIX Workshop on Free and Open Communications on the Internet (FOCI 17)","author":"Knockel Jeffrey","year":"2017","unstructured":"Jeffrey Knockel, Lotus Ruan, and Masashi Crete-Nishihata. 2017. Measuring Decentralization of Chinese Keyword Censorship via Mobile Games. In 7th USENIX Workshop on Free and Open Communications on the Internet (FOCI 17)."},{"key":"e_1_2_1_100_1","volume-title":"Mumbai","author":"Kou Yubo","year":"2017","unstructured":"Yubo Kou, Bryan Semaan, and Bonnie Nardi. 2017. A Confucian look at Internet censorship in China. In Human-Computer Interaction-INTERACT 2017: 16th IFIP TC 13 International Conference, Mumbai, India, September 25-29, 2017, Proceedings, Part I 16. 377-398."},{"key":"e_1_2_1_101_1","first-page":"1","volume-title":"Proceedings of the ACM on Human-Computer Interaction 5, CSCW2","author":"Li Zi","year":"2021","unstructured":"Zi Li and Bonnie Nardi. 2021. ''There Should Be More Than One Voice in A Healthy Society'': Infrastructural Violence and Totalitarian Computing in China. Proceedings of the ACM on Human-Computer Interaction 5, CSCW2 (2021), 1-25."},{"key":"e_1_2_1_102_1","first-page":"1","volume-title":"Proceedings of the ACM on Human-Computer Interaction 6, CSCW2","author":"Liu Baoxi","year":"2022","unstructured":"Baoxi Liu, Peng Zhang, Yubo Shu, Zhengqing Guan, Tun Lu, Hansu Gu, and Ning Gu. 2022. Building a Personalized Model for Social Media Textual Content Censorship. Proceedings of the ACM on Human-Computer Interaction 6, CSCW2 (2022), 1-31."},{"key":"e_1_2_1_103_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376612"},{"key":"e_1_2_1_104_1","volume-title":"Proceedings of the ACM Web Conference.","author":"Luceri Luca","year":"2024","unstructured":"Luca Luceri, Valeria Pant\u00e8, Keith Burghardt, and Emilio Ferrara. 2024. Unmasking the Web of Deceit: Uncovering Coordinated Activity to Expose Information Operations on Twitter. In Proceedings of the ACM Web Conference."},{"key":"e_1_2_1_105_1","unstructured":"Kim Lyons. 2021. Police in India raid Twitter offices in probe of tweets with 'manipulated media' label. The Verge https:\/\/tinyurl.com\/2awbk63z."},{"key":"e_1_2_1_106_1","unstructured":"Neil MacFarquhar. 2018. Inside the Russian Troll Factory: Zombies and a Breakneck Pace. New York Times https:\/\/www.nytimes.com\/2018\/02\/18\/world\/europe\/russia-troll-factory.html."},{"key":"e_1_2_1_107_1","doi-asserted-by":"publisher","DOI":"10.1145\/1460563.1460585"},{"key":"e_1_2_1_108_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518808"},{"key":"e_1_2_1_109_1","first-page":"1","volume-title":"Proceedings of the ACM on Human-Computer Interaction 4, CSCW2","author":"McClure Haughey Melinda","year":"2020","unstructured":"Melinda McClure Haughey, Meena Devii Muralikumar, Cameron A Wood, and Kate Starbird. 2020. On the misinformation beat: Understanding the work of investigative journalists reporting on problematic information online. Proceedings of the ACM on Human-Computer Interaction 4, CSCW2 (2020), 1-22."},{"key":"e_1_2_1_110_1","unstructured":"Jack McCordick. 2023. Twitter's Elon Musk Defends Decision To Limit Tweets in Turkey During Tight Presidential Election. Vanity Fair https:\/\/www.vanityfair.com\/news\/2023\/05\/twitter-musk-censors-turkey-election-erdogan."},{"key":"e_1_2_1_111_1","first-page":"218","volume-title":"Proceedings of the Internet Measurement Conference","author":"McDonald Allison","year":"2018","unstructured":"Allison McDonald, Matthew Bernhard, Luke Valenta, Benjamin VanderSloot, Will Scott, Nick Sullivan, J Alex Halderman, and Roya Ensafi. 2018. 403 forbidden: a global view of CDN geoblocking. In Proceedings of the Internet Measurement Conference 2018. 218-230."},{"key":"e_1_2_1_112_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359174"},{"key":"e_1_2_1_113_1","volume-title":"China's water warriors: Citizen action and policy change","author":"Mertha Andrew C","unstructured":"Andrew C Mertha. 2017. China's water warriors: Citizen action and policy change. Cornell University Press."},{"key":"e_1_2_1_114_1","volume-title":"Political Communication in China","author":"Mou Yi","unstructured":"Yi Mou, David Atkin, and Hanlong Fu. 2013. Predicting political discussion in a censored virtual environment. In Political Communication in China. Routledge, 81-96."},{"key":"e_1_2_1_115_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444818773059"},{"key":"e_1_2_1_116_1","volume-title":"Automated fact-checking for assisting human fact-checkers. arXiv preprint arXiv:2103.07769","author":"Nakov Preslav","year":"2021","unstructured":"Preslav Nakov, David Corney, Maram Hasanain, Firoj Alam, Tamer Elsayed, Alberto Barr\u00f3n-Cede\u00f1o, Paolo Papotti, Shaden Shaar, and Giovanni Da San Martino. 2021. Automated fact-checking for assisting human fact-checkers. arXiv preprint arXiv:2103.07769 (2021)."},{"key":"e_1_2_1_117_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1460-2466.1974.tb00367.x"},{"key":"e_1_2_1_118_1","volume-title":"Proceedings of the SIGCHI conference on human factors in computing systems. 1433-1436","author":"Oreglia Elisa","year":"2011","unstructured":"Elisa Oreglia, Ying Liu, and Wei Zhao. 2011. Designing for emerging rural users: experiences from China. In Proceedings of the SIGCHI conference on human factors in computing systems. 1433-1436."},{"key":"e_1_2_1_119_1","unstructured":"Benedicted Page. 2019. Elsevier records 2% lifts in revenue and profits. The Bookseller https:\/\/www.thebookseller.com\/news\/elsevier-records-2-lifts-revenue-and-profits-960016."},{"key":"e_1_2_1_120_1","first-page":"1","volume-title":"Proceedings of the ACM on Human-Computer Interaction 7, CSCW1","author":"Abad Beatriz Palacios","year":"2023","unstructured":"Beatriz Palacios Abad, Michael Koohang, Morgan Vigil-Hayes, and Ellen Zegura. 2023. Alone and Together: Resilience in a Fluid Socio-Technical-Natural System. Proceedings of the ACM on Human-Computer Interaction 7, CSCW1 (2023), 1-26."},{"key":"e_1_2_1_121_1","doi-asserted-by":"crossref","unstructured":"Eli Pariser. 2011. The filter bubble: What the Internet is hiding from you. penguin UK.","DOI":"10.3139\/9783446431164"},{"key":"e_1_2_1_122_1","first-page":"307","volume-title":"26th USENIX Security Symposium (USENIX Security 17)","author":"Pearce Paul","year":"2017","unstructured":"Paul Pearce, Ben Jones, Frank Li, Roya Ensafi, Nick Feamster, Nick Weaver, and Vern Paxson. 2017. Global measurement of DNS manipulation. In 26th USENIX Security Symposium (USENIX Security 17). 307-323."},{"key":"e_1_2_1_123_1","volume-title":"Shifting attention to accuracy can reduce misinformation online. Nature 592, 7855","author":"Pennycook Gordon","year":"2021","unstructured":"Gordon Pennycook, Ziv Epstein, Mohsen Mosleh, Antonio A Arechar, Dean Eckles, and David G Rand. 2021. Shifting attention to accuracy can reduce misinformation online. Nature 592, 7855 (2021)."},{"key":"e_1_2_1_124_1","volume-title":"Fighting COVID-19 misinformation on social media: Experimental evidence for a scalable accuracy-nudge intervention. Psychological science 31, 7","author":"Pennycook Gordon","year":"2020","unstructured":"Gordon Pennycook, Jonathon McPhetres, Yunhao Zhang, Jackson G Lu, and David G Rand. 2020. Fighting COVID-19 misinformation on social media: Experimental evidence for a scalable accuracy-nudge intervention. Psychological science 31, 7 (2020), 770-780."},{"key":"e_1_2_1_125_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cognition.2018.06.011"},{"key":"e_1_2_1_126_1","first-page":"20","article-title":"Shouting matches and echo chambers'': perceived identity threats and political self-censorship on social media","volume":"13","author":"Powers Elia","year":"2019","unstructured":"Elia Powers, Michael Koliska, and Pallavi Guha. 2019. ''Shouting matches and echo chambers'': perceived identity threats and political self-censorship on social media. International Journal of Communication 13 (2019), 20.","journal-title":"International Journal of Communication"},{"key":"e_1_2_1_127_1","unstructured":"Ram Sundara Raman Adrian Stoll Jakub Dalek Reethika Ramesh Will Scott and Roya Ensafi. 2020. Measuring the Deployment of Network Censorship Filters at Global Scale.. In NDSS."},{"key":"e_1_2_1_128_1","first-page":"5773","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Ramesh Reethika","year":"2023","unstructured":"Reethika Ramesh, Anjali Vyas, and Roya Ensafi. 2023. ''All of them claim to be the best''': Multi-perspective study of VPN users and VPN providers. In 32nd USENIX Security Symposium (USENIX Security 23). 5773-5789."},{"key":"e_1_2_1_129_1","doi-asserted-by":"publisher","DOI":"10.5555\/3620237.3620611"},{"key":"e_1_2_1_130_1","unstructured":"Michael Riley Lauren Etter and Bibhudatta Pradhan. 2018. Project of Formation of a Troll Army for the Bolivarian Revolution. Bloomberg https:\/\/www.bloomberg.com\/features\/2018-government-sponsored-cyber-militia-cookbook\/data\/Ejercito_De_Trolls_Venezuela.pdf."},{"key":"e_1_2_1_131_1","doi-asserted-by":"crossref","first-page":"1178","DOI":"10.1080\/13510347.2017.1293658","article-title":"Political activism in Iran: strategies for survival, possibilities for resistance and authoritarianism","volume":"24","author":"Rivetti Paola","year":"2017","unstructured":"Paola Rivetti. 2017. Political activism in Iran: strategies for survival, possibilities for resistance and authoritarianism. Democratization 24, 6 (2017), 1178-1194.","journal-title":"Democratization"},{"key":"e_1_2_1_132_1","volume-title":"Experiencing censorship emboldens internet users and decreases government support in China. Unpublished Working Paper. URL: margaretroberts.net\/wp-content\/uploads\/2015\/07\/fear.pdf","author":"Roberts Margaret E","year":"2015","unstructured":"Margaret E Roberts. 2015. Experiencing censorship emboldens internet users and decreases government support in China. Unpublished Working Paper. URL: margaretroberts.net\/wp-content\/uploads\/2015\/07\/fear.pdf (2015)."},{"key":"e_1_2_1_133_1","doi-asserted-by":"publisher","DOI":"10.1177\/1466138111435738"},{"key":"e_1_2_1_134_1","volume-title":"Karrie Karahalios Hamilton, and Cedric Langbort","author":"Sandvig Christian","year":"2014","unstructured":"Christian Sandvig, Karrie Karahalios Hamilton, and Cedric Langbort. 2014. Auditing Algorithms: Research Methods for Detecting Discrimination on Internet Platforms. In Data and Discrimination: Collected Essays. Open Technology Institute, New America Foundation."},{"key":"e_1_2_1_135_1","volume-title":"Coordination patterns reveal online political astroturfing across the world. Scientific reports 12, 1","author":"Schoch David","year":"2022","unstructured":"David Schoch, Franziska B Keller, Sebastian Stier, and JungHwan Yang. 2022. Coordination patterns reveal online political astroturfing across the world. Scientific reports 12, 1 (2022), 4572."},{"key":"e_1_2_1_136_1","volume-title":"Proceedings of the ACM on Human-Computer Interaction 8, CSCW1","author":"Seelam Ananya","year":"2024","unstructured":"Ananya Seelam, Arnab Paul Choudhury, Connie Liu, Miyuki Goay, Kalika Bali, and Aditya Vashistha. 2024. ''Fact-checks are for the Top 0.1%'': Examining Reach, Awareness, and Relevance of Fact-Checking in Rural India. Proceedings of the ACM on Human-Computer Interaction 8, CSCW1 (2024)."},{"key":"e_1_2_1_137_1","first-page":"1","volume-title":"Proceedings of the ACM on Human-Computer Interaction 3, CSCW","author":"Semaan Bryan","year":"2019","unstructured":"Bryan Semaan. 2019. 'Routine Infrastructuring' as 'Building Everyday Resilience with Technology' When Disruption Becomes Ordinary. Proceedings of the ACM on Human-Computer Interaction 3, CSCW (2019), 1-24."},{"key":"e_1_2_1_138_1","volume-title":"Proc. ACM Hum.-Comput. Interact. 6, CSCW1","author":"Shahid Farhana","year":"2022","unstructured":"Farhana Shahid, Shrirang Mare, and Aditya Vashistha. 2022. Examining Source Effects on Perceptions of Fake News in Rural India. Proc. ACM Hum.-Comput. Interact. 6, CSCW1 (2022)."},{"key":"e_1_2_1_139_1","volume-title":"Folk Models of Misinformation on Social Media. In 30th Annual Network and Distributed System Security Symposium, NDSS.","author":"Sharevski Filipo","year":"2023","unstructured":"Filipo Sharevski, Amy Devine, Emma Pieroni, and Peter Jachim. 2023. Folk Models of Misinformation on Social Media. In 30th Annual Network and Distributed System Security Symposium, NDSS."},{"key":"e_1_2_1_140_1","first-page":"19","volume-title":"Fight Fire with Fire: Hacktivists' Take on Social Media Misinformation. In Nineteenth Symposium on Usable Privacy and Security (SOUPS","author":"Sharevski Filipo","year":"2023","unstructured":"Filipo Sharevski and Benjamin Kessell. 2023. Fight Fire with Fire: Hacktivists' Take on Social Media Misinformation. In Nineteenth Symposium on Usable Privacy and Security (SOUPS 2023). 19-36."},{"key":"e_1_2_1_141_1","volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. 1109-1118","author":"Shklovski Irina","year":"2011","unstructured":"Irina Shklovski and Nalini Kotamraju. 2011. Online contribution practices in countries that engage in internet blocking and censorship. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. 1109-1118."},{"key":"e_1_2_1_142_1","unstructured":"Craig Silverman. 2020. Popular VPN And Ad-Blocking Apps Are Secretly Harvesting User Data. BuzzFeed News https:\/\/www.buzzfeednews.com\/article\/craigsilverman\/vpn-and-ad-blocking-apps-sensor-tower."},{"key":"e_1_2_1_143_1","unstructured":"Manish Singh. 2023. India to require Facebook and Twitter rely on gov't fact checking. TechCrunch https:\/\/techcrunch.com\/2023\/04\/06\/india-cracks-down-on-betting-games\/."},{"key":"e_1_2_1_144_1","first-page":"1","volume-title":"Proceedings of the ACM on Human-Computer Interaction 5, CSCW1","author":"Spezzano Francesca","year":"2021","unstructured":"Francesca Spezzano, Anu Shrestha, Jerry Alan Fails, and Brian W Stone. 2021. That's Fake News! Reliability of News When Provided Title, Image, Source Bias & Full Article. Proceedings of the ACM on Human-Computer Interaction 5, CSCW1 (2021), 1-19."},{"key":"e_1_2_1_145_1","unstructured":"Spyscape. [n. d.]. Inside Russia's Notorious 'Internet Research Agency' Troll Farm. https:\/\/spyscape.com\/article\/inside-the-troll-factory-russias-internet-research-agency."},{"key":"e_1_2_1_146_1","first-page":"1","volume-title":"Proceedings of the ACM on Human-Computer Interaction 3, CSCW","author":"Starbird Kate","year":"2019","unstructured":"Kate Starbird, Ahmer Arif, and Tom Wilson. 2019. Disinformation as collaborative work: Surfacing the participatory nature of strategic information operations. Proceedings of the ACM on Human-Computer Interaction 3, CSCW (2019), 1-26."},{"key":"e_1_2_1_147_1","volume-title":"Wulf, Pipek et al.(Eds.): Socio-Informatics: A Practice-Based Perspective on the Design and Use of IT Artifacts","author":"Stevens Gunnar","unstructured":"Gunnar Stevens and Volkmar Pipek. 2018. Making use: understanding, studying, and supporting appropriation. In Wulf, Pipek et al.(Eds.): Socio-Informatics: A Practice-Based Perspective on the Design and Use of IT Artifacts. Oxford University Press, 139-176."},{"key":"e_1_2_1_148_1","volume-title":"Proc. ACM Hum.-Comput. Interact. 5, CSCW2","author":"Sultana Sharifa","year":"2021","unstructured":"Sharifa Sultana and Susan R. Fussell. 2021. Dissemination, Situated Fact-Checking, and Social Effects of Misinformation among Rural Bangladeshi Villagers During the COVID-19 Pandemic. Proc. ACM Hum.-Comput. Interact. 5, CSCW2 (2021)."},{"key":"e_1_2_1_149_1","volume-title":"proceedings of the 2020 ACM SIGSAC conference on computer and communications security. 49-66","author":"Raman Ram Sundara","year":"2020","unstructured":"Ram Sundara Raman, Prerana Shenoy, Katharina Kohls, and Roya Ensafi. 2020. Censored planet: An internet-wide, longitudinal censorship observatory. In proceedings of the 2020 ACM SIGSAC conference on computer and communications security. 49-66."},{"key":"e_1_2_1_150_1","unstructured":"Cass R. Sunstein. 2001. Republic.com. Princeton University Press."},{"key":"e_1_2_1_151_1","unstructured":"Ali Swenson. 2024. Efforts by Russia Iran and China to sway US voters may escalate new Microsoft report says. AP News https:\/\/apnews.com\/article\/russia-china-iran-disinformation-election-ef9b5155349d496e00513e7b3bc3fc07."},{"key":"e_1_2_1_152_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.59"},{"key":"e_1_2_1_153_1","doi-asserted-by":"crossref","unstructured":"Joshua A Tucker Andrew Guess Pablo Barber\u00e1 Cristian Vaccari Alexandra Siegel Sergey Sanovich Denis Stukal and Brendan Nyhan. 2018. Social media political polarization and political disinformation: A review of the scientific literature. Political polarization and political disinformation: a review of the scientific literature (March 19 2018) (2018).","DOI":"10.2139\/ssrn.3144139"},{"key":"e_1_2_1_154_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411495.3421363"},{"key":"e_1_2_1_155_1","first-page":"1557","volume-title":"Proceedings of the international AAAI conference on web and social media","volume":"18","author":"Vishnuprasad Padinjaredath Suresh","year":"2024","unstructured":"Padinjaredath Suresh Vishnuprasad, Gianluca Nogara, Felipe Cardoso, Stefano Cresci, Silvia Giordano, and Luca Luceri. 2024. Tracking fringe and coordinated activity on Twitter leading up to the US Capitol attack. In Proceedings of the international AAAI conference on web and social media, Vol. 18. 1557-1570."},{"key":"e_1_2_1_156_1","unstructured":"Claire Voeux and Julien Pain. 2006. Going Online in Cuba: Internet Under Surveillance. Reporters Without Borders https:\/\/rsf.org\/en\/going-online-cuba-internet-under-surveillance."},{"key":"e_1_2_1_157_1","volume-title":"The lexicon of fear: Chinese internet control practice in Sina Weibo microblog censorship. Surveillance & society 13, 3\/4","author":"Vuori Juha Antero","year":"2015","unstructured":"Juha Antero Vuori and Lauri Paltemaa. 2015. The lexicon of fear: Chinese internet control practice in Sina Weibo microblog censorship. Surveillance & society 13, 3\/4 (2015), 400-421."},{"key":"e_1_2_1_158_1","first-page":"1","volume-title":"Proceedings of the ACM on Human-Computer Interaction 1, CSCW","author":"Vyas Dhaval","year":"2017","unstructured":"Dhaval Vyas and Tawanna Dillahunt. 2017. Everyday resilience: Supporting resilient strategies among low socioeconomic status communities. Proceedings of the ACM on Human-Computer Interaction 1, CSCW (2017), 1-21."},{"key":"e_1_2_1_159_1","doi-asserted-by":"publisher","DOI":"10.1080\/10584609.2019.1668894"},{"key":"e_1_2_1_160_1","first-page":"21","article-title":"Trust, Then Verify'': When and Why People Fact-Check Partisan Information","volume":"15","author":"Walter Nathan","year":"2021","unstructured":"Nathan Walter, Stephanie Edgerly, and Camille J Saucier. 2021. ''Trust, Then Verify'': When and Why People Fact-Check Partisan Information. International Journal of Communication 15 (2021), 21.","journal-title":"International Journal of Communication"},{"key":"e_1_2_1_161_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818997"},{"key":"e_1_2_1_162_1","volume-title":"Participatory censorship with illusory empowerment: Algorithmic folklore and interpretive labor beyond fandom","author":"Wang Erika Ningxin","year":"2024","unstructured":"Erika Ningxin Wang. 2024. Participatory censorship with illusory empowerment: Algorithmic folklore and interpretive labor beyond fandom. Social Media Society 10, 4 (2024)."},{"key":"e_1_2_1_163_1","first-page":"557","article-title":"The rule of law on Instagram: An evaluation of the moderation of images depicting women's bodies. University of New South Wales Law Journal","volume":"42","author":"Witt Alice","year":"2019","unstructured":"Alice Witt, Nicolas Suzor, and Anna Huggins. 2019. The rule of law on Instagram: An evaluation of the moderation of images depicting women's bodies. University of New South Wales Law Journal, The 42, 2 (2019), 557-596.","journal-title":"The"},{"key":"e_1_2_1_164_1","unstructured":"Kathleen Wong. 2025. Yes border control can go through your phone. Here's what travelers should know. USA Today https:\/\/www.usatoday.com\/story\/travel\/news\/2025\/03\/21\/border-control-phone-search\/82594653007\/."},{"key":"e_1_2_1_165_1","first-page":"2653","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Wu Mingshi","year":"2023","unstructured":"Mingshi Wu, Jackson Sippe, Danesh Sivakumar, Jack Burg, Peter Anderson, Xiaokang Wang, Kevin Bock, Amir Houmansadr, Dave Levin, and Eric Wustrow. 2023. How the Great Firewall of China detects and blocks fully encrypted traffic. In 32nd USENIX Security Symposium (USENIX Security 23). 2653-2670."},{"key":"e_1_2_1_166_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466262"},{"key":"e_1_2_1_167_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10606-022-09426-7"},{"key":"e_1_2_1_168_1","volume-title":"9th USENIX Workshop on Free and Open Communications on the Internet, FOCI 2019","author":"Xiong Ruohan","year":"2019","unstructured":"Ruohan Xiong and Jeffrey Knockel. 2019. An Efficient Method to Determine which Combination of Keywords Triggered Automatic Filtering of a Message. In 9th USENIX Workshop on Free and Open Communications on the Internet, FOCI 2019, Santa Clara, CA, USA, August 13, 2019."},{"key":"e_1_2_1_169_1","unstructured":"X\/Twitter. [n. d.]. How we address misinformation on X. X https:\/\/help.twitter.com\/en\/resources\/addressing-misleading-info."},{"key":"e_1_2_1_170_1","volume-title":"Proceedings of the CHI conference on human factors in computing systems.","author":"Yaqub Waheeb","year":"2020","unstructured":"Waheeb Yaqub, Otari Kakhidze, Morgan L Brockman, Nasir Memon, and Sameer Patil. 2020. Effects of credibility indicators on social media news sharing intent. In Proceedings of the CHI conference on human factors in computing systems."},{"key":"e_1_2_1_171_1","volume-title":"Echoes of silence: how social influence fosters self-censorship under democratic backsliding. Democratization","author":"Yuen Samson","year":"2025","unstructured":"Samson Yuen and Francis LF Lee. 2025. Echoes of silence: how social influence fosters self-censorship under democratic backsliding. Democratization (2025), 1-26."},{"key":"e_1_2_1_172_1","volume-title":"Proceedings of the 10th ACM Conference on Web Science.","author":"Zannettou Savvas","year":"2019","unstructured":"Savvas Zannettou, Tristan Caulfield, William Setzer, Michael Sirivianos, Gianluca Stringhini, and Jeremy Blackburn. 2019. Who Let The Trolls Out? Towards Understanding State-Sponsored Trolls. In Proceedings of the 10th ACM Conference on Web Science."},{"key":"e_1_2_1_173_1","first-page":"3685","volume-title":"Proceedings of the ACM Web Conference","author":"Zhou Xinyi","year":"2022","unstructured":"Xinyi Zhou, Kai Shu, Vir V Phoha, Huan Liu, and Reza Zafarani. 2022. ''This is Fake! Shared it by Mistake'': Assessing the Intent of Fake News Spreaders. In Proceedings of the ACM Web Conference 2022. 3685-3694."}],"container-title":["Proceedings of the ACM on Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3757572","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3757572","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T17:34:35Z","timestamp":1760636075000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3757572"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,16]]},"references-count":173,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2025,10,18]]}},"alternative-id":["10.1145\/3757572"],"URL":"https:\/\/doi.org\/10.1145\/3757572","relation":{},"ISSN":["2573-0142"],"issn-type":[{"value":"2573-0142","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,16]]},"assertion":[{"value":"2025-10-16","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}