E-ISSN : 2383-9449
In most of the world, the current trend in information technology is for open data movement that promotes transparency and equal access. An opposite trend is observed in China, which has the world's largest Internet population. The country has implemented sophisticated cyber-infrastructure and practices under the name of The Golden Shield Project (commonly referred to as the Great Firewall) to limit access to popular international web services and to filter traffic containing 'undesirable' political content. Increasingly, tech-savvy Chinese bypass this firewall and use Twitter to share knowledge on censorship circumvention and encryption to collectively troubleshoot firewall evasion methods, and even mobilize actions that border on activism. Using a mixed mythological approach, the current study addresses such networked knowledge sharing among citizens in a restricted web ecosystem. On the theoretical front, this study uses webometric approaches to understand change agents and positive deviant in the diffusion of censorship circumvention technology. On policy-level, the study provides insights for Internet regulators and digital rights groups to help best utilize communication networks of positive deviants to counter Internet control.
Ackland, R., & O’Neil, M.. (2011). Online collective identity: The case of the environmental movement. Social Networks, 33(3), 177-190. 10.1016/j.socnet.2011.03.001.
Bloomberg.
boyd, D., Golder, S., & Lotan, G.. (2010). Tweet, tweet, retweet: Conversational aspects of retweeting on twitter (1-10). System Sciences (HICSS), 2010 43rd Hawaii International Conference on.
Borgatti, S. P., Mehra, A., Brass, D. J., & Labianca, G.. (2009). Network analysis in the social sciences. science, 323(5916), 892-895. 10.1126/science.1165821.
Burnett, S., & Feamster, N.. (2013). Making sense of Internet censorship: a new frontier for Internet measurement. ACM SIGCOMM Computer Communication Review, 43(3), 84-89. 10.1145/2500098.2500111.
Carter, L.. The Grass-Mud Horse Lexicon: Classic Netizen Language.
China Digital Times.
Choi, S., & Park, H. W.. (2013). An exploratory approach to a Twitter-based community centered on a political goal in South Korea: Who organized it, what they shared, and how they acted. New Media & Society, .
Christensen, H. S.. (2011). Political activities on the Internet: Slacktivism or political participation by other means?. First Monday, 16(2).
CNNIC.
The Diplomat.
Freedom House.
Freeman, L. C.. (1979). Centrality in social networks conceptual clarification. Social networks, 1(3), 215-239.
Forbes.
Global Times.
Gruzd, A., Wellman, B., & Takhteyev, Y.. (2011). Imagining Twitter as an imagined community. American Behavioral Scientist, 55(10), 1294-1318. 10.1177/0002764211409378.
Katona, Z., Zubcsek, P. P., & Sarvary, M.. (2011). Network effects and personal influences: The diffusion of an online social network. Journal of Marketing Research, 48(3), 425-443. 10.1509/jmkr.48.3.425.
Haythornthwaite, C.. (1996). Social network analysis: An approach and technique for the study of information exchange. Library & information science research, 18(4), 323-342. 10.1016/S0740-8188(96)90003-1.
Huang, R., & Sun, X.. (2014). Weibo network, information diffusion and implications for collective action in China. Information, Communication & Society, 17(1), 86-104. 10.1080/1369118X.2013.853817.
Introna, L. D., & Gibbons, A.. (2009). Networks and Resistance: Investigating online advocacy networks as a modality for resisting state surveillance. Surveillance & Society, 6(3), 233-258.
Kenengba.
King, G., Pan, J., & Roberts, M. E.. (2013). How censorship in China allows government criti-cism but silences collective expression. American Political Science Review, 107(2), 326-343. 10.1017/S0003055413000014.
Leberknight, C. S., Chiang, M., Poor, H. V., & Wong, F.. A taxonomy of Internet censorship and anti-censorship.
Meng, B.. (2011). From steamed bun to grass mud horse: E Gao as alternative political discourse on the Chinese Internet. Global Media and Communication, 7(1), 33-51. 10.1177/1742766510397938.
Meraz, S., & Papacharissi, Z.. (2013). Networked gatekeeping and networked framing on# Egypt. The international journal of press/politics, .
Morozov, E.. (2009). Iran: Downside to the" twitter revolution". Dissent, 56(4), 10-14.
Mou, Y., Wu, K., & Atkin, D.. (2014). Understanding the use of circumvention tools to bypass online censorship. New Media & Society, .
OpenNet Initiative.
Nam, Y., Lee, Y. O., & Park, H. W.. (2013). Can web ecology provide a clearer understanding of people's information behavior during election campaigns?. Social Science Information, 52(1), 91-109. 10.1177/0539018412466635.
OpenITP.
Papacharissi, Z.. (2002). The virtual sphere: The Internet as a public sphere. New media & society, 4(1), 9-27. 10.1177/14614440222226244.
Park, H. W., & Leydesdorff, L.. (2013). Decomposing social and semantic networks in emerging "big data" research. Journal of Informetrics, 7(3), 756-765. 10.1016/j.joi.2013.05.004.
Park, S. J., Lim, Y. S., Sams, S., Nam, S. M., & Park, H. W.. (2011). Networked politics on Cyworld: The text and sentiment of Korean political profiles. Social Science Computer Review, 29(3), 288-299. 10.1177/0894439310382509.
Pascale, R. T., Sternin, J., & Sternin, M.. The power of positive deviance: How unlikely innovators solve the world's toughest problems (Vol. 1).
Powell, A.. Assessing the Influence of Online Activism on Internet Policy-Making: The Case of SOPA/PIPA and ACTA.
Reuters.
Seidman, S. B.. (1983). Network structure and minimum degree. Social networks, 5(3), 269-287. 10.1016/0378-8733(83)90028-X.
Skinner, J.. Social media and revolution: The arab spring and the occupy movement as seen through three information studies paradigms.
Shapiro, M. A., & Park, H. W.. (2014). More than entertainment: YouTube and public responses to the science of global warming and climate change. Social Science Information, .
Shirazi, F.. (2014). Interrogating Iran's restricted public cloud: An Actor Network Theory perspective. Telematics and Informatics, 31(2), 228-236. 10.1016/j.tele.2013.08.005.
Storify.
South China Morning Post.
Thelwall, M.. (2009). Introduction to webometrics: Quantitative web research for the social sciences. Synthesis lectures on information concepts, retrieval, and services, 1(1), 1-116.
Theocharis, Y.. (2013). The wealth of (Occupation) networks? Communication patterns and information distribution in a Twitter protest network. Journal of Information Technology & Politics, 10(1), 35-56. 10.1080/19331681.2012.701106.
Tselikov, A.. The Tightening Web of Russian Internet Regulation.
Van Laer, J., & Van Aelst, P.. Cyber-protest and civil society: the Internet and action repertoires in social movements. Handbook on Internet crime.
Van Laer, J., & Van Aelst, P.. (2010). Internet and social movement action repertoires: Opportunities and limitations. Information, Communication & Society, 13(8), 1146-1171. 10.1080/13691181003628307.
Woo-young, C., & Park, H. W.. (2012). The network structure of the Korean blogosphere. Journal of Computer-Mediated Communication, 17(2), 216-230. 10.1111/j.1083-6101.2011.01567.x.
Xinhua News.
Xu, W. W., Chiu, I. H., Chen, Y., & Mukherjee, T.. (2014). Twitter hashtags for health: applying network and content analyses to understand the health knowledge sharing in a Twitter-based community of practice. Quality & Quantity, , 1-20.
Xu, W. W., & Feng, M.. (2014). Talking to the Broadcasters on Twitter: Networked Gatekeeping in Twitter Conversations with Journalists. Journal of Broadcasting & Electronic Media, 58(3), 420-437. 10.1080/08838151.2014.935853.
Xu, W. W., Sang, Y., Blasiola, S., & Park, H. W.. (2014). Predicting Opinion Leaders in Twitter Activism Networks The Case of the Wisconsin Recall Election. American Behavioral Scientist, .
Yang, G.. The power of the Internet in China: Citizen activism online.
Yang, F.. (2014). Rethinking China's Internet censorship: The practice of recoding and the politics of visibility. New Media & Society, .
Yang, Q., & Liu, Y.. (2014). What's on the other side of the great firewall? Chinese Web users' motivations for bypassing the Internet censorship. Computers in Human Behavior, 37, 249-257. 10.1016/j.chb.2014.04.054.