{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T14:35:24Z","timestamp":1725978924077},"reference-count":96,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2020,7,6]],"date-time":"2020-07-06T00:00:00Z","timestamp":1593993600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"funder":[{"DOI":"10.13039\/100008397","name":"Velux Fonden","doi-asserted-by":"publisher","award":["[13143] \"Images of Conflict Conflicting Images\""],"id":[{"id":"10.13039\/100008397","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["asistdl.onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Asso for Info Science & Tech"],"published-print":{"date-parts":[[2021,1]]},"abstract":"Abstract<\/jats:title>Although the Internet allows people to circulate messages using different media, most censorship studies discuss the removal of text content. This article presents a systematic study regarding the censorship of both<\/jats:italic> plain text and multimedia content on the Chinese Internet. By analyzing both censored and surviving posts on the Chinese social media platform Weibo during the 2014 Hong Kong Umbrella Movement, we find that multimedia posts suffered more intensive censorship deletion than plain text posts, with censorship programs being oriented more toward multimedia content like images than the text content of multimedia posts. Our analysis has significant implications for censorship studies, information control, and politics in the \u201cpost\u2010text\u201d era.<\/jats:p>","DOI":"10.1002\/asi.24390","type":"journal-article","created":{"date-parts":[[2020,7,7]],"date-time":"2020-07-07T05:31:25Z","timestamp":1594099885000},"page":"18-31","update-policy":"http:\/\/dx.doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["More than plain text: Censorship deletion in the Chinese social media"],"prefix":"10.1002","volume":"72","author":[{"ORCID":"http:\/\/orcid.org\/0000-0001-6066-4130","authenticated-orcid":false,"given":"Jun","family":"Liu","sequence":"first","affiliation":[{"name":"Department of Communication University of Copenhagen Copenhagen Denmark"},{"name":"Center on Digital Culture and Society, The Annenberg School for Communication University of Pennsylvania Philadelphia USA"}]},{"given":"Jingyi","family":"Zhao","sequence":"additional","affiliation":[{"name":"Stary PTE Ltd. Shenzhen P. R. China"}]}],"member":"311","published-online":{"date-parts":[[2020,7,6]]},"reference":[{"key":"e_1_2_9_2_1","volume-title":"Daily mail","author":"Agence France\u2010Presse","year":"2016"},{"key":"e_1_2_9_3_1","doi-asserted-by":"publisher","DOI":"10.1525\/california\/9780520219908.001.0001"},{"key":"e_1_2_9_4_1","unstructured":"Arnold A.(2018). Facebook now dominates YouTube for video content.Forbes.https:\/\/www.forbes.com\/sites\/andrewarnold\/2018\/09\/26\/facebook\u2010now\u2010dominates\u2010youtube\u2010for\u2010video\u2010content\u2010heres\u2010how\u2010brands\u2010should\u2010respond\/#198f85ab1cc0."},{"issue":"3","key":"e_1_2_9_5_1","article-title":"Censorship and deletion practices in Chinese social media","volume":"17","author":"Bamman D.","year":"2012","journal-title":"First Monday"},{"issue":"6","key":"e_1_2_9_6_1","first-page":"138","article-title":"The great firewall of China","volume":"5","author":"Barme G. R.","year":"1997","journal-title":"Wired"},{"key":"e_1_2_9_7_1","article-title":"In pictures: The end of Hong Kong's Mong Kok protest camp?","author":"BBC","year":"2014","journal-title":"BBC"},{"key":"e_1_2_9_8_1","doi-asserted-by":"publisher","DOI":"10.1057\/9781137061980"},{"key":"e_1_2_9_9_1","article-title":"Record censorship of China's social media as references to Hong Kong protests blocked","author":"Boehler P.","year":"2014","journal-title":"South China Morning Post"},{"key":"e_1_2_9_10_1","volume-title":"Language and symbolic power","author":"Bourdieu P.","year":"1991"},{"key":"e_1_2_9_11_1","doi-asserted-by":"publisher","DOI":"10.1111\/hith.10739"},{"key":"e_1_2_9_12_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0305741019000055"},{"key":"e_1_2_9_13_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.45.2.241"},{"key":"e_1_2_9_14_1","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2012.0109"},{"issue":"2","key":"e_1_2_9_15_1","first-page":"271","article-title":"Ignoring the great firewall of China. I\/S: A","volume":"3","author":"Clayton R.","year":"2007","journal-title":"Journal of Law and Policy for the Information Society"},{"key":"e_1_2_9_16_1","doi-asserted-by":"publisher","DOI":"10.1002\/9781118901731.iecrm0045"},{"key":"e_1_2_9_17_1","volume-title":"Giving offense: Essays on censorship","author":"Coetzee J. M.","year":"2018"},{"key":"e_1_2_9_18_1","volume-title":"China's long, hot summer of censorship","author":"Cook S.","year":"2019"},{"key":"e_1_2_9_19_1","volume-title":"Movie censorship and American culture","author":"Couvares F. G.","year":"2006"},{"key":"e_1_2_9_20_1","doi-asserted-by":"publisher","DOI":"10.2307\/2707362"},{"key":"e_1_2_9_21_1","volume-title":"Cyberpl@y: Communicating online","author":"Danet B.","year":"2001"},{"key":"e_1_2_9_22_1","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/9780262016780.001.0001"},{"key":"e_1_2_9_23_1","doi-asserted-by":"publisher","DOI":"10.1353\/jod.2010.0010"},{"key":"e_1_2_9_24_1","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/7617.001.0001"},{"key":"e_1_2_9_25_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1025179019397"},{"key":"e_1_2_9_26_1","volume-title":"Beijing rejects full Hong Kong democracy","author":"Deutsche W","year":"2014"},{"key":"e_1_2_9_27_1","article-title":"China's Stopchat","author":"Dou E.","year":"2017","journal-title":"The Wall Street Journal"},{"key":"e_1_2_9_28_1","volume-title":"The Internet in China: Cultural, political, and social dimensions","author":"Esarey A.","year":"2014"},{"key":"e_1_2_9_29_1","volume-title":"There's no such thing as free speech: And it's a good thing, too","author":"Fish S.","year":"1994"},{"key":"e_1_2_9_30_1","volume-title":"Discipline and punish: The birth of the prison","author":"Foucault M.","year":"1995"},{"key":"e_1_2_9_31_1","doi-asserted-by":"publisher","DOI":"10.7208\/chicago\/9780226259031.001.0001"},{"key":"e_1_2_9_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2013.28"},{"issue":"11","key":"e_1_2_9_33_1","article-title":"Communicative functions of emoji sequences on Sina Weibo","volume":"23","author":"Ge J.","year":"2018","journal-title":"First Monday"},{"key":"e_1_2_9_34_1","doi-asserted-by":"publisher","DOI":"10.11126\/stanford\/9780804784207.001.0001"},{"key":"e_1_2_9_35_1","volume-title":"Passionate politics: Emotions and social movements","author":"Goodwin J.","year":"2009"},{"key":"e_1_2_9_36_1","volume-title":"Encyclopedia of censorship","author":"Green J.","year":"2005"},{"key":"e_1_2_9_37_1","doi-asserted-by":"publisher","DOI":"10.1111\/jcom.12296"},{"key":"e_1_2_9_38_1","volume-title":"Circles of censorship: Censorship and its metaphors in French history, literature, and theory","author":"Harrison N.","year":"1995"},{"key":"e_1_2_9_39_1","doi-asserted-by":"publisher","DOI":"10.1002\/aris.1440360104"},{"key":"e_1_2_9_40_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0003055418000084"},{"key":"e_1_2_9_41_1","first-page":"93","volume-title":"Frontiers in new media research","author":"Hu Y.","year":"2012"},{"key":"e_1_2_9_42_1","volume-title":"Censorship: The knot that binds power and knowledge","author":"Jansen S. C.","year":"1988"},{"key":"e_1_2_9_43_1","doi-asserted-by":"publisher","DOI":"10.1080\/19331681.2015.1132401"},{"key":"e_1_2_9_44_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-4560.1976.tb02510.x"},{"key":"e_1_2_9_45_1","doi-asserted-by":"crossref","DOI":"10.1177\/0010414020912278","article-title":"How dictators control the Internet: A review essay","author":"Keremo\u011flu E.","year":"2020","journal-title":"Comparative Political Studies"},{"key":"e_1_2_9_46_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0003055413000014"},{"key":"e_1_2_9_47_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.1251722"},{"key":"e_1_2_9_48_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0003055417000144"},{"key":"e_1_2_9_49_1","doi-asserted-by":"publisher","DOI":"10.1177\/0093650202239023"},{"key":"e_1_2_9_50_1","volume-title":"(Can't) picture this: An analysis of image filtering on WeChat moments (Citizen Lab Research Report No. 112)","author":"Knockel J.","year":"2018"},{"key":"e_1_2_9_51_1","volume-title":"Chinese censors are trying to erase Hong Kong's pro\u2010democracy movement","author":"Kuo L.","year":"2014"},{"key":"e_1_2_9_52_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444808091224"},{"issue":"4","key":"e_1_2_9_53_1","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1007\/BF02765184","article-title":"Effects of text illustrations","volume":"30","author":"Levie W. H.","year":"1982","journal-title":"Educational Communication and Technology"},{"key":"e_1_2_9_54_1","volume-title":"Photo posts get 120% more engagement on Facebook","author":"Long K.","year":"2013"},{"key":"e_1_2_9_55_1","doi-asserted-by":"publisher","DOI":"10.1111\/ajps.12065"},{"key":"e_1_2_9_56_1","volume-title":"The great DNS wall of China","author":"Lowe G.","year":"2007"},{"key":"e_1_2_9_57_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11127-007-9199-0"},{"issue":"2","key":"e_1_2_9_58_1","article-title":"China's censorship 2.0","volume":"14","author":"MacKinnon R.","year":"2009","journal-title":"First Monday"},{"key":"e_1_2_9_59_1","article-title":"The rise of a visual internet","author":"Manjoo F.","year":"2018","journal-title":"New York Times."},{"key":"e_1_2_9_60_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-0663.88.1.49"},{"key":"e_1_2_9_61_1","doi-asserted-by":"publisher","DOI":"10.1177\/1470412914546576"},{"key":"e_1_2_9_62_1","first-page":"1","article-title":"Censorship and cultural regulation","volume":"22","author":"M\u00fcller B.","year":"2004","journal-title":"Critical Studies"},{"key":"e_1_2_9_63_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1460-2466.1996.tb01458.x"},{"key":"e_1_2_9_64_1","doi-asserted-by":"publisher","DOI":"10.4324\/9780203805411"},{"key":"e_1_2_9_65_1","volume-title":"Blocked on Weibo: What gets suppressed on China version of Twitter and Why","author":"Ng J.","year":"2013"},{"key":"e_1_2_9_66_1","volume-title":"Internet filtering in China in 2004\u20132005","author":"Opennet Initiative","year":"2005"},{"key":"e_1_2_9_67_1","doi-asserted-by":"publisher","DOI":"10.1080\/03068374.2014.994957"},{"key":"e_1_2_9_68_1","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2020.1732441"},{"key":"e_1_2_9_69_1","doi-asserted-by":"publisher","DOI":"10.1080\/10758216.2016.1181525"},{"key":"e_1_2_9_70_1","article-title":"\u201cOccupy central\u201d becoming a hot topic among internet users in the Chinese mainland","author":"Pao S.","year":"2015","journal-title":"Sing Pao"},{"key":"e_1_2_9_71_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2012.01572.x"},{"key":"e_1_2_9_72_1","unstructured":"People's Daily's Commentary writer. (2014).Cherish positive growth(p.1).The People's Daily."},{"key":"e_1_2_9_73_1","doi-asserted-by":"publisher","DOI":"10.1257\/jep.31.1.117"},{"key":"e_1_2_9_74_1","volume-title":"Censorship and selection: Issues and answers for schools","author":"Reichman H.","year":"2001"},{"key":"e_1_2_9_75_1","volume-title":"Censored: Distraction and diversion inside China's Great Firewall","author":"Roberts M. E.","year":"2018"},{"key":"e_1_2_9_76_1","doi-asserted-by":"publisher","DOI":"10.1146\/annurev-polisci-050718-032837"},{"key":"e_1_2_9_77_1","article-title":"Minitrue: Delete harmful information on Hong Kong","author":"Rudolph J.","year":"2014","journal-title":"China Digital Time"},{"key":"e_1_2_9_78_1","volume-title":"Doing things with words in Chinese politics","author":"Schoenhals M.","year":"1992"},{"key":"e_1_2_9_79_1","first-page":"61","volume-title":"After the event: Human rights and their future in China","author":"Schoenhals M.","year":"1993"},{"key":"e_1_2_9_80_1","doi-asserted-by":"publisher","DOI":"10.1177\/1065912907313077"},{"key":"e_1_2_9_81_1","volume-title":"The social psychology of telecommunications","author":"Short J.","year":"1976"},{"key":"e_1_2_9_82_1","unstructured":"Sina Data Center. (2018).2018 Sina Media Whitepaper.http:\/\/data.weibo.com\/report\/reportDetail?id=423."},{"key":"e_1_2_9_83_1","doi-asserted-by":"publisher","DOI":"10.1177\/14614440022225887"},{"key":"e_1_2_9_84_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2004.tb00294.x"},{"key":"e_1_2_9_85_1","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom.2010.33"},{"key":"e_1_2_9_86_1","doi-asserted-by":"publisher","DOI":"10.1177\/0163443712448951"},{"key":"e_1_2_9_87_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444812472966"},{"key":"e_1_2_9_88_1","doi-asserted-by":"publisher","DOI":"10.1177\/107769900007700302"},{"key":"e_1_2_9_89_1","article-title":"Instagram reportedly blocked in China amid Hong Kong protests","author":"Vlastelica R.","year":"2014","journal-title":"Reuters"},{"key":"e_1_2_9_90_1","first-page":"529","volume-title":"The handbook of interpersonal communication","author":"Walther J. B.","year":"2002"},{"key":"e_1_2_9_91_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2008.00417.x"},{"key":"e_1_2_9_92_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444814555951"},{"key":"e_1_2_9_93_1","doi-asserted-by":"publisher","DOI":"10.1177\/0002764215580619"},{"key":"e_1_2_9_94_1","article-title":"Creepy: Emoji usage reveals your age group","author":"Zhang X.","year":"2019","journal-title":"The People\u2019s Daily"},{"key":"e_1_2_9_95_1","doi-asserted-by":"publisher","DOI":"10.1177\/1354856506067201"},{"key":"e_1_2_9_96_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-6880-6_5"},{"key":"e_1_2_9_97_1","volume-title":"Proceedings of the 22nd USENIX Security Symposium","author":"Zhu T.","year":"2013"}],"container-title":["Journal of the Association for Information Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fasi.24390","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/asi.24390","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1002\/asi.24390","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/asi.24390","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,4]],"date-time":"2023-09-04T12:06:10Z","timestamp":1693829170000},"score":1,"resource":{"primary":{"URL":"https:\/\/asistdl.onlinelibrary.wiley.com\/doi\/10.1002\/asi.24390"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,6]]},"references-count":96,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["10.1002\/asi.24390"],"URL":"https:\/\/doi.org\/10.1002\/asi.24390","archive":["Portico"],"relation":{},"ISSN":["2330-1635","2330-1643"],"issn-type":[{"value":"2330-1635","type":"print"},{"value":"2330-1643","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,7,6]]},"assertion":[{"value":"2019-12-07","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-05-30","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-07-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}