Talking in Circles: Selective Sharing in Google+ Sanjay Kairam1, Michael J

Total Page:16

File Type:pdf, Size:1020Kb

Talking in Circles: Selective Sharing in Google+ Sanjay Kairam1, Michael J Session: It's a Big Web! CHI 2012, May 5–10, 2012, Austin, Texas, USA Talking in Circles: Selective Sharing in Google+ Sanjay Kairam1, Michael J. Brzozowski2, David Huffaker2, Ed H. Chi2 1Computer Science Department 2Google Inc. Stanford University Mountain View, CA [email protected] {zozo, huffaker, edchi}@google.com ABSTRACT If users are aware of the consequences of ‘over-sharing’, Online social networks have become indispensable tools for then why continue to share so much? This question information sharing, but existing ‘all-or-nothing’ models constitutes what Barnes has called the ‘privacy paradox’ for sharing have made it difficult for users to target [4]. In this paper, we study individuals who are actively information to specific parts of their networks. In this sharing while successfully handling privacy concerns. We paper, we study Google+, which enables users to selectively observe their behavior to identify strategies for improving share content with specific ‘Circles’ of people. Through a sharing precision through selective sharing. combination of log analysis with surveys and interviews, we investigate how active users organize and select We base our analyses on usage data from the field trial of audiences for shared content. We find that these users Google+, a social networking service introduced in 2011. frequently engaged in selective sharing, creating circles to Through the incorporation of ‘Circles’, this service is manage content across particular life facets, ties of varying designed around selective sharing and consumption of strength, and interest-based groups. Motivations to share information. In the following section, we provide some spanned personal and informational reasons, and users brief theoretical background on needs for selective sharing frequently weighed ‘limiting’ factors (e.g. privacy, and prior research on challenges for users sharing using relevance, and social norms) against the desire to reach a existing social technologies. We then provide a brief large audience. Our work identifies implications for the introduction to how these needs are addressed in Google+. design of selective sharing mechanisms in social networks. BACKGROUND Author Keywords In applying Altman’s theory of privacy boundary regulation Social media; group-based access controls; social networks [3] to the online world, Palen and Dourish argue that the disclosure of information is a necessary consequence of ACM Classification Keywords participating in a social world [22]. In the offline world, H.5.3 Group and Organization Interfaces some information (such as presence) may be freely INTRODUCTION disclosed to the general public, while other information Social media, from blogs to forums to online social (such as personal secrets) may only be revealed to a networks (OSNs), have become a major venue for social privileged few. Using Goffman’s dramaturgical metaphor interaction and communication. In the United States, over for interpersonal communication [9], social interaction 65% of adult Internet users are currently active on social provides a stage and an audience for whom we tailor self- networking tools [17]. This phenomenon is global; at the representations, disclosing what we see fit. start of 2012, Facebook, the largest OSN, claimed over 800 Prior work has revealed the existence of ‘facets’ [8] or million active users, 75% of whom were outside the US [7]. ‘modes’ [20], representing the various audiences for whom A key affordance of these tools is interaction with we must fluidly adapt our performances over the course of audiences to which users may not have had contact offline; our day. Generally, in offline settings, information often these interactions accompany disclosures of personal disclosed is ephemeral and the audience evident, enabling a information. Research on social media over the past decade tight loop between what we share and with whom we share has shown that users are revealing a startling amount of it. As Palen and Dourish identify, moving interactions personal information through blogs [14, 25], profiles [10], online means that content shared may persist beyond the and status updates [19]. In situations where readership may scope of a conversation and reach unintended audiences. not be clearly delineated, users often underestimate the size Many existing tools for online communication are designed of their potential audience [1], in many cases leading to to enable ‘public’ sharing to wide groups. Rather than tension [8, 23], regret [26], or tangible negative focusing on the natural ‘facets’ of a user’s life, many social consequences in one’s personal or professional life [25]. networks, for instance, grant default access to content to a user’s ‘followers’ or ‘friends’, restricting those who fall Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are outside this boundary. While this model may be simple for not made or distributed for profit or commercial advantage and that copies users to understand, it ignores the ‘natural’ groupings which bear this notice and the full citation on the first page. To copy otherwise, may exist within these networks [16], making selective or republish, to post on servers or to redistribute to lists, requires prior control over content difficult and prone to error [24]. specific permission and/or a fee. CHI’12, May 5–10, 2012, Austin, Texas, USA. Copyright 2012 ACM 978-1-4503-1015-4/12/05...$10.00. 1065 Session: It's a Big Web! CHI 2012, May 5–10, 2012, Austin, Texas, USA Difficulty in disclosing information selectively to various users separate their networks for the purposes of selective life facets can lead to what Marwick and boyd have called sharing and consumption. ‘context collapse’ [18]. Studies of OSN use in the work- In the subsequent section, we report findings from a place reveal that this leads to very real tensions for users of qualitative study of users sharing comfortably on Google+. such systems [2, 5, 23]. As a result, users may engage in We analyze the behavior of these ‘expert’ users through drastic behaviors to avoid future privacy violations, such as data collected via surveys and interviews in order to self-censoring or ceasing sharing altogether [24, 26]. understand how they use the product to successfully tailor Tools such as email fall on the other side of this spectrum, self-presentations for various parts of their network through easily enabling ‘targeted’ sharing of specific items to selective information sharing. We focus specifically on how individuals. By essentially requiring access controls to be they organize their contacts into Circles, what factors set for each item shared, such systems provide a high motivate them to share, and contextual considerations for degree of control over access to content. While prior work choosing an audience for a particular piece of content. has shown that particular sub-groups of email contacts may QUANTITATIVE LOG ANALYSIS be common across many users [20], the creation and In this section, we conduct analysis using usage logs from maintenance of persistent groups for access in these the field trial of Google+ to examine overall user sharing systems can often be cumbersome or difficult. patterns and characterize how users organize their networks Introducing Google+ based on names assigned to Circles they have created. Google+, a social networking service launched into field High-Level Sharing Patterns trial by Google in 2011, was designed to address some of To understand the extent to which users were engaging in these problems. To aid users in selectively disclosing selective sharing with Circles, as opposed to public or information to common sub-groups of their network, targeted sharing, we first examined logs of per-user sharing Google+ introduced ‘Circles’, an intuitive mechanism for choices aggregated over the week of July 20-26, 2011. organizing contacts. Similar to ‘lists’ or ‘groups’ available in networks such as Facebook or Twitter, Circles are user- Data created groupings of contacts which may be overlapping or User IDs were hashed and sampled randomly from the hierarchical, allowing users a great deal of flexibility in population of users who had shared at least once during the organizing their networks. Each time a user shares a piece data collection period, providing a representative sample of of content, he or she makes a contextual decision about the 100K active users. To preserve user privacy, we did not audience with whom to share it; content can be shared conduct any analysis concerning specific Circles, but rather publicly or shared selectively to one or more circles. Users restricted our analysis to public (posts shared using the can also share to ‘friends of friends’ by selecting an ‘Public’ setting), selective (posts share to one or more ‘Extended Circles’ option, though this feature is not Circles), and targeted (posts shared using a ‘+Mention’) analyzed in detail in the present work. sharing. In order to compare our results to those found in the later qualitative study, we focused on users sharing via In addition, specific individuals can be referenced through the desktop web application, resulting in a data set of inclusion of a ‘+Mention’. Mentioning users individually in 64,005 users who shared content during this week. this way can be used to target content directly at those users. Use of a ‘+Mention’ when sharing to a wider As shown below in Figure 1, the number of items shared audience can be a means of notifying the mentioned user weekly per user roughly follows a power-law distribution. and directing their attention to the post, similar to a Using Clauset et al.’s approach [6], we estimate the ‘@mention’ on Twitter. In addition to providing a simple parameter α as 2.578, meaning that the distribution matches mechanism for selective sharing, Circles also support those of a variety of man-made and naturally occurring selective consumption. Users can filter their incoming phenomena, giving us confidence that out data was stream in order to see content being shared only by representative of the wider population members of a specific Circle.
Recommended publications
  • Opensocial: from Social Networks to Social Ecosystem
    2007 Inaugural IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2007) OpenSocial: From Social Networks to Social Ecosystem Juliana Mitchell-WongI, Ryszard Kowalczyk', Albena Rosheloval, Bruce Joy2 and Henry Tsai2 'Centre for Information Technology Research, Swinburne University, Hawthorn, VIC, Australia e-mail: (jmitchellwong, rkowalczyk, aroshelova)@ict.swin.edu.au 2Everyday Interactive Networks, Hawthorn, VIC, Australia, e-mail: (brucejoy, henrytsai)@ein.com.au ties to be managed using the one application. GAIM' and Abstract-Unlike the physical world where social ecosys- Trillian2 are two example applications for instant messaging tems are formed from the integrated and managed relation- communities. These applications however do not address ships between individuals and organisations, the online digital any of the fundamental issues: the independent and isolated world consists of many independent, isolated and incompatible nature of communities, the ignorance to overlapping rela- social networks established by organisations that have over- lapping and manually managed relationships. To bring the tionships in different communities, or the manual manage- online digital world in-line with the physical world, integration ment of relationships. of social networks, identification of overlapping relationships Communities on the other hand have moved towards in social networks, and automation of relationship manage- forming alliances with other communities to enable content ment in social networks are required. OpenSocial is a frame- search and retrieval between them by using common ontol- work that enables social networks to interlink and self- use common organise into a social ecosystem guided by the policies of indi- ogy [1]. The of ontology enables communities viduals and organisations. to interlink, but each of these communities assumes that their policies are agreeable by every community in the alli- Index Terms-social framework, self-organised, self- ance.
    [Show full text]
  • Get Started with Hangouts
    Get started with Hangouts All of the information below is directly from https://support.google.com/hangouts/answer/2944865?hl=en&ref_topic=63864 You can use Hangouts to: Start a chat conversation or video call. Make phone calls using Wi-Fi or data. Send text messages with your ​Google Voice​ or ​Google Fi ​phone number. Hangouts sync automatically across devices. If you start a Hangout on your computer, you can continue your chat on another device, like your phone. Use Hangouts on a Computer Hangouts can be used in: hangouts.google.com Gmail Hangouts Chrome extension Once you choose an app, ​learn how to sign in to Hangouts​. 1. On your computer, go to ​hangouts.google.com​ or open Hangouts in ​Gmail​. 2. Enter your Google Account information. 3. Click Sign in. In Gmail, on the left, click Sign in. To use Hangouts with multiple accounts at the same time, you can: Use a different browser for each account. Set up a separate Chrome profile for each account. You can switch between profiles in separate Chrome windows. ​Learn how to set up a Chrome profile​. Install the ​Hangouts Chrome extension​. Use Hangouts on Android Download and sign in to Hangouts 1. On your Android phone or tablet, ​download the Hangouts app​ . 2. Learn how to ​sign in on Hangouts​. a. On your Android phone or tablet, open the Hangouts app . b. Select a Google Account, or sign in to another account. c. Tap Sign in. d. Follow these steps to ​verify your phone number​ and let people find you on Hangouts.
    [Show full text]
  • The Limits of Commercialized Censorship in China
    The Limits of Commercialized Censorship in China Blake Miller∗ September 27, 2018 Abstract Despite massive investment in China's censorship program, internet platforms in China are rife with criticisms of the government and content that seeks to organize opposition to the ruling Communist Party. Past works have attributed this \open- ness" to deliberate government strategy or lack of capacity. Most, however, do not consider the role of private social media companies, to whom the state delegates information controls. I suggest that the apparent incompleteness of censorship is largely a result of principal-agent problems that arise due to misaligned incentives of government principals and private media company agents. Using a custom dataset of annotated leaked documents from a social media company, Sina Weibo, I find that 16% of directives from the government are disobeyed by Sina Weibo and that disobedience is driven by Sina's concerns about censoring more strictly than com- petitor Tencent. I also find that the fragmentation inherent in the Chinese political system exacerbates this principal agent problem. I demonstrate this by retrieving actual censored content from large databases of hundreds of millions of Sina Weibo posts and measuring the performance of Sina Weibo's censorship employees across a range of events. This paper contributes to our understanding of media control in China by uncovering how market competition can lead media companies to push back against state directives and increase space for counterhegemonic discourse. ∗Postdoctoral Fellow, Program in Quantitative Social Science, Dartmouth College, Silsby Hall, Hanover, NH 03755 (E-mail: [email protected]). 1 Introduction Why do scathing criticisms, allegations of government corruption, and content about collective action make it past the censors in China? Past works have theorized that regime strategies or state-society conflicts are the reason for incomplete censorship.
    [Show full text]
  • Apachecon US 2008 with Apache Shindig
    ApacheCon US 2008 Empowering the social web with Apache Shindig Henning Schmiedehausen Sr. Software Engineer – Ning, Inc. November 3 - 7 • New Orleans Leading the Wave of Open Source The Official User Conference of The Apache Software Foundation Freitag, 7. November 2008 1 • How the web became social • Get out of the Silo – Google Gadgets • OpenSocial – A social API • Apache Shindig • Customizing Shindig • Summary November 3 - 7 • New Orleans ApacheCon US 2008 Leading the Wave of Open Source The Official User Conference of The Apache Software Foundation Freitag, 7. November 2008 2 ApacheCon US 2008 In the beginning... Freitag, 7. November 2008 3 ApacheCon US 2008 ...let there be web 2.0 Freitag, 7. November 2008 4 • Web x.0 is about participation • Users have personalized logins Relations between users are graphs • "small world phenomenon", "six degrees of separation", Erdös number, Bacon number November 3 - 7 • New Orleans ApacheCon US 2008 Leading the Wave of Open Source The Official User Conference of The Apache Software Foundation Freitag, 7. November 2008 5 ApacheCon US 2008 The Silo problem Freitag, 7. November 2008 6 • How the web became social • Get out of the Silo – Google Gadgets • OpenSocial – A social API • Apache Shindig • Customizing Shindig • Summary November 3 - 7 • New Orleans ApacheCon US 2008 Leading the Wave of Open Source The Official User Conference of The Apache Software Foundation Freitag, 7. November 2008 7 ApacheCon US 2008 iGoogle Freitag, 7. November 2008 8 • Users adds Gadgets to their homepages Gadgets share screen space • Google experiments with Canvas view Javascript, HTML, CSS • A gadget runs on the Browser! Predefined Gadgets API • Core APIs for IO, JSON, Prefs; optional APIs (e.g.
    [Show full text]
  • Google's Business Messages
    MESSAGING Google’s Business Messages The best way to reduce call volume DEFLECT CALLS INTO RICH WHY BUSINESS MESSAGES? MESSAGING EXPERIENCES MAKE IT EASY TO CONNECT When consumers need your contact info, they go All Android users, and iPhone users with Google to Google. They see your brand’s phone number Maps installed, can easily message brands from and assume that’s the only way to contact you — Search results and Maps profiles. despite not wanting call or wait on hold. DELIVER RICH EXPERIENCES Create interactive experiences with quick replies, rich Business Messages offers convenient entry points cards, and carousels — and even make scheduling or in organic search, local search, Maps, and in shopping possible in a messaging conversation. customizable buttons on your website or app. Consumers increasingly prefer messaging over AUTOMATION AND CHATBOTS calling, and by making it easy to engage in their Quickly route and resolve common inquiries with preferred channel, brands can reduce call volume. automated welcome messages, quick replies. and AI-powered chatbots. WHY KHOROS CARE? AWARD WINNING PARTNERSHIP We’re the industry’s best reviewed customer engagement vendor across TrustRadius and the Software Reviews’ 2020 CX Index. MOST EFFICIENT AND EASY-TO-USE Our consolidated messaging platform delivers the greatest range of channels, a g e n t e x p e r i e n c e , o p e r a t i o n a l e ffi c i e n c y, and workforce management. FASTEST TIME TO VALUE We partner with Google to get you up and running in as little as two weeks with entry points to reduce calls and automations to enhance efficiency.
    [Show full text]
  • Transfer Text Messages from Android to Android
    Transfer Text Messages From Android To Android Unshuttered Arvie cross-sections: he vow his peduncles derogatorily and smoothly. Subcartilaginous and spent Amadeus stagnates so industriously that Huey frame-ups his solos. Willard fumbles resistingly. Read on for a complete walkthrough. This android messages from. It from android messages transfer texts, i move your transferring folders? What you can connect to transfer process is android text transfer messages to. But you can transfer helps to your mms, why people using spyic website to android device or laptop, thanks for that? No data types such as quick switch back and new android text messages transfer from to. Slate group messages from android text messages on transferring large data transferred over, texts on the main screen. In addition, it takes only a few minutes and a few clicks to complete the whole process of transferring data. However, common are keen to dough a new of patience with this technique. Spying on a page phone is not seeing possible but, in rather, quite easy. Please cut your name! Best android messages from messaging file to leave both of transferring our network of the texts over from? But text message from android device and transferring the texts. Signal uses a stateful protocol, meaning that you record simply copy files to another move of Signal or copy files after linking and using Signal. Please send messages from android message of transferring the texts to transfer completes, you want to another phone? Are you sure you want to submit this form? Well, I can tell you safe this approach no legal fiction.
    [Show full text]
  • Pandalabs Bulletins
    - PandaLabs - Everything you need to know about Internet threats – www.pandalabs.com - - 1 – ____________________________________________________________________________________________________________ _____________________________________________________________________________________ PandaLabs Bulletins: Social Networks in the spotlight _____________________________________________________________________________________ © Panda Security 2008 | PandaLabs wwwpandasecurity.com/homeusers/security_info | www.pandalabs.com © Panda Security 2008 | PandaLabs www.pandasecurity.com/homeusers/security_info | www.pandalabs.com - PandaLabs – Everything you need to know about Internet threats - www.pandalabs.com - - 2 – ____________________________________________________________________________________________________________ Index Index............................................................................................................................................................2 1.- Introduction ..........................................................................................................................................3 2.- History ...................................................................................................................................................3 3.- Source....................................................................................................................................................4 4.- Operation ..............................................................................................................................................4
    [Show full text]
  • Social Media Advertising Response and Its Effectiveness: Case of South Asian Teenage Customers by Mohammad Mazibar Rahman & Md
    Global Journal of Management and Business Research: E Marketing Volume 18 Issue 4 Version 1.0 Year 2018 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Online ISSN: 2249-4588 & Print ISSN: 0975-5853 Social Media Advertising Response and its Effectiveness: Case of South Asian Teenage Customers By Mohammad Mazibar Rahman & Md. Mamunar Rashid Hajee Mohammad Danesh Science and Technology University Abstract- Social media, a new dimension of marketing promotion mix, has made it possible for users to express their views about the companies, as well as their advertising. The purpose of this study was to test four hypotheses regarding the effects of young social media users’ attitude, behavioral response, and purchasing intention toward social media advertising in South Asian perspective. The study selected four popular social networking sites such as Facebook, Twitter, YouTube and Google Plus which indicated the highest Asian visitor and surveyed with a structured questionnaire, asking respondents to mention their attitudinal views and responses about social media and social media advertising. The result identifies variation in predictors of users’ buying decision and provides some indications for using and developing social media platform for advertisement in the developing country and describes how to reach more user response in a regular time frame with the ultimate success of purchasing goal. Keywords: social media, social media advertising, attitude, behavioral responses, and purchase intention. GJMBR-E Classification: JEL Code: M37 SocialMediaAdvertisingResponseanditsEffectivenessCaseofSouthAsianTeenageCustomers Strictly as per the compliance and regulations of: © 2018. Mohammad Mazibar Rahman & Md. Mamunar Rashid. This is a research/review paper, distributed under the terms of the Creative Commons Attribution-Noncommercial 3.0 Unported License http://creativecommons.org/licenses/by-nc/3.0/), permitting all non-commercial use, distribution, and reproduction in any medium, provided the original work is properly cited.
    [Show full text]
  • Smart Reply Feature ` 01-Feb-2018
    SMART REPLY FEATURE ` 01-FEB-2018 Google announced that it is now rolling out the Smart Reply feature to messaging app Android Messages. The AI-based Smart Reply feature was launched with GooglePHISHING Allo back in September 2016. It will be available only for Project Fi users currently, with no timeline on a wider rollout. Google will require access to your SMS history to help it generate intelligent responses. The announcement was made through a tweet on Project Fi's official Twitter account. Smart Reply, launched with Google Allo, automatically suggests responses to messages that you have received. It provides contextual replies by analysing the recent message in the thread.PHISHING It can be turned off by going into Settings in Android Messages, under Smart Reply. The feature currently works with Google Allo, Gmail, Google Assistant, and, now, Android Messages - but the last as we mentioned is only for Project Fi users. Notably, this addition of Smart Reply to Android Messages comes a week after a teardown of Google's Gboard beta APK revealed that the Smart Reply intelligent suggestions are coming to the Gboard app on Android. The keyboard is expected to offer phrase-length suggestions in the topmost row. Thanks to the upcoming integration, the feature will work on wide variety of apps, negating the need for third-party app developers to bring Smart Reply support or similar features on their offerings. Apart from first party apps like Allo, Android Messages, and Hangouts, the feature was also spotted working on Facebook, Messenger Lite, WhatsApp, Facebook Messenger, and Tencent's platforms.
    [Show full text]
  • Arxiv:1403.5206V2 [Cs.SI] 30 Jul 2014
    What is Tumblr: A Statistical Overview and Comparison Yi Chang‡, Lei Tang§, Yoshiyuki Inagaki† and Yan Liu‡ † Yahoo Labs, Sunnyvale, CA 94089, USA § @WalmartLabs, San Bruno, CA 94066, USA ‡ University of Southern California, Los Angeles, CA 90089 [email protected],[email protected], [email protected],[email protected] Abstract Traditional blogging sites, such as Blogspot6 and Living- Social7, have high quality content but little social interac- Tumblr, as one of the most popular microblogging platforms, tions. Nardi et al. (Nardi et al. 2004) investigated blogging has gained momentum recently. It is reported to have 166.4 as a form of personal communication and expression, and millions of users and 73.4 billions of posts by January 2014. showed that the vast majority of blog posts are written by While many articles about Tumblr have been published in ordinarypeople with a small audience. On the contrary, pop- major press, there is not much scholar work so far. In this pa- 8 per, we provide some pioneer analysis on Tumblr from a va- ular social networking sites like Facebook , have richer so- riety of aspects. We study the social network structure among cial interactions, but lower quality content comparing with Tumblr users, analyze its user generated content, and describe blogosphere. Since most social interactions are either un- reblogging patterns to analyze its user behavior. We aim to published or less meaningful for the majority of public audi- provide a comprehensive statistical overview of Tumblr and ence, it is natural for Facebook users to form different com- compare it with other popular social services, including blo- munities or social circles.
    [Show full text]
  • Google Messages No Notifications
    Google Messages No Notifications infestation.secantlyHippest Jean-Louor retaliates.Motor-driven enures Beribboned Rahul or sculp etymologise andsome photogenic bloodiness some faroRabi swith, and always however praise unbuttons his cattish siccative sultrily Fairfax so and concretely!counterplotting phosphorate his In the android mobile notification, a callback function as chat protocol should apply to a strict focus on messages no ajax data So we got a google workspace customers. Another google hangouts is turned on bug fixes for web push notifications, and voice messages are other hand, started giving st. Space is trying everything in. Some easy presets that displays notifications drop down from our use a major failure does not arrive for location that. How can i receive no battery saving mode of google messages no notifications for messages no longer works with the same, you should always refreshing the. Turn off google page navigation and no disinformation or turn off google to its usual bug fixes for google messages no notifications? Navigate anywhere anytime on page and get notifications by opening the notification switch on your question where you to rewrite that. Start a helpful? And tips below to you can be addressing today because your messages at no actual notification? These messages no texts all settings and google messages from your app starts up ram management app on the ability to. Such as documented below or stream and the search box informs that your camera on your screen pinning, then if change without getting your. You want more information, there could you? Please review for? Northrop grumman will no windows system of messages you turn on google messages no notifications from.
    [Show full text]
  • Forbidden Feeds: Government Controls on Social Media in China
    FORBIDDEN FEEDS Government Controls on Social Media in China 1 FORBIDDEN FEEDS Government Controls on Social Media in China March 13, 2018 © 2018 PEN America. All rights reserved. PEN America stands at the intersection of literature and hu- man rights to protect open expression in the United States and worldwide. We champion the freedom to write, recognizing the power of the word to transform the world. Our mission is to unite writers and their allies to celebrate creative expression and defend the liberties that make it possible. Founded in 1922, PEN America is the largest of more than 100 centers of PEN International. Our strength is in our membership—a nationwide community of more than 7,000 novelists, journalists, poets, es- sayists, playwrights, editors, publishers, translators, agents, and other writing professionals. For more information, visit pen.org. Cover Illustration: Badiucao CONTENTS EXECUTIVE SUMMARY 4 INTRODUCTION : AN UNFULFILLED PROMISE 7 OUTLINE AND METHODOLOGY 10 KEY FINDINGS 11 SECTION I : AN OVERVIEW OF THE SYSTEM OF SOCIAL MEDIA CENSORSHIP 12 The Prevalence of Social Media Usage in China 12 Digital Rights—Including the Right to Free Expression—Under International Law 14 China’s Control of Online Expression: A Historical Perspective 15 State Control over Social Media: Policy 17 State Control over Social Media: Recent Laws and Regulations 18 SECTION II: SOCIAL MEDIA CENSORSHIP IN PRACTICE 24 A Typology of Censored Topics 24 The Corporate Responsibility to Censor its Users 29 The Mechanics of Censorship 32 Tibet and
    [Show full text]