21CV375169 1300 I Street NW, Suite 400E 3 Reviewed By: R

Total Page:16

File Type:pdf, Size:1020Kb

21CV375169 1300 I Street NW, Suite 400E 3 Reviewed By: R E-FILED 1/8/2021 5:01 PM Clerk of Court 1 NORTH RIVER LAW PLLC Superior Court of CA, Times Wang (State Bar No. 281077) County of Santa Clara 2 [email protected] 21CV375169 1300 I Street NW, Suite 400E 3 Reviewed By: R. Walker Washington, DC 20005 4 Tel: (202) 838-6489 5 SCHONBRUN SEPLOW HARRIS HOFFMAN & ZELDES LLP 6 Paul L. Hoffman (State Bar No. 71244) 7 [email protected] 200 Pier Avenue, #226 8 Hermosa Beach, CA 90245 Tel: (310) 396-0731 9 Counsel for Plaintiffs and the proposed Class 10 (Additional counsel listed on signature page) 11 SUPERIOR COURT FOR THE STATE OF CALIFORNIA 12 COUNTY OF SANTA CLARA 13 Citizen Power Initiatives for China, and Doe Case No. Plaintiffs 1-6, the latter individually and on 21CV375169 14 behalf of all others similarly situated, CLASS ACTION COMPLAINT FOR 15 Plaintiffs, (1) Declaratory and injunctive relief that certain practices and contractual 16 v. provisions are unlawful and unenforceable 17 Tencent America LLC and Tencent (2) Violations of the California International Service Pte. Ltd., constitutional right to privacy 18 (3) Violations of the California Defendants. constitutional right to free speech 19 (4) Violations of the California constitutional right to equal protection 20 (5) Intrusion on seclusion (6) Conversion and trespass to chattels 21 (7) Intentional infliction of emotional distress 22 (8) Negligence (9) Unjust enrichment 23 (10) Violations of the California Unfair Competition Law 24 (11) Violations of the California Invasion of Privacy Act 25 DEMAND FOR JURY TRIAL 26 AMOUNT DEMANDED EXCEEDS 27 $25,000 COMPLAINT FOR DAMAGES, DECLARATORY, AND INJUNCTIVE RELIEF 1 TABLE OF CONTENTS 2 I. NATURE OF THE ACTION ........................................................................................................... 1 3 II. JURISDICTION AND VENUE ...................................................................................................... 3 4 III. PARTIES .............................................................................................................................................. 3 5 A. Plaintiffs .................................................................................................................................. 3 6 1. Citizen Power Initiatives for China ...................................................................... 3 7 1. Doe Plaintiff 1 .......................................................................................................... 4 8 2. Doe Plaintiff 2 .......................................................................................................... 4 9 3. Doe Plaintiff 3 .......................................................................................................... 4 10 4. Doe Plaintiff 4 .......................................................................................................... 4 11 5. Doe Plaintiff 5 .......................................................................................................... 4 12 6. Doe Plaintiff 6 .......................................................................................................... 4 13 B. Defendants .............................................................................................................................. 5 14 1. Tencent America LLC ............................................................................................ 5 15 2. Tencent International Service Pte. Ltd. ............................................................... 5 16 IV. STATEMENT OF FACTS ............................................................................................................... 5 17 A. WeChat is the most popular and ubiquitous social media application in the global Chinese-speaking community and maintains an effective monopoly 18 on electronic communications in that community, including in California. ............. 5 19 B. WeChat is censored and surveilled in California. .......................................................... 8 20 C. WeChat’s censorship and surveillance practices in California harm California WeChat users in many ways. .......................................................................... 8 21 D. The challenged practices and provisions have inflicted significant harm on 22 Doe Plaintiffs. ...................................................................................................................... 10 23 1. Doe Plaintiff 1 ........................................................................................................ 10 24 2. Doe Plaintiff 2 ........................................................................................................ 12 25 3. Doe Plaintiff 3 ........................................................................................................ 13 26 4. Doe Plaintiff 4 ........................................................................................................ 15 27 5. Doe Plaintiff 5 ........................................................................................................ 16 i COMPLAINT FOR DAMAGES, DECLARATORY, AND INJUNCTIVE RELIEF 1 6. Doe Plaintiff 6 ........................................................................................................ 17 2 E. Researchers at The Citizen Lab have conducted experiments proving that California WeChat users’ communications are censored and surveilled, and 3 that WeChat uses those communications to “improve” WeChat’s censorship and surveillance apparatus. ................................................................................................ 17 4 F. A white-hat hacker has uncovered evidence that California WeChat user 5 data and communications are made available to the Party-state. .............................. 19 6 G. Tencent’s censorship and surveillance practices have negative emotional, psychological, and behavioral consequences on California WeChat users............. 22 7 H. Tencent broadly denies that the challenged practices occur. ..................................... 24 8 I. Tencent’s “WeChat Help Center” makes a slew of privacy-related 9 assurances. ............................................................................................................................ 25 10 J. WeChat’s privacy policy and terms of service exacerbate the harms associated with the challenged practices. ....................................................................... 26 11 1. WeChat’s privacy policy and terms of service are unclear as to 12 whether the challenged practices are permitted or prohibited. ..................... 26 13 2. WeChat’s terms of service relating to Tencent’s right to use California WeChat user data and communications to improve 14 WeChat’s offerings. .............................................................................................. 28 15 3. WeChat’s terms of service purport to require California WeChat users to give up a host of legal rights and remedies. ...................................... 28 16 4. WeChat’s terms of service purport to subject California WeChat 17 users who happen to be PRC citizens to even more onerous terms of service. ..................................................................................................................... 30 18 V. CPIFC HAS STANDING TO BRING THESE CLAIMS. ...................................................... 30 19 A. CPIFC’s mission is to help Chinese people defend their human rights and 20 to advance a peaceful transition to democracy in the PRC. ....................................... 30 21 B. Tencent’s policies and practices, including those challenged here, have significantly hampered CPIFC’s mission. ...................................................................... 31 22 1. WeChat’s censorship and surveillance practices and policies 23 frustrate CPIFC’s ability to communicate with Chinese people inside and outside the PRC. ................................................................................. 32 24 2. The personal experience of CPIFC’s founder is illustrative. ........................ 33 25 3. The challenged provisions also harm CPIFC. .................................................. 34 26 C. The requested relief would redress the harms experienced by CPIFC..................... 39 27 VI. CLASS ACTION ALLEGATIONS ............................................................................................. 41 ii COMPLAINT FOR DAMAGES, DECLARATORY, AND INJUNCTIVE RELIEF 1 VII. STATUTE OF LIMITATIONS ..................................................................................................... 43 2 VIII. CLAIMS FOR RELIEF ................................................................................................................... 43 3 COUNT I: Declaratory judgment that the challenged practices are unlawful and that the challenged provisions are unenforceable, and related injunctive 4 relief ....................................................................................................................................... 43 5 COUNT II: Violation of the right to privacy under the California constitution .................. 45 6 COUNT III: Violation of the right to free speech under the California constitution .......... 47 7 COUNT IV: Violation of the right to equal protection under the California constitution............................................................................................................................ 48 8 COUNT V: Intrusion upon seclusion ..........................................................................................
Recommended publications
  • The Velocity of Censorship
    The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions Tao Zhu, Independent Researcher; David Phipps, Bowdoin College; Adam Pridgen, Rice University; Jedidiah R. Crandall, University of New Mexico; Dan S. Wallach, Rice University This paper is included in the Proceedings of the 22nd USENIX Security Symposium. August 14–16, 2013 • Washington, D.C., USA ISBN 978-1-931971-03-4 Open access to the Proceedings of the 22nd USENIX Security Symposium is sponsored by USENIX The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions Tao Zhu David Phipps Adam Pridgen [email protected] Computer Science Computer Science Independent Researcher Bowdoin College Rice University Jedidiah R. Crandall Dan S. Wallach Computer Science Computer Science University of New Mexico Rice University Abstract terconnected through their social graph and tend to post about sensitive topics. This biases us towards the content Weibo and other popular Chinese microblogging sites are posted by these particular users, but enables us to mea- well known for exercising internal censorship, to comply sure with high fidelity the speed of the censorship and with Chinese government requirements. This research discern interesting patterns in censor behaviors. seeks to quantify the mechanisms of this censorship: Sina Weibo (weibo.com, referred to in this paper sim- how fast and how comprehensively posts are deleted. ply as “Weibo”) has the most active user community of Our analysis considered 2.38 million posts gathered over any microblog site in China [39]. Weibo provides ser- roughly two months in 2012, with our attention focused vices which are similar to Twitter, with @usernames, on repeatedly visiting “sensitive” users.
    [Show full text]
  • ALLE HSU [email protected]
    ALLE HSU [email protected] |1(949) 307-9239 (mobile) skype / wechat / instagram / twitter / tumblr: allehsu PROFILE Highly collaborative award-winning filmmaker with global production experience having produced films and projects in Singapore, Mexico, Prague, Hong Kong, Mainland China, Philippines, New York, NY, Utah, and LA/OC, CA. Excellent written and analytical skills. Strong ability to organize and motivate others in various kinds of projects. SELECTED PRODUCTION EXPERIENCE – FILMS Director/Producer Our Way Home 归程– Passion Project. James and Barbara are Chinese American siblings on their way home for the Thanksgiving holidays. They encounter racism in a diner on their way home, and are followed thereafter, thinking that it’s someone from the diner. Little do they know, it’s someone they know. 12m. Alexa Mini. Long Island, NY, 2017. Director/Producer POP! – NYU Tisch Thesis Film. Jennifer is a Chinese American woman in her mid-30s and is suffering from adult acne. She is still living at home with her Tiger-Mom mother, Pearl who coerces Jennifer into attending her Chinese New Year Banquet. 25m. Alexa Classic. Orange County, CA, 2016. In Post-Production. Director/Co-Writer/Producer/Editor Sophie – NYU Tisch Film. Sophie is abandoned by her mother and forced to come to terms with her new life and her grandmother in this poignant tale of a crucial moment in a young girls’s life. Official Selection / In Competition – Austin, Foyle, Bahamas, Fusion, Cleveland, Sarasota, LA Asian Pacific, Newport Beach. Next Director Award Shortlist. Awarded the NYU Tisch Asia Post-Production Award, Craft Awards in Acting and Cinematography.
    [Show full text]
  • Con-Scripting the Masses: False Documents and Historical Revisionism in the Americas
    University of Massachusetts Amherst ScholarWorks@UMass Amherst Open Access Dissertations 2-2011 Con-Scripting the Masses: False Documents and Historical Revisionism in the Americas Frans Weiser University of Massachusetts Amherst Follow this and additional works at: https://scholarworks.umass.edu/open_access_dissertations Part of the Comparative Literature Commons Recommended Citation Weiser, Frans, "Con-Scripting the Masses: False Documents and Historical Revisionism in the Americas" (2011). Open Access Dissertations. 347. https://scholarworks.umass.edu/open_access_dissertations/347 This Open Access Dissertation is brought to you for free and open access by ScholarWorks@UMass Amherst. It has been accepted for inclusion in Open Access Dissertations by an authorized administrator of ScholarWorks@UMass Amherst. For more information, please contact [email protected]. CON-SCRIPTING THE MASSES: FALSE DOCUMENTS AND HISTORICAL REVISIONISM IN THE AMERICAS A Dissertation Presented by FRANS-STEPHEN WEISER Submitted to the Graduate School of the University of Massachusetts Amherst in partial fulfillment Of the requirements for the degree of DOCTOR OF PHILOSOPHY February 2011 Program of Comparative Literature © Copyright 2011 by Frans-Stephen Weiser All Rights Reserved CON-SCRIPTING THE MASSES: FALSE DOCUMENTS AND HISTORICAL REVISIONISM IN THE AMERICAS A Dissertation Presented by FRANS-STEPHEN WEISER Approved as to style and content by: _______________________________________________ David Lenson, Chair _______________________________________________
    [Show full text]
  • Tencent and China Mobile's Dilemma
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by AIS Electronic Library (AISeL) Association for Information Systems AIS Electronic Library (AISeL) Pacific Asia Conference on Information Systems PACIS 2014 Proceedings (PACIS) 2014 FROM WECHAT TO WE FIGHT: TENCENT AND CHINA MOBILE’S DILEMMA Jun Wu School of Economics and Management, Beijing University of Posts and Telecommunications, [email protected] Qingqing Wan School of Economics and Management, Beijing University of Posts and Telecommunications, [email protected] Follow this and additional works at: http://aisel.aisnet.org/pacis2014 Recommended Citation Wu, Jun and Wan, Qingqing, "FROM WECHAT TO WE FIGHT: TENCENT AND CHINA MOBILE’S DILEMMA" (2014). PACIS 2014 Proceedings. 265. http://aisel.aisnet.org/pacis2014/265 This material is brought to you by the Pacific Asia Conference on Information Systems (PACIS) at AIS Electronic Library (AISeL). It has been accepted for inclusion in PACIS 2014 Proceedings by an authorized administrator of AIS Electronic Library (AISeL). For more information, please contact [email protected]. FROM WECHAT TO WE FIGHT: TENCENT AND CHINA MOBILE’S DILEMMA Jun Wu, School of Economics and Management, Beijing University of Posts and Telecommunications, Beijing, China, [email protected] Qingqing Wan, School of Economics and Management, Beijing University of Posts and Telecommunications, Beijing, China, [email protected] Abstract With the coming of mobile internet era, Giants in the different industry begin to compete face by face. This teaching case presents the event of charging for WeChat in China context to delineate the new challenges that Online Service Provider and Mobile Network Operator will face.
    [Show full text]
  • Digital Filtering in Saudi Arabia
    Opening Digital Borders Cautiously yet Decisively: Digital Filtering in Saudi Arabia Fatemah Alharbi Michalis Faloutsos Taibah University, Yanbu University of California, Riverside Nael Abu-Ghazaleh University of California, Riverside Abstract (a) traditional Internet filtering on websites; and (b) access to mobile applications. The study spans the period from March Our study makes a rare positive observation: Saudi Arabia 2018 to April 2020, with three separate measurements, one in has been opening its digital borders since 2017 in a delib- each calendar year. Our goal is to answer the three questions: erate new era towards openness. In this paper, we present a (a) “what content is filtered?", (b) “how is filtering imple- comprehensive longitudinal study of digital filtering, which mented?", and (c) “how does filtering evolve over time in we define to include both mobile apps and website access, response to geopolitical conditions?" in Saudi Arabia over a period of three years. Our results show that Saudi Arabia has indeed made significant progress We pursue a mutli-pronged strategy as follows. towards opening its digital borders: (a) the use of mobile 1. Quantification: What is filtered? We provide a fairly ex- applications has been significantly permitted; and (2) web ac- tensive study on the accessibility of both mobile apps and cess is becoming more open. We use: (a) 18 social media and websites from within Saudi Arabia and its evolution over communications mobile apps such as WhatsApp, Facetime, time. Our results show significant progress towards the open- and Skype; and (b) Alexa’s top 500 websites in 18 different ing of the country’s digital borders.
    [Show full text]
  • Running Head: FAKE NEWS AS a THREAT to the DEMOCRATIC MEDIA ENVIRONMENT
    Running head: FAKE NEWS AS A THREAT TO THE DEMOCRATIC MEDIA ENVIRONMENT Fake News as a Threat to the Democratic Media Environment: Past Conditions of Media Regulation and Their Contemporary Applicability to New Media in the United States of America and South Korea Jae Hyun Park Duke University FAKE NEWS AS A THREAT TO THE DEMOCRATIC MEDIA ENVIRONMENT 1 Abstract This study uses a comparative case study policy analysis to evaluate whether the media regulation standards that the governments of the United States of America and South Korea used in the past apply to fake news on social media and the Internet today. We first identify the shared conditions based on which the two governments intervened in the free press. Then, we examine media regulation laws regarding these conditions and review court cases in which they were utilized. In each section, we draw similarities and differences between the two governments’ courses of action. The comparative analysis will serve useful in the conclusion, where we assess the applicability of those conditions to fake news on new media platforms in each country and deliberate policy recommendations as well as policy flow between the two countries. Keywords: censorship, defamation, democracy, falsity, fairness, freedom of speech, ​ intention, journalistic truth, news manipulation, objectivity FAKE NEWS AS A THREAT TO THE DEMOCRATIC MEDIA ENVIRONMENT 2 Contents Introduction .................................................................................................................................... 4
    [Show full text]
  • Wechat About China's Tencent
    We Build Connections QQ Weixin For Enterprises: For Users: For Tencent: • Access to vast user base • Always connected • Deepen user stickiness via broadened • Unified user log-in enables CRM and • Enjoy a wide range of integrated social product offerings targeted advertising entertainment and content offerings, built • Increase traffic conversion through • Online payment facilitates transactions upon IPs and tech innovations transactions and advertising • Integrate capabilities across different • Access to rich mix of services and • Tap into new opportunities as the products to facilitate digital upgrades, e.g., transact at fingertips economy digitizes Weixin, WeChat Work, Tencent Meeting WeChat about 2 China’s Tencent Chris Wheldon, co-Portfolio Manager of the Magellan High Conviction strategy, and Ryan Joyce, co-Head of Magellan’s Technology team, explain why Tencent is a high-quality business, why the strategy invested in the company recently, what risks the investment poses and why Tencent performed well during the pandemic’s Chris Wheldon Ryan Joyce initial stages. Tencent is one of the High Conviction Q1. strategy’s top five positions. Can you please tell us about the company? A: Tencent was founded in 1998 as a Chinese instant-messaging service and web portal named QQ and subsequently built itself into a PC-based social network similar to today’s Facebook. In 2011, Tencent launched the WeChat mobile app, now China’s leading social “WeChat’s 1.2 network and communications platform and core to the company’s billion users average success. WeChat’s 1.2 billion users average nearly 100 minutes per day, every day, on the app.
    [Show full text]
  • Wechat-Mediated Simulation and the Learning of Business Chinese
    Wang, X and Wu, X 2020 WeChat-Mediated Simulation and the Learning of Business Chinese. Modern Languages Open, 2020(1): 42 pp. 1–13. DOI: https://doi.org/10.3828/mlo.v0i0.300 ARTICLE – DIGITAL MODERN LANGUAGES WeChat-Mediated Simulation and the Learning of Business Chinese Xuan Wang1 and Xiaoli Wu2 1 Cardiff University, GB 2 KU Leuven, BE Corresponding author: Xiaoli Wu ([email protected]) The purpose of this tutorial is to demonstrate social media engagement in higher- level language classrooms, using WeChat (a China-based free application with functions similar to WhatsApp or Messenger) as the digital medium. Originally designed for users in the Chinese market, WeChat is also available in English and increasingly used beyond China for both social and business communication, there- fore its use as demonstrated in this tutorial may also be applicable to the learning of other languages, or to inspire the use of similar digital tools in language learn- ing and teaching. This tutorial illustrates specifically how WeChat can facilitate the learning of language and culture for business in a Chinese context. It explores several modes of communication offered by WeChat, including one-to-one or group instant text messaging, voice messaging, voice or video call, document sharing, and online publication. These various functions are utilised in different stages of a business simulation game, and set up as pre-planned learning tasks. The tasks consist of specific, progressive activities and goals, such as drafting and pitch- ing a business plan, business consultation, market research and digital marketing. Accordingly, specific learning processes are generated: enabling the simulation of digital business communication (focusing on China in this case) through gamifica- tion; in doing so, it extends learning in the conventional classroom (‘here’ offline in Europe) and blends it with that in real-life interactions and business practices (‘there’ online in China).
    [Show full text]
  • Skype Basics
    Skype Basics: Instant Messaging can be used as a supplemental communication method to traditional emails and phone calls. Instant Messaging (or IM) is most useful for quick communications, either for a question that has a straightforward answer, or for a conversation that may not require a great deal of details. Winnefox receives Skype for Business as part of our Office365 subscription, and Winnefox staff have begun using it for IM messages; while Skype is more known for video calling, it can also send text-only messages, and has the benefit of being able to integrate with Outlook contacts, so that two separate user names do not need to be maintained. To set up Skype, log in to Office365 in a browser, using the URL https://portal.office.com; it will ask for the email address and password you use to log into Windows (if you do not use an email address to log into Windows, contact Pete Hodge). In the upper-left corner, click the “Office 365” link next to the grid, to bring you to the main landing page for Office365: On this page, go to the upper right side, to the “Install Office 365” link; beneath that, click on “Other Installs”. This brings up a page with all options for Office, including Skype for Business, on the left-hand side of the page. From the Skype for Business page, choose either “Skype for Business Basic (for Office 2016)” or “Skype for Business 2015”, depending on which is the same version as the other Office products installed on your computer.
    [Show full text]
  • Defence Handbook for Journalists and Bloggers 1
    DEFENCE HANDBOOK FOR JOURNALISTS AND BLOGGERS 1 DEFENCE HANDBOOK FOR JOURNALISTS AND BLOGGERS On freedom of expression and freedom of information principles in international law IN PARTNERSHIP WITH 2 DEFENCE HANDBOOK FOR JOURNALISTS AND BLOGGERS Front cover image: REUTERS: Stephane Mahe DEFENCE HANDBOOK FOR JOURNALISTS AND BLOGGERS 3 ACKNOWLEDGEMENTS This Handbook was conceived by Prisca Orsonneau, coordinator of the Legal Committee of Reporters Without Borders, Advocate and member of the Paris Bar. The project was managed by Prisca, and by Paul Coppin, Head of the Legal Desk of Reporters Without Borders. The Thomson Reuters Foundation and Reporters Without Borders are grateful to the international law firm, Paul Hastings LLP and the 70 lawyers from its various offices who researched and drafted this Handbook on a pro bono basis. Pierre Kirch, a litigation partner in the Paris and Brussels offices, headed the Paul Hastings team. Pierre benefited from advice and assistance - as the project began and then developed over a fifteen-month period - from the firm’s Global Pro Bono management team in Los Angeles: Jamie Broder and Tollie Besson (Partners) and Bronwen Young. Paul Hastings lawyers contributed more than 2,500 pro bono hours to the project. These contributors are acknowledged below and at the end of the Handbook. Amongst them, several assumed special roles as chief researchers/drafters of the five sections – involving many, many hours of work on researching and drafting by each of them individually. They deserve to be acknowledged
    [Show full text]
  • An Examination of Wechat: Predictors of News Use on a Closed Messaging Platform
    AN EXAMINATION OF WECHAT: PREDICTORS OF NEWS USE ON A CLOSED MESSAGING PLATFORM By Zhao Peng A THESIS Submitted to Michigan State University in partial fulfillment of the requirements for the degree of Journalism—Master of Arts 2017 ABSTRACT AN EXAMINATION OF WECHAT: PREDICTORS OF NEWS USE ON A CLOSED MESSAGING PLATFORM By Zhao Peng News use on social media channels enables users to actively select and read news based on their interest and needs. The present research studied news use behaviors on the closed-messag- ing platform WeChat. Concepts from the Unified Theory of Acceptance and Usage Model and Task-Tech Theory were used to test what perceptional and technological factors influence users’ WeChat news behaviors. Results showed that the perceived fitness between task and technology, effort expectancy, facilitating and social influence significantly related to Chinese students’ WeChat news use while performance expectancy did not predict news use behavior. Copyright by ZHAO PENG 2017 ACKNOWLEDGEMENTS I would like to express my appreciation to my entire thesis committee for the inspiring guidance, mentoring, and support throughout the completion of my thesis. Because of each of you, I can reach further than I ever expected. Professor Carpenter, I would like to particularly thank you for having been a wonderful mentor to me. I believe there is destined connection between you and me. When I was still in China, I was deeply impressed by your personality, expectation of students, and your favorite motto in your biography. When I attended your first class, you told us that the Quantitative Method course would make us cry.
    [Show full text]
  • An Empirical Study of the Forms of Exercising Censorship in the Daily Sudanese Political Newspapers
    An Empirical study of the Forms of Exercising Censorship in the Daily Sudanese Political Newspapers Haliema Mohammed Sulieman Altalib Abstract Forms of exercising censorship in the daily Sudanese political newspapers. An empirical study, from Jan 2017 to Jun 2017. The main objective to this study was identified forms of exercising censorship in the daily Sudanese political newspapers that may limit the freedom in the vocational work of Sudanese journalists in the political news sections. The descriptive method is used to describe the situation and analyze the results. Observation and questionnaire were used as tools of this study. 340 samples were chosen from journalists working in the Sudanese newspaper institutions, representing intended sample from field study community. The results were: censorship is applied in the Sudan’s newspapers; self-censorship topped the forms of censorship, the importance of censorship exercised by the editor-in- chief, and the journalists participating in the questionnaire stated that the importance of censorship is for refrain them from committing breaches. Keyword: censorship, forms of censorship, political newspapers, journalists Published Date: 10/31/2017 Page.65-84 Vol 5 No 10 2017 Link: http://ijier.net/ijier/article/view/828 International Journal for Innovation Education and Research www.ijier.net Vol:-5 No-10, 2017 An Empirical study of the Forms of Exercising Censorship in the Daily Sudanese Political Newspapers Haliema Mohammed Sulieman Altalib Dep. of Communication and Information Technology, Imam Abdurrahman Bin Faisal University (Previously University of Dammam) Dammam City, Kingdom of Saudi Arabia Abstract Forms of exercising censorship in the daily Sudanese political newspapers. An empirical study, from Jan 2017 to Jun 2017.
    [Show full text]