A Framework for Understanding Social Media Trends in China
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Uila Supported Apps
Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage. -
A Survey Study on Uses and Gratification of Social Networking Sites in China
A Survey Study on Uses and Gratification of Social Networking Sites in China A thesis presented to the faculty of the Scripps College of Communication of Ohio University In partial fulfillment of the requirements for the degree Master of Science Yacong Yuan June 2011 © 2011 Yacong Yuan. All Rights Reserved. This thesis titled A Survey Study on Uses and Gratifications of Social Networking Sites in China by YACONG YUAN has been approved for the E. W. Scripps School of Journalism and the Scripps College of Communication by Hugh J. Martin Associate Professor of Journalism Gregory J. Shepherd Dean, Scripps College of Communication ii ABSTRACT YUAN, YACONG, M.S., June 2011, Journalism A Survey Study on Uses and Gratifications of Social Networking Sites in China Director of Thesis: Hugh J. Martin This study is a test of the uses and gratifications theory on Social Networking Sites in China. An online survey of 353 subjects on two major SNS in China showed socio-integrative needs were the strongest motivation for all users who participated in SNS. However, some gender differences were also found. Males were more interested in finding news than female users. Males were also more likely than females to talk about their problems. Female users were more likely than males to facilitate social interactions on SNS. Other results showed low frequency SNS users participated in more activities than high frequency users. The number of friends each user had was not significantly associated with participation in different activities. Approved: _____________________________________________________________ Hugh J. Martin Associate Professor of Journalism iii ACKNOWLEDGMENTS I would like to express special gratitude to my thesis chair, Professor Hugh J. -
Trapped in a Virtual Cage: Chinese State Repression of Uyghurs Online
Trapped in a Virtual Cage: Chinese State Repression of Uyghurs Online Table of Contents I. Executive Summary..................................................................................................................... 2 II. Methodology .............................................................................................................................. 5 III. Background............................................................................................................................... 6 IV. Legislation .............................................................................................................................. 17 V. Ten Month Shutdown............................................................................................................... 33 VI. Detentions............................................................................................................................... 44 VII. Online Freedom for Uyghurs Before and After the Shutdown ............................................ 61 VIII. Recommendations................................................................................................................ 84 IX. Acknowledgements................................................................................................................. 88 Cover image: Composite of 9 Uyghurs imprisoned for their online activity assembled by the Uyghur Human Rights Project. Image credits: Top left: Memetjan Abdullah, courtesy of Radio Free Asia Top center: Mehbube Ablesh, courtesy of -
International Guide to Social Media China
International Guide to Social Media China Overview “China’s famous one-child policy More than one in five internet users are Chinese. The nation’s has resulted in youngsters looking for the companionship of others 500 million internet users are just behind Japan on time their own age online” spent online per day at an average of 2.7 hours. Internet connectivity is not expected to reach the majority of the one billion strong population until 2015. In this report: Although China blocks western social networks, domestic • China’s most popular Social Media sites • Video sites & Location-based apps social networking sites are immensely popular. Half of • Influencers in Chinese Social Media internet users are on more than one domestic social network • Chinese Language & Culture • Online Censorship and 30 per cent log on to at least one network every day. China blocks foreign social networking sites, and censors In this series: posts on domestic social networks, yet social networking remains hugely popular amongst young urbanites. • United States • Mexico • India China’s famous one child policy has resulted in youngsters • Brazil • Latin America looking for the companionship of others their own age online. • Scandinavia This combined with the general mistrust of government- • France • Germany controlled media has resulted in social networking becoming the quickest, cheapest and most trusted way to communicate Further reports due Q3 2012 over long distances. International Guide to Social Media China Social Networks China has a thriving social networking scene with dozens of popular networks. QZone is currently the most popular social networking site used in China. -
WIC Template 13/9/16 11:52 Am Page IFC1
In a little over 35 years China’s economy has been transformed Week in China from an inefficient backwater to the second largest in the world. If you want to understand how that happened, you need to understand the people who helped reshape the Chinese business landscape. china’s tycoons China’s Tycoons is a book about highly successful Chinese profiles of entrepreneurs. In 150 easy-to- digest profiles, we tell their stories: where they came from, how they started, the big break that earned them their first millions, and why they came to dominate their industries and make billions. These are tales of entrepreneurship, risk-taking and hard work that differ greatly from anything you’ll top business have read before. 150 leaders fourth Edition Week in China “THIS IS STILL THE ASIAN CENTURY AND CHINA IS STILL THE KEY PLAYER.” Peter Wong – Deputy Chairman and Chief Executive, Asia-Pacific, HSBC Does your bank really understand China Growth? With over 150 years of on-the-ground experience, HSBC has the depth of knowledge and expertise to help your business realise the opportunity. Tap into China’s potential at www.hsbc.com/rmb Issued by HSBC Holdings plc. Cyan 611469_6006571 HSBC 280.00 x 170.00 mm Magenta Yellow HSBC RMB Press Ads 280.00 x 170.00 mm Black xpath_unresolved Tom Fryer 16/06/2016 18:41 [email protected] ${Market} ${Revision Number} 0 Title Page.qxp_Layout 1 13/9/16 6:36 pm Page 1 china’s tycoons profiles of 150top business leaders fourth Edition Week in China 0 Welcome Note.FIN.qxp_Layout 1 13/9/16 3:10 pm Page 2 Week in China China’s Tycoons Foreword By Stuart Gulliver, Group Chief Executive, HSBC Holdings alking around the streets of Chengdu on a balmy evening in the mid-1980s, it quickly became apparent that the people of this city had an energy and drive Wthat jarred with the West’s perception of work and life in China. -
Weibo's Role in Shaping Public Opinion and Political
Blekinge Institute of Technology School of Computing Department of Technology and Aesthetics WEIBO’S ROLE IN SHAPING PUBLIC OPINION AND POLITICAL PARTICIPATION IN CHINA Shajin Chen 2014 BACHELOR THESIS B.S. in Digital Culture Supervisor: Maria Engberg Chen 1 Table of Contents 1. INTRODUCTION .............................................................................................................2 2. INTERNET AND MICROBLOGGING IN CHINA ......................................................5 2.1 INTERNET, MEDIA AND POLITICAL LANDSCAPE IN CHINA: AN OVERVIEW .......................... 5 2.2 MICROBLOGGING AND CHINESE WEIBO .........................................................................7 2.3 SINA WEIBO: THE KING OF MICROBLOGGING IN CHINA ................................................... 8 3. DOMINANT FEATURES OF WEIBO IN SHAPING PUBLIC OPINION AND POLITICAL SPHERE ........................................................................................................10 3.1 INFORMATION DIFFUSION ............................................................................................11 3.2 OPINION LEADERS AND VERIFIED IDENTITY ..................................................................12 3.3 PLATFORM FOR FREE SPEECH, COLLECTIVE VOICE AND EXPOSURE ................................. 14 3.4 PARTICIPATION OF MASS MEDIA AND GOVERNMENT ......................................................15 4. CASE STUDIES ..............................................................................................................18 4.1 -
Social Media Contracts in the US and China
DESTINED TO COLLIDE? SOCIAL MEDIA CONTRACTS IN THE U.S. AND CHINA* MICHAEL L. RUSTAD** WENZHUO LIU*** THOMAS H. KOENIG**** * We greatly appreciate the editorial and research aid of Suffolk University Law School research assistants: Melissa Y. Chen, Jeremy Kennelly, Christina Kim, Nicole A. Maruzzi, and Elmira Cancan Zenger. We would also like to thank the editors at the University of Pennsylvania Journal of International Law. ** Michael Rustad is the Thomas F. Lambert Jr. Professor of Law, which was the first endowed chair at Suffolk University Law School. He is the Co-Director of Suffolk’s Intellectual Property Law Concentration and was the 2011 chair of the American Association of Law Schools Torts & Compensation Systems Section. Pro- fessor Rustad has more than 1100 citations on Westlaw. His most recent books are SOFTWARE LICENSING: PRINCIPLES AND PRACTICAL STRATEGIES (Lexis/Nexis, 3rd ed. forthcoming 2016), GLOBAL INTERNET LAW IN A NUTSHELL (3rd ed., West Academic Publishers, 2015), and GLOBAL INTERNET LAW (HORNBOOK SERIES) (West Academic Publishers, 2d ed. 2015). Professor Rustad is editor of COMPUTER CONTRACTS (2015 release), a five volume treatise published by Matthew Bender. *** Wenzhuo Liu, LL.B., LL.M, J.D., obtained China’s Legal Professional Qual- ification Certificate in 2011. In 2014, she became a member of the New York state bar. She earned an LL.M degree from the University of Wisconsin Law School in Madison, Wisconsin in 2012 and a J.D. degree from Suffolk University Law School in Boston. She was associated with Hunan Haichuan Law Firm in Changsha, China. Ms. Liu wrote a practice pointer on Software Licensing and Doing Business in China in the second and third editions of MICHAEL L. -
Clickstream Analysis for Sybil Detection
You Are How You Click Clickstream Analysis for Sybil Detection Gang Wang, Tristan Konolige, Christo Wilson†, Xiao Wang‡ Haitao Zheng and Ben Y. Zhao UC Santa Barbara †Northeastern University ‡Renren Inc. Sybils in Online Social Networks • Sybil (sɪbəl): fake identities controlled by attackers – Friendship is a pre-cursor to other malicious activities – Does not include benign fakes (secondary accounts) 20 Mutual Friends • Large Sybil populations* 14.3 Million Sybils (August, 2012) 20 Million Sybils (April, 2013) 2 *Numbers from CNN 2012, NYT 2013 Sybil Attack: a Serious Threat Malicious URL • Social spam – Advertisement, malware, phishing • Steal user information Taliban uses sexy Facebook profiles to lure troops into giving away military secrets" • Sybil-based political lobbying efforts 3 Sybil Defense: Cat-and-Mouse Game Social Networks A>ackers Stop automated account creation Crowdsourcing CAPTCHA solving •! CAPTCHA •! [USENIX’10] Detect suspicious profiles Realistic profile generation •! Spam features, URL blacklists •! Complete bio info, profile pic •! User report [WWW’12] Detect Sybil communities •! [SIGCOMM’06], [Oakland’08], [NDSS’09], [NSDI’12] 4 Graph-based Sybil Detectors •! A key assumption Sybil Real –! Sybils have difficulty “friending” normal users –! Sybils form tight-knit communities Is This True? •! Measuring Sybils in Renren social network [IMC’11] –! Ground-truth 560K Sybils collected over 3 years –! Most Sybils befriend real users, integrate into real-user communities –! Most Sybils don’t befriend other Sybils Sybils Don’t neeD to form communiGes! 5 Sybil Detection Without Graphs •! Sybil detection with static profiles analysis [NDSS’13] –! Leverage human intuition to detect fake profiles (crowdsourcing) –! Successful user-study shows it scales well with high accuracy •! Profile-based detection has limitations –! Some profiles are easy to mimic (e.g. -
The Relationship Between Local Content, Internet Development and Access Prices
THE RELATIONSHIP BETWEEN LOCAL CONTENT, INTERNET DEVELOPMENT AND ACCESS PRICES This research is the result of collaboration in 2011 between the Internet Society (ISOC), the Organisation for Economic Co-operation and Development (OECD) and the United Nations Educational, Scientific and Cultural Organization (UNESCO). The first findings of the research were presented at the sixth annual meeting of the Internet Governance Forum (IGF) that was held in Nairobi, Kenya on 27-30 September 2011. The views expressed in this presentation are those of the authors and do not necessarily reflect the opinions of ISOC, the OECD or UNESCO, or their respective membership. FOREWORD This report was prepared by a team from the OECD's Information Economy Unit of the Information, Communications and Consumer Policy Division within the Directorate for Science, Technology and Industry. The contributing authors were Chris Bruegge, Kayoko Ido, Taylor Reynolds, Cristina Serra- Vallejo, Piotr Stryszowski and Rudolf Van Der Berg. The case studies were drafted by Laura Recuero Virto of the OECD Development Centre with editing by Elizabeth Nash and Vanda Legrandgerard. The work benefitted from significant guidance and constructive comments from ISOC and UNESCO. The authors would particularly like to thank Dawit Bekele, Constance Bommelaer, Bill Graham and Michuki Mwangi from ISOC and Jānis Kārkliņš, Boyan Radoykov and Irmgarda Kasinskaite-Buddeberg from UNESCO for their work and guidance on the project. The report relies heavily on data for many of its conclusions and the authors would like to thank Alex Kozak, Betsy Masiello and Derek Slater from Google, Geoff Huston from APNIC, Telegeography (Primetrica, Inc) and Karine Perset from the OECD for data that was used in the report. -
Chapter Iv Strategy Analysis
CHAPTER IV STRATEGY ANALYSIS 4.1 Marketing Mix 4.1.1 Products Through the multiple Internet platforms in China, Tencent offers diversified services which include QQ, Weixin or Wechat for communications; Qzone for social networking; QQ Game platform for online games; QQ.com for information; Soso for search engine; Paipai and Tenpay for ecommerce transaction. The company’s business scope mainly covers four ereas: Internet value-add service (IVAS), mobile and telecommunication value-add services (MVAS), online advertising and e-Commerce transactions, to meet the various needs of Internet users including communication, information, entertainment, ecommerce and others. 4.1.2 Price Table 4. 1 Tencent major products and services’ usage fees Usage fee Communications QQ Free Weixin/Wechat Free Value-Added Services (VAS) a) Social Networks QQ Membership RMB 10 per month Super QQ Membership RMB 20 per month 26 Qzone Free; monthly subscription fee for VIP privileges (RMB10); and items sales from apps on open platform Tencent Microblog Free; monthly subscription fee for VIP privileges (RMB10); QQ Show (Avatars) Free; Monthly subscription fee for VIP privileges (RMB10); or item sales QQ Music Free; Monthly subscription fee for VIP privileges (RMB10); or item sale QQ mail Free Mobile VAS Monthly subscription fee for VIP privileges (RMB5-15); or item sales (RMB1- 2 per item) b) Online Games QQ Game Platform Monthly subscription fee for VIP privileges (RMB10-15) or item sales ACGs Monthly subscription fee for VIP privileges (RMB10-30) or item sales MMOGs Monthly subscription fee for VIP privileges (RMB20) or item sales; Time-based Mobile Games Monthly subscription fee for VIP privileges (RMB10) or item sales c) eCommerce Paipai.com Free Tenpay Free Online Advertising Brand display Inventories on QQ.com and verticals; online video platform; QQ IM, Mobile Browser etc; Pricing mainly by cost per time (CPT) or cost per day(CPD). -
Character Encoding Issues for Web Passwords
and ÆÆÆ码码码 ,סיסמאות! ˜,Of contrasenas Character encoding issues for web passwords Joseph Bonneau Rubin Xu Computer Laboratory Computer Laboratory University of Cambridge University of Cambridge [email protected] [email protected] Abstract—Password authentication remains ubiquitous on of that wording. This process is prone to failure and usability the web, primarily because of its low cost and compatibility studies suggest that a significant number of users will be un- with any device which allows a user to input text. Yet text is not able to use a password they remember conceptually because universal. Computers must use a character encoding system to convert human-comprehensible writing into bits. We examine they cannot reproduce the precise representation [33]. for the first time the lingering effects of character encoding A further conversion must take place to convert the on the password ecosystem. We report a number of bugs at abstract concept of “text” into a sequence of bits suitable large websites which reveal that non-ASCII passwords are often for computer manipulation. For example, the letter m at the poorly supported, even by websites otherwise correctly sup- beginning of the password above is commonly represented porting the recommended Unicode/UTF-8 character encoding system. We also study user behaviour through several leaked using the eight bits 01101101. This process is known as data sets of passwords chosen by English, Chinese, Hebrew character encoding and, despite decades of work towards and Spanish speakers as case studies. Our findings suggest a universal standard, there remain dozens of schemes in that most users still actively avoid using characters outside of widespread use to map characters into sequences of bits. -
Sybil in Online Social Networks (Osns)
Sybil In Online Social Networks (OSNs) 1 Sybil (sɪbəl): fake identities controlled by attackers Friendship is a pre-cursor to other malicious activities Does not include benign fakes (secondary accounts) Research has identified malicious Sybils on OSNs Twitter [CCS 2010] Facebook [IMC 2010] Renren [IMC 2011], Tuenti [NSDI 2012] Real-world Impact of Sybil (Twitter) 2 900K 4,000 new July 21st followers/day800K Followers Followers 700K 100,000 new Jul-4 Jul-8 Jul-12 Jul-16 Jul-20followers Jul-24 Jul-28 in 1Aug-1 day Russian political protests on Twitter (2011) 25,000 Sybils sent 440,000 tweets Drown out the genuine tweets from protesters Security Threats of Sybil (Facebook) 3 Large Sybil population on Facebook August 2012: 83 million (8.7%) Sybils are used to: Share or Send Spam Malicious URL Theft of user’s personal information Fake like and click fraud 50 likes per dollar Community-based Sybil Detectors 4 Prior work on Sybil detectors SybilGuard [SIGCOMM’06], SybilLimit [Oakland '08], SybilInfer [NDSS’09] Key assumption: Sybils form tight-knit communities Sybils have difficulty “friending” normal users? Do Sybils Form Sybil Communities? 5 Measurement study on Sybils in the wild [IMC’11] Study Sybils in Renren (Chinese Facebook) Ground-truth data on 560K Sybils collected over 3 years Sybil components: sub-graphs of connected Sybils 10000 1000 100 Edges To To Edges 10 Sybil Normal Users 1components are internally sparse Not amenable1 10 to community100 1000 detection 10000 New Sybil detectionEdges Between system Sybils is needed Detect Sybils without Graphs 6 Anecdotal evidence that people can spot Sybil profiles 75% of friend requests from Sybils are rejected Human intuition detects even slight inconsistencies in Sybil profiles Idea: build a crowdsourced Sybil detector Focus on user profiles Leverage human intelligence and intuition Open Questions How accurate are users? What factors affect detection accuracy? How can we make crowdsourced Sybil detection cost effective? 7 Outline .