Neural Network Prediction of Censorable Language

Total Page:16

File Type:pdf, Size:1020Kb

Neural Network Prediction of Censorable Language Neural Network Prediction of Censorable Language Kei Yin Ng Anna Feldman Jing Peng Chris Leberknight Montclair State University Montclair, New Jersey, USA fngk2,feldmana,pengj,[email protected] Abstract nearly 30% of them are censored within 5–30 min- utes, and nearly 90% within 24 hours (Zhu et al., Internet censorship imposes restrictions on 2013).Research shows that some of the censorship what information can be publicized or viewed on the Internet. According to Freedom decisions are not necessarily driven by the crit- House’s annual Freedom on the Net report, icism of the state (King et al., 2013), the pres- more than half the world’s Internet users now ence of controversial topics (Ng et al., 2018a,b), live in a place where the Internet is censored or posts that describe negative events. Rather, cen- or restricted. China has built the world’s most sorship is triggered by other factors, such as for ex- extensive and sophisticated online censorship ample, the collective action potential (King et al., system. In this paper, we describe a new cor- 2013). The goal of this paper is to compare cen- pus of censored and uncensored social me- dia tweets from a Chinese microblogging web- sored and uncensored posts that contain the same site, Sina Weibo, collected by tracking posts sensitive keywords and topics. Using the linguis- that mention ‘sensitive’ topics or authored by tic features extracted, a neural network model is ‘sensitive’ users. We use this corpus to build built to explore whether censorship decision can a neural network classifier to predict censor- be deduced from the linguistic characteristics of ship. Our model performs with a 88.50% ac- the posts. curacy using only linguistic features. We dis- cuss these features in detail and hypothesize 2 Previous Work that they could potentially be used for censor- ship circumvention. There have been significant efforts to develop strategies to detect and evade censorship. Most 1 Introduction work, however, focuses on exploiting technolog- Free flow of information is absolutely necessary ical limitations with existing routing protocols for any democratic society. Unfortunately, polit- (Leberknight et al., 2012; Katti et al., 2005; Levin ical censorship exists in many countries, whose et al., 2015; McPherson et al., 2016; Weinberg governments attempt to conceal or manipulate in- et al., 2012). Research that pays more atten- formation to make sure their citizens are unable to tion to linguistic properties of online censorship read or express views that are contrary to those in in the context of censorship evasion include, for power. One such example is Sina Weibo, a Chi- example, Safaka et al. (2016) who apply lin- nese microblogging website. It was launched in guistic steganography to circumvent censorship. 2009 and became the most popular social media Lee (2016) uses parodic satire to bypass censor- platform in China. Sina Weibo has over 431 mil- ship in China and claims that this stylistic de- lion monthly active users1. In cooperation with vice delays and often evades censorship. Hirun- the ruling regime, Weibo sets strict control over charoenvate et al. (2015) show that the use of ho- the content published under its service. Accord- mophones of censored keywords on Sina Weibo ing to Zhu et al. (2013), Weibo uses a variety of could help extend the time a Weibo post could re- strategies to target censorable posts, ranging from main available online. All these methods rely on keyword list filtering to individual user monitor- a significant amount of human effort to interpret ing. Among all posts that are eventually censored, and annotate texts to evaluate the likeliness of cen- sorship, which might not be practical to carry out 1https://www.investors. com/news/technology/ for common Internet users in real life. There has weibo-reports-first-quarter-earnings/ also been research that uses linguistic and content 40 Proceedings of the Third Workshop on Natural Language Processing and Computational Social Science, pages 40–46 Minneapolis, Minnesota, June 6, 2019. c 2019 Association for Computational Linguistics clues to detect censorship. Knockel et al. (2015) “permission denied” (system-deleted), whereas a and Zhu et al. (2013) propose detection mecha- user-removed post returns an error message of “the nisms to categorize censored content and automat- post does not exist” (user-deleted). However, since ically learn keywords that get censored. King et the Topic Timeline (the data source of our web al. (2013) in turn study the relationship between scraper) can be accessed only on the front-end (i.e. political criticism and chance of censorship. They there is no API endpoint associated with it), we come to the conclusion that posts that have a Col- rely on both the front-end and the API to identify lective Action Potential get deleted by the cen- system- and user-deleted posts. It is not possible sors even if they support the state. Bamman et to distinguish the two types of deletion by directly al. (2012) uncover a set of politically sensitive key- querying the unique ID of all scraped posts be- words and find that the presence of some of them cause, through empirical experimentation, uncen- in a Weibo blogpost contribute to higher chance sored posts and censored (system-deleted) posts of the post being censored. Ng et al. (2018b) both return the same error message – “permis- also target a set of topics that have been suggested sion denied”). Therefore, we need to first check to be sensitive, but unlike Bamman et al. (2012), if a post still exists on the front-end, and then they cover areas not limited to politics. Ng et send an API request using the unique ID of post al. (2018b) investigate how the textual content as that no longer exists to determine whether it has a whole might be relevant to censorship decisions been deleted by the system or the user. The steps when both the censored and uncensored blogposts to identify censorship status of each post are il- include the same sensitive keyword(s). lustrated in Figure1. First, we check whether a scraped post is still available through visiting the 3 Tracking Censorship user interface of each post. This is carried out au- tomatically in a headless browser 2 days after a Tracking censorship topics on Weibo is a challeng- post is published. If a post has been removed (ei- ing task due to the transient nature of censored ther by system or by user), the headless browser posts and the scarcity of censored data from well- is redirected to an interface that says “the page known sources such as FreeWeibo2 and Weibo- doesn’t exist”; otherwise, the browser brings us to Scope3. The most straightforward way to collect the original interface that displays the post con- data from a social media platform is to make use of tent. Next, after 14 days, we use the same meth- its API. However, Weibo imposes various restric- ods in step 1 to check the posts’ status again. This tions on the use of its API4 such as restricted ac- step allows our dataset to include posts that have cess to certain endpoints and restricted number of been removed at a later stage. Finally, we send a posts returned per request. Above all, Weibo API follow-up API query using the unique ID of posts does not provide any endpoint that allows easy and that no longer exist on the browser in step 1 and efficient collection of the target data (posts that step 2 to determine censorship status using the contain sensitive keywords) of this paper. There- same decoding techniques proposed by Zhu et al. fore, an alternative method is needed to track cen- as described above (2013). Altogether, around 41 sorship for our purpose. thousand posts are collected, in which 952 posts 4 Data Collection (2.28%) are censored by Weibo. 4.1 Web Scraping topic censored uncensored cultural revolution 55 66 4.2 Decoding Censorship human rights 53 71 According to Zhu et al. (2013), the unique ID of family planning 14 28 censorship & propaganda 32 56 a Weibo post is the key to distinguish whether a democracy 119 107 post has been censored by Weibo or has been in- patriotism 70 105 stead removed by the author himself. If a post China 186 194 has been censored by Weibo, querying its unique Trump 320 244 ID through the API returns an error message of Meng Wanzhou 55 76 kindergarten abuse 48 5 2https://freeweibo.com/ Total 952 952 3http://weiboscope.jmsc.hku.hk/ 4https://open.weibo.com/wiki/API文c/en Table 1: Data collected by scraper for classification 41 Figure 1: Logical flow to determine censorship status 4.3 Pre-existing Corpus topic censored uncensored cultural revolution 19 29 human rights 16 10 Zhu et al. (2013) collected over 2 million posts family planning 4 4 published by a set of around 3,500 sensitive users censorship & propaganda 47 38 during a 2-month period in 2012. We extract democracy 94 53 around 20 thousand text-only posts using 64 key- patriotism 46 30 words across 26 topics (which partially overlap China 300 458 Bo Xilai 8 8 with those of scraped data, see Table3) and fil- brainwashing 57 3 ter all duplicates. Among the extracted posts, emigration 10 11 930 (4.63%) are censored by Weibo as verified by June 4th 2 5 Zhu et al. (2013) The extracted data from Zhu et food & env. safety 14 17 al.(2013)’s are also used in building classification wealth inequality 2 4 protest & revolution 4 5 models. stability maintenance 66 28 political reform 12 9 territorial dispute 73 75 dataset N H features accuracy baseline 49.98 Dalai Lama 2 2 human baseline (Ng et al., 2018b) 63.51 HK/TW/XJ issues 2 4 scraped 500 50,50,50 Seed 1 80.36 political dissidents 2 2 scraped 800 60,60,60 Seed 1 80.2 Obama 8 19 Zhu et al’s 800 50,7 Seed 1 87.63 USA 62 59 Zhu et al’s 800 30,30 Seed 1 86.18 communist party 37 10 both 800 60,60,60 Seed 1 75.4 freedom 12 11 both 500 50,50,50 Seed 1 73.94 economic issues 31 37 scraped 800 30,30,30 all except LIWC 72.95 Total 930 930 Zhu et al’s 800 60,60,60 all except LIWC 70.64 both 500 40,40,40 all except LIWC 84.67 Table 3: Data extracted from Zhu et al.
Recommended publications
  • Trapped in a Virtual Cage: Chinese State Repression of Uyghurs Online
    Trapped in a Virtual Cage: Chinese State Repression of Uyghurs Online Table of Contents I. Executive Summary..................................................................................................................... 2 II. Methodology .............................................................................................................................. 5 III. Background............................................................................................................................... 6 IV. Legislation .............................................................................................................................. 17 V. Ten Month Shutdown............................................................................................................... 33 VI. Detentions............................................................................................................................... 44 VII. Online Freedom for Uyghurs Before and After the Shutdown ............................................ 61 VIII. Recommendations................................................................................................................ 84 IX. Acknowledgements................................................................................................................. 88 Cover image: Composite of 9 Uyghurs imprisoned for their online activity assembled by the Uyghur Human Rights Project. Image credits: Top left: Memetjan Abdullah, courtesy of Radio Free Asia Top center: Mehbube Ablesh, courtesy of
    [Show full text]
  • The Versatility of Microblogging
    www.spireresearch.com Side Click: The versatility of microblogging Microblogging is well-established globally as a way of keeping in touch with others about events occurring in their lives in real-time. Popular microblogging sites include Twitter in the U.S., Tencent QQ in China and Me2day in South Korea. Twitter has 140 million active users1, while China’s Tencent QQ has a staggering 721 million active user accounts2, ranking only behind Facebook in terms of being the most used social networking service worldwide. Microblogging allows users to combine blogging and instant messaging to post short messages on their profiles3; including small and conversational talk, self-promotion, spam and news 4 . On a deeper level, microblogging has altered the way people consume and generate information – not only democratizing the broadcasting of information but also enabling it to be done in real-time. Connecting to stakeholders There are several benefits to integrating microblogging into a business’s regular stakeholder communication regime. Consumers who “follow” a company’s products or services would be the first to know of any promotions. The company also benefits through obtaining prompt feedback and suggestions for improvement. A concerned investor 1 Twitter turns six, Twitter Blog, 21 March 21 2012 2 QQ Continues to Dominate Instant Messaging in China, eMarketer Inc., 27 April 2012 3 An Insight Into Microblogging Trends And Toolbars, ArticlesXpert,21 January 2012 4 Twitter Study – August 2009, PearAnalytics.com, August 2009 © 2012 Spire Research and Consulting Pte Ltd would want to be the first to know of any important news which might impact her returns.
    [Show full text]
  • Developments in China's Military Force Projection and Expeditionary Capabilities
    DEVELOPMENTS IN CHINA'S MILITARY FORCE PROJECTION AND EXPEDITIONARY CAPABILITIES HEARING BEFORE THE U.S.-CHINA ECONOMIC AND SECURITY REVIEW COMMISSION ONE HUNDRED FOURTEENTH CONGRESS SECOND SESSION THURSDAY, JANUARY 21, 2016 Printed for use of the United States-China Economic and Security Review Commission Available via the World Wide Web: www.uscc.gov UNITED STATES-CHINA ECONOMIC AND SECURITY REVIEW COMMISSION WASHINGTON: 2016 ii U.S.-CHINA ECONOMIC AND SECURITY REVIEW COMMISSION HON. DENNIS C. SHEA, Chairman CAROLYN BARTHOLOMEW, Vice Chairman Commissioners: PETER BROOKES HON. JAMES TALENT ROBIN CLEVELAND DR. KATHERINE C. TOB IN HON. BYRON L. DORGAN MICHAEL R. WESSEL JEFFREY L. FIEDLER DR. LARRY M. WORTZEL HON. CARTE P. GOODWIN MICHAEL R. DANIS, Executive Director The Commission was created on October 30, 2000 by the Floyd D. Spence National Defense Authorization Act for 2001 § 1238, Public Law No. 106-398, 114 STAT. 1654A-334 (2000) (codified at 22 U.S.C. § 7002 (2001), as amended by the Treasury and General Government Appropriations Act for 2002 § 645 (regarding employment status of staff) & § 648 (regarding changing annual report due date from March to June), Public Law No. 107-67, 115 STAT. 514 (Nov. 12, 2001); as amended by Division P of the “Consolidated Appropriations Resolution, 2003,” Pub L. No. 108-7 (Feb. 20, 2003) (regarding Commission name change, terms of Commissioners, and responsibilities of the Commission); as amended by Public Law No. 109- 108 (H.R. 2862) (Nov. 22, 2005) (regarding responsibilities of Commission and applicability of FACA); as amended by Division J of the “Consolidated Appropriations Act, 2008,” Public Law Nol.
    [Show full text]
  • The Limits of Commercialized Censorship in China
    The Limits of Commercialized Censorship in China Blake Miller∗ September 27, 2018 Abstract Despite massive investment in China's censorship program, internet platforms in China are rife with criticisms of the government and content that seeks to organize opposition to the ruling Communist Party. Past works have attributed this \open- ness" to deliberate government strategy or lack of capacity. Most, however, do not consider the role of private social media companies, to whom the state delegates information controls. I suggest that the apparent incompleteness of censorship is largely a result of principal-agent problems that arise due to misaligned incentives of government principals and private media company agents. Using a custom dataset of annotated leaked documents from a social media company, Sina Weibo, I find that 16% of directives from the government are disobeyed by Sina Weibo and that disobedience is driven by Sina's concerns about censoring more strictly than com- petitor Tencent. I also find that the fragmentation inherent in the Chinese political system exacerbates this principal agent problem. I demonstrate this by retrieving actual censored content from large databases of hundreds of millions of Sina Weibo posts and measuring the performance of Sina Weibo's censorship employees across a range of events. This paper contributes to our understanding of media control in China by uncovering how market competition can lead media companies to push back against state directives and increase space for counterhegemonic discourse. ∗Postdoctoral Fellow, Program in Quantitative Social Science, Dartmouth College, Silsby Hall, Hanover, NH 03755 (E-mail: [email protected]). 1 Introduction Why do scathing criticisms, allegations of government corruption, and content about collective action make it past the censors in China? Past works have theorized that regime strategies or state-society conflicts are the reason for incomplete censorship.
    [Show full text]
  • Statistical Data Mining for Sina Weibo, a Chinese Micro-Blog: Sentiment Modelling and Randomness Reduction for Topic Modelling
    Statistical Data Mining for Sina Weibo, a Chinese Micro-blog: Sentiment Modelling and Randomness Reduction for Topic Modelling London School of Economics and Political Sciences Wenqian Cheng A thesis submitted to the Department of Statistics of the London School of Economics for the degree of Doctor of Philosophy, London, March 2017 2 Declaration I certify that the thesis I have presented for examination for the MPhil/PhD degree of the London School of Economics and Political Science is solely my own work other than where I have clearly indicated that it is the work of others (in which case the extent of any work carried out jointly by me and any other person is clearly identified in it). The copyright of this thesis rests with the author. Quotation from it is permitted, provided that full acknowledgement is made. This thesis may not be reproduced without my prior written consent. I warrant that this authorisation does not, to the best of my belief, infringe the rights of any third party. I declare that my thesis consists of approximately 50,000 words. 1 Abstract Before the arrival of modern information and communication technology, it was not easy to capture people's thoughts and sentiments; however, the development of statistical data mining techniques and the prevalence of mass social media provide opportunities to capture those trends. Among all types of social media, micro-blogs make use of the word limit of 140 characters to force users to get straight to the point, thus making the posts brief but content-rich resources for investigation.
    [Show full text]
  • MASTER THESIS in Universal Design of ICT May 2017
    MASTER THESIS in Universal Design of ICT May 2017 The Accessibility of Chinese Social Media for People with Visual Impairments – the case of Weibo Zhifeng Liu Department of Computer Science Faculty of Technology, Art and Design Preface and Acknowledgement China is just beginning to pay attention to accessibility. There are 83 million people with disabilities in China, including 13 million people with visual impairments. Weibo is one of the most popular social media. There are 100 million daily active users. Almost every Chinese has his own Weibo account, which showed that Weibo has inevitable influence. It would be meaningful if Weibo is fully accessible, especially for people with visual impairments. Thus, through this project I would like to contribute to the research and practice concerning accessibility in China. Firstly, I would like to thank my supervisor Weiqin Chen for providing important instruction in the project and writing-up process. Secondly, I acknowledge the contribution of Information Accessibility Research Association (IARA) in China and the participants involving in survey and user testing for their support in this project. A research paper “How accessible is Weibo for people with visual impairments” based on this project has been accepted as a full paper by the AAATE 2017 (The Association for the Advancement of Assistive Technology in Europe). 15 May 2017, Oslo Zhifeng Liu 1 Abstract Weibo is one of the most widely used social media in China. It is the Chinese Twitter, which allow users to post 140 Chinese characters. Weibo has 100 million daily active users. People usually use it to get news and share their opinions since Weibo serves as micro-blogging.
    [Show full text]
  • The Public Square Project
    THE PUBLIC SQUARE PROJECT The case for building public digital infrastructure to support our community and our democracy With majority support from Australians on curbing Facebook’s influence and role on our civic spaces, it is time to create an alternative social network that serves the public interest Research report Jordan Guiao Peter Lewis CONTENTS 2 // SUMMARY 3 // INTRODUCTION 5 // REIMAGINING THE PUBLIC SQUARE 10 // A NEW PUBLIC DIGITAL INFRASTRUCTURE 12 // CONSIDERATIONS IN BUILDING PUBLIC DIGITAL INFRASTRUCTURE 17 // TOWARDS THE FUTURE 19 // CONCLUSION 20 // APPENDIX — ALTERNATE SOCIAL NETWORKS OVER TIME The public square is a place where citizens come together, exchange ideas and mediate differences. It has its origins in the physical town square, where a community can gather in a central and open public space. As towns grew and technology progressed, the public square has become an anchor of democracy, with civic features like public broadcasting creating a space between the commercial, the personal and the government that helps anchor communities in shared understanding. 1 | SUMMARY In recent times, online platforms like Facebook In re-imagining a new public square, this paper have usurped core aspects of what we expect from proposes an incremental evolution of the Australian a public square. However, Facebook’s surveillance public broadcaster, centred around principles business model and engagement-at-all-costs developed by John Reith, the creator of public algorithm is designed to promote commercial rather broadcasting, of an independent, but publicly-funded than civic objectives, creating a more divided and entity with a remit to ‘inform, educate and entertain’ distorted public discourse.
    [Show full text]
  • Analysis of Bytedance with a Close Look on Douyin / Tiktok ——————————————————
    —————————————————— Analysis of ByteDance with a close look on Douyin / TikTok —————————————————— Author: Xiaoye SHI Supervisor: Prof. Dr. Didier SORNETTE A thesis submitted to the Department of Management, Technology and Economics (D-MTEC) of the Swiss Federal Institute of Technology Zurich (ETHZ) in partial fulfilment of the requirements for the degree of Master of Science in Management, Technology and Economics June 2019 Acknowledgements I would like to thank my supervisor Prof. Dr. Didier Sornette, who has kindly given me countless guidance and advice throughout the Master thesis. I appreciate the opportunity to work on this interesting topic under the Chair of Entrepreneurial Risks and is deeply grateful for all the help received along the process. I also want to express my deepest gratitude to my parents, who have been supportive and encouraging under all circumstances. Without them, I would not be able to become the person I am today. - 2 - Abstract In 2018, ByteDance, a young Internet company with only 6 years of history, broke out on various news headlines as the highest valued unicorn. With the acquisitions of musical.ly and Flipgram, the company’s flagship product Douyin strikes to develop its global presence under the name TikTok. This thesis analyzed Douyin’s historical growth and revenue model. As a main revenue driver, future user growth is predicted and calibrated by extending the methodology proposed in earlier studies by Cauwels and Sornette. We considered three growth scenarios – base, high and extreme, and estimated Douyin as well as ByteDance’s value based on comparable company analysis. ByteDance’s key performance metrics and multiples were compared with four other firms in the similar industry, Facebook, Weibo, Momo and iQIYI.
    [Show full text]
  • July 20, 2020 the Honorable David N. Cicilline Chairman
    July 20, 2020 The Honorable David N. Cicilline Chairman, Subcommittee on Antitrust, Commercial and Administrative Law U.S. House of Representatives Subject: House Judiciary Committee’s July 27 hearing of Apple’s CEO Tim Cook Chairman Cicilline, GreatFire is a China-based, anti-censorship organization that has been working since 2011 to bring transparency to online censorship in China and to help Chinese citizens to freely access information. We would like to draw to your attention Apple’s current policy of censorship of its App Store, which constitutes a serious abuse of its dominant position in the digital marketplace as well as a violation of human rights. On July 27, the Subcommittee on Antitrust, Commercial and Administrative Law of the U.S House of Representatives Judiciary Committee will question Apple Inc. CEO Tim Cook, along with the CEOs of Amazon, Google and Facebook, as part of the Committee’s ongoing investigation into competition in the digital marketplace. The “Online Platforms and Market Power, Part 6: Examining the Dominance of Amazon, Facebook, Google and Apple” hearing will conclude an investigation which began last year and has already covered Apple’s anti-competitive practices and their impact, most notably on a “Free and Diverse Press”. We believe that one crucial consequence of Apple’s dominant position in the digital market has not been covered by the investigation: Apple’s opaque and arbitrary management of its China App Store. In China, currently Apple’s biggest market worldwide, Apple directly collaborates with the Chinese authorities to censor apps that the government does not want its population to use.
    [Show full text]
  • Linguistic Fingerprints of Internet Censorship: the Case of Sina Weibo
    Linguistic Fingerprints of Internet Censorship: the Case of Sina Weibo Kei Yin Ng, Anna Feldman, Jing Peng Montclair State University Montclair, New Jersey, USA Abstract trainings, seminars, and even study trips as well as advanced equipment. This paper studies how the linguistic components of blogposts collected from Sina Weibo, a Chinese mi- In this paper, we deal with a particular type of censorship croblogging platform, might affect the blogposts’ likeli- – when a post gets removed from a social media platform hood of being censored. Our results go along with King semi-automatically based on its content. We are interested in et al. (2013)’s Collective Action Potential (CAP) theory, exploring whether there are systematic linguistic differences which states that a blogpost’s potential of causing riot or between posts that get removed by censors from Sina Weibo, assembly in real life is the key determinant of it getting a Chinese microblogging platform, and the posts that remain censored. Although there is not a definitive measure of on the website. Sina Weibo was launched in 2009 and be- this construct, the linguistic features that we identify as came the most popular social media platform in China. Sina discriminatory go along with the CAP theory. We build Weibo has over 431 million monthly active users3. a classifier that significantly outperforms non-expert hu- mans in predicting whether a blogpost will be censored. In cooperation with the ruling regime, Weibo sets strict The crowdsourcing results suggest that while humans control over the content published under its service (Tager, tend to see censored blogposts as more controversial Bass, and Lopez 2018).
    [Show full text]
  • Forbidden Feeds: Government Controls on Social Media in China
    FORBIDDEN FEEDS Government Controls on Social Media in China 1 FORBIDDEN FEEDS Government Controls on Social Media in China March 13, 2018 © 2018 PEN America. All rights reserved. PEN America stands at the intersection of literature and hu- man rights to protect open expression in the United States and worldwide. We champion the freedom to write, recognizing the power of the word to transform the world. Our mission is to unite writers and their allies to celebrate creative expression and defend the liberties that make it possible. Founded in 1922, PEN America is the largest of more than 100 centers of PEN International. Our strength is in our membership—a nationwide community of more than 7,000 novelists, journalists, poets, es- sayists, playwrights, editors, publishers, translators, agents, and other writing professionals. For more information, visit pen.org. Cover Illustration: Badiucao CONTENTS EXECUTIVE SUMMARY 4 INTRODUCTION : AN UNFULFILLED PROMISE 7 OUTLINE AND METHODOLOGY 10 KEY FINDINGS 11 SECTION I : AN OVERVIEW OF THE SYSTEM OF SOCIAL MEDIA CENSORSHIP 12 The Prevalence of Social Media Usage in China 12 Digital Rights—Including the Right to Free Expression—Under International Law 14 China’s Control of Online Expression: A Historical Perspective 15 State Control over Social Media: Policy 17 State Control over Social Media: Recent Laws and Regulations 18 SECTION II: SOCIAL MEDIA CENSORSHIP IN PRACTICE 24 A Typology of Censored Topics 24 The Corporate Responsibility to Censor its Users 29 The Mechanics of Censorship 32 Tibet and
    [Show full text]
  • Arcana: Enabling Private Posts on Public Microblog Platforms
    Arcana: Enabling Private Posts on Public Microblog Platforms Anirudh Narasimman1, Qiaozhi Wang2, Fengjun Li2, Dongwon Lee3, and Bo Luo2 1 IBM Corporation, San Francisco, CA, USA [email protected] 2 University of Kansas, Lawrence, KS, USA fqzwang, fli, [email protected] 3 Penn State University, University Park, PA, USA [email protected] Abstract. Many popular online social networks, such as Twitter, Tum- blr, and Sina Weibo, adopt too simple privacy models to satisfy users' di- verse needs for privacy protection. In platforms with no (i.e., completely open) or binary (i.e., \public" and \friends-only") access control, users cannot control the dissemination boundary of the content they share. For instance, on Twitter, tweets in \public" accounts are accessible to every- one including search engines, while tweets in \protected" accounts are visible to all the followers. In this work, we present Arcana to enable fine- grained access control for social network content sharing. In particular, we target the Twitter platform and introduce the \private tweet" func- tion, which allows users to disseminate particular tweets to designated group(s) of followers. Arcana employs Ciphertext-Policy Attribute-based Encryption (CP-ABE) to implement social circle detection and private tweet encryption so that access-controlled tweets are only readable by designated recipients. To be stealthy, Arcana further embeds the pro- tected content as digital watermarks in image tweets. We have imple- mented the Arcana prototype as a Chrome browser plug-in, and demon- strated its flexibility and effectiveness. Different from existing approaches that require trusted third-parties or additional server/broker/mediator, Arcana is light-weight and completely transparent to Twitter { all the communications, including key distribution and private tweet dissemi- nation, are exchanged as Twitter messages.
    [Show full text]