TY - JOUR
T1 - News censorship in online social networks
T2 - A study of circumvention in the commentsphere
AU - Schwartz, David G.
AU - Yahav, Inbal
AU - Silverman, Gahl
N1 - Publisher Copyright:
© 2016 ASIS&T
PY - 2017/3/1
Y1 - 2017/3/1
N2 - This study investigates the interplay between online news, reader comments, and social networks to detect and characterize comments leading to the revelation of censored information. Censorship of identity occurs in different contexts–for example, the military censors the identity of personnel and the judiciary censors the identity of minors and victims. We address three objectives: (a) assess the relevance of identity censorship in the presence of user-generated comments, (b) understand the fashion of censorship circumvention (what people say and how), and (c) determine how comment analysis can aid in identifying decensorship and information leakage through comments. After examining 3,582 comments made on 48 articles containing obfuscated terms, we find that a systematic examination of comments can compromise identity censorship. We identify and categorize information leakage in comments indicative of knowledge of censored information that may result in information decensorship. We show that the majority of censored articles contained at least one comment leading to censorship circumvention.
AB - This study investigates the interplay between online news, reader comments, and social networks to detect and characterize comments leading to the revelation of censored information. Censorship of identity occurs in different contexts–for example, the military censors the identity of personnel and the judiciary censors the identity of minors and victims. We address three objectives: (a) assess the relevance of identity censorship in the presence of user-generated comments, (b) understand the fashion of censorship circumvention (what people say and how), and (c) determine how comment analysis can aid in identifying decensorship and information leakage through comments. After examining 3,582 comments made on 48 articles containing obfuscated terms, we find that a systematic examination of comments can compromise identity censorship. We identify and categorize information leakage in comments indicative of knowledge of censored information that may result in information decensorship. We show that the majority of censored articles contained at least one comment leading to censorship circumvention.
UR - http://www.scopus.com/inward/record.url?scp=84971629647&partnerID=8YFLogxK
U2 - 10.1002/asi.23698
DO - 10.1002/asi.23698
M3 - ???researchoutput.researchoutputtypes.contributiontojournal.article???
AN - SCOPUS:84971629647
SN - 2330-1635
VL - 68
SP - 569
EP - 582
JO - Journal of the Association for Information Science and Technology
JF - Journal of the Association for Information Science and Technology
IS - 3
ER -