A. Poller, P. Ilyes, A. Kramm, and L. Kocksch, Investigating OSN users' privacy strategies with in-situ observation. CSCW Companion '14, pp.217-220, 2014.
DOI : 10.1145/2556420.2556508

URL : http://testlab.sit.fraunhofer.de/downloads/Publications/poller_CSCW2014_Investigating_OSN_users_privacy_strategies.pdf

B. C. Semaan, L. M. Britton, and B. Dosono, Transition Resilience with ICTs, Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, CHI '16, pp.2882-2894, 2016.
DOI : 10.1145/2858036.2858109

M. Sleeper, R. Balebako, S. Das, A. L. Mcconahy, J. Wiese et al., The post that wasn't, Proceedings of the 2013 conference on Computer supported cooperative work, CSCW '13, pp.793-802, 2013.
DOI : 10.1145/2441776.2441865

P. Wisniewski, H. Lipford, and D. Wilson, Fighting for my space, Proceedings of the 2012 ACM annual conference on Human Factors in Computing Systems, CHI '12, pp.609-618, 2012.
DOI : 10.1145/2207676.2207761

B. Liang and H. Lu, Internet Development, Censorship, and Cyber Crimes in China, Journal of Contemporary Criminal Justice, vol.58, issue.1, pp.103-120, 2010.
DOI : 10.1109/MIC.2003.1189191

R. Mackinnon, China's "Networked Authoritarianism", Journal of Democracy, vol.22, issue.2, 2011.
DOI : 10.1353/jod.2011.0033

K. Kuutti and L. J. Bannon, The turn to practice in HCI, Proceedings of the 32nd annual ACM conference on Human factors in computing systems, CHI '14, pp.3543-3552, 2014.
DOI : 10.1145/2556288.2557111

D. Bamman, B. O-'connor, and N. Smith, Censorship and deletion practices in Chinese social media. First Monday, p.17, 2012.
DOI : 10.5210/fm.v17i3.3943

URL : http://brenocon.com/censorship.bamman+oconnor+smith.fm2012.pdf

N. Hachigian, China's Cyber-Strategy, Foreign Affairs, vol.80, issue.2, 2001.
DOI : 10.2307/20050069

J. Q. Ng and P. F. Landry, The Political Hierarchy of Censorship: An Analysis of Keyword Blocking of CCP Officials' Names on Sina Weibo Before and After the 2012 National Congress (S)election, 2013.

D. Stockmann and M. E. Gallagher, Remote Control: How the Media Sustain Authoritarian Rule in China, Comparative Political Studies, vol.4, issue.3, pp.436-467, 2011.
DOI : 10.1017/CBO9780511818691

J. W. Givens and A. W. Macdonald, The Internet with Chinese Characteristics: Democratizing Discourse But Not Politics, APSA 2013 Annual Meeting, p.19, 2013.

T. Poell, J. De-kloet, and G. Zeng, Will the real Weibo please stand up? Chinese online contention and actor-network theory, Chinese Journal of Communication, vol.5, issue.3, pp.1-18, 2013.
DOI : 10.1080/17544750.2011.647744

A. Rauchfleisch and M. S. Schä-fer, Multiple public spheres of Weibo: a typology of forms and potentials of online public spheres in China, Information, Communication & Society, vol.18, issue.2, pp.1-17, 2014.
DOI : 10.1177/0010414004273505

G. Yang, The Co-evolution of the Internet and Civil Society in China, Asian Survey, vol.43, issue.3, pp.405-422, 2003.
DOI : 10.1525/as.2003.43.3.405

I. Shklovski and N. Kotamraju, Online contribution practices in countries that engage in internet blocking and censorship, Proceedings of the 2011 annual conference on Human factors in computing systems, CHI '11, pp.1109-1118, 2011.
DOI : 10.1145/1978942.1979108

Q. Sima, Records of the Grand Historian of China, 1959.

M. Weber and H. H. Gerth, The Religion of China, Confucianism and Taoism, 1953.

D. Wang and G. Mark, Internet Censorship in China, ACM Transactions on Computer-Human Interaction, vol.22, issue.6, pp.1-22, 2015.
DOI : 10.1002/(SICI)1520-6793(200007)17:7<633::AID-MAR4>3.0.CO;2-B

Z. Dong, The Luxuriant Dew of the Spring and Autumn Annals, 2011.

D. A. Bell, China's New Confucianism: Politics and Everyday Life in a Changing Society, 2010.

D. A. Bell, Reconciling Socialism and Confucianism?: Reviving Tradition in China, Dissent, vol.57, issue.1, pp.91-99, 2009.
DOI : 10.1353/dss.0.0114

J. O. Yum, The impact of Confucianism on interpersonal relationships and communication patterns in east Asia, Communication Monographs, vol.56, issue.4, 2009.
DOI : 10.1080/03637758209376089

X. Zhu, The Analects of Confucius Variorum, 1200.

. Xunzi, Xunzi: The Complete Text, 2014.
DOI : 10.1515/9781400852550

Z. Wang and D. Pavli?evi?, Citizens and Democracy: Shi Tianjian's Contribution to China Studies and Political Science, China An Int. J, vol.10, pp.125-135, 2012.

T. Shi, Cultural Values and Political Trust: A Comparison of the People's Republic of China and Taiwan, Comparative Politics, vol.33, issue.4, pp.401-419, 2001.
DOI : 10.2307/422441

T. Shi, Political Participation in Beijing, 1997.

T. Shi and J. Lu, The Shadow of Confucianism, J. Democr, vol.21, pp.123-130, 2010.

T. Shi, China: Democratic Values Supporting an Authoritarian System How East Asians View Democracy, 2008.
DOI : 10.7312/chu-14534-011

A. J. Nathan and T. Shi, Cultural Requisites for Democracy in China: Findings from a Survey, Daedalus, vol.122, pp.95-123, 1993.

S. Li, The online public space and popular ethos in China, Media, Culture & Society, vol.26, issue.3, pp.63-83, 2010.
DOI : 10.1111/j.1460-2466.2003.tb02915.x

L. Tsui, The Panopticon as the Antithesis of a Space of Freedom, China Information, vol.17, issue.2, pp.65-82, 2003.
DOI : 10.1177/0920203X0301700203

M. Roberts, Experiencing Censorship Emboldens Internet Users and Decreases Government Support in China, 2015.

A. S. Cheung, The Business of Governance: China's Legislation on Content Regulation in Cyberspace, Int. Law Polit, vol.38, pp.1-37, 2006.

G. King, J. Pan, and M. Roberts, How Censorship in China Allows Government Criticism but Silences Collective Expression, American Political Science Review, vol.44, issue.02, pp.326-343, 2013.
DOI : 10.1353/jod.2003.0019

G. Ebbs and H. Rheingold, Censorship on the Information Highway, Information Management & Computer Security, vol.2, issue.4, pp.59-80, 1997.
DOI : 10.1108/09685229410068244

T. Lawson and C. Comber, Censorship, the Internet and schools: a new moral panic?, Curriculum Journal, vol.6, issue.2, pp.273-285, 2000.
DOI : 10.1007/978-1-349-14035-0

P. H. Ang and B. Nadarajan, Censorship and the Internet: a Singapore perspective, Communications of the ACM, vol.39, issue.6, pp.72-78, 1996.
DOI : 10.1145/228503.228520

D. E. Bambauer, Filtering in Oz: Australia's Foray into Internet Censorship, SSRN Electronic Journal, p.31, 2009.
DOI : 10.2139/ssrn.1319466

J. A. Pater, O. L. Haimson, N. Andalibi, and E. D. Mynatt, ???Hunger Hurts but Starving Works:??? Characterizing the Presentation of Eating Disorders Online, Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing, CSCW '16, pp.1183-1198, 2016.
DOI : 10.1145/2818048.2820030

T. Gillespie, Can an Algorithm be Wrong? Limn, 2012.

T. Wilson, ON USER STUDIES AND INFORMATION NEEDS, Journal of Documentation, vol.37, issue.1, pp.3-15, 1981.
DOI : 10.1108/eb026627

G. Behrouzian, E. C. Nisbet, A. Dal, and A. Çarko?lu, Resisting Censorship: How Citizens Navigate Closed Media Environments, Int. Journal of Commun, vol.10, p.23, 2016.

A. C. Gunther and L. B. Snyder, Reading International News in a Censored Press Environment, Journalism Quarterly, vol.69, issue.3, pp.591-599, 1992.
DOI : 10.1177/107769909206900307

S. Cherry, The net effect: as China's Internet gets a much-needed makeover, will the new network promote freedom or curtail it?, IEEE Spectrum, vol.42, issue.6, pp.38-44, 2005.
DOI : 10.1109/MSPEC.2005.1437036

R. Mackinnon, Flatter world and thicker walls? Blogs, censorship and??civic discourse in China, Public Choice, vol.19, issue.1-2, pp.31-46, 2007.
DOI : 10.1007/s11127-007-9199-0

Y. Kou, Y. M. Kow, and X. Gui, Resisting the Censorship Infrastructure in China, Proceedings of the 50th Hawaii International Conference on System Sciences (2017), pp.2332-2340, 2017.
DOI : 10.24251/HICSS.2017.282

M. Jiang, The Co-Evolution of the Internet, (Un)Civil Society & Authoritarianism in China, The Internet, Social Media, and a Changing China, 2014.
DOI : 10.2139/ssrn.2379092

A. X. Mina, Batman, Pandaman and the Blind Man: A Case Study in Social Change Memes and Internet Censorship in China, Journal of Visual Culture, vol.13, issue.3, pp.359-375, 2014.
DOI : 10.1177/0163443711404462

G. Yang and M. Jiang, The networked practice of online political satire in China: Between ritual and resistance, International Communication Gazette, vol.6, issue.3, pp.215-231, 2015.
DOI : 10.1215/10679847-2006-023

J. Corbin and A. Strauss, Basics of Qualitative Research: Techniques and Procedures for Developing Grounded Theory, 2007.
DOI : 10.4135/9781452230153

Y. Mou, K. Wu, and D. Atkin, Understanding the use of circumvention tools to bypass online censorship. New Media Soc, pp.837-856, 2014.

J. Leibold, Blogging Alone: China, the Internet, and the Democratic Illusion?, The Journal of Asian Studies, vol.5, issue.04, 2011.
DOI : 10.1177/0920203X0301700203

L. Rue and F. , Report of the Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression, 2011.

P. K. Bol, Neo-confucianism in history, 2010.
DOI : 10.2307/j.ctt1x07w5s

R. Fan and E. Yu, The renaissance of Confucianism in Contemporary China, 2011.
DOI : 10.1007/978-94-007-1542-4

S. Melvin, Yu Dan and China's return to Confucius, 2007.

Y. Li, Smart Censorship in China Weibo: An Industry and Party-State Double Act. SSRN Electron, J, 2013.
DOI : 10.2139/ssrn.2264996

W. Y. Wang, Who's blocking the Chinese Internet? The rise of cybercultures and the generational conflicts in China, Cybercultures: Cultures in Cyberspace Communities, pp.145-166, 2012.

L. Irani, J. Vertesi, P. Dourish, K. Philip, and R. E. Grinter, Postcolonial computing, Proceedings of the 28th international conference on Human factors in computing systems, CHI '10, pp.1311-1320, 2010.
DOI : 10.1145/1753326.1753522

M. Khosrow-pour, Encyclopedia of Information Science and Technology, Third Edition, 2014.
DOI : 10.4018/978-1-4666-5888-2

B. Nardi, R. Vatrapu, and T. Clemmensen, Comparative informatics. interactions, p.28, 2011.
DOI : 10.1145/1925820.1925828

B. Semaan, H. Faucett, S. P. Robertson, M. Maruyama, and S. Douglas, Designing Political Deliberation Environments to Support Interactions in the Public Sphere. CHI '15, pp.3167-3176, 2015.

M. Bohøj, N. G. Borchorst, S. Bødker, M. Korn, and P. Zander, Public deliberation in municipal planning, Proceedings of the 5th International Conference on Communities and Technologies, C&T '11, p.88, 2011.
DOI : 10.1145/2103354.2103367

B. Semaan, S. Robertson, S. Douglas, and M. Maruyama, Social media supporting political deliberation across multiple public spheres, Proceedings of the 17th ACM conference on Computer supported cooperative work & social computing, CSCW '14, pp.1409-1421, 2014.
DOI : 10.1145/2531602.2531605

C. Crivellaro, R. Comber, J. Bowers, P. C. Wright, and P. Olivier, A pool of dreams, Proceedings of the 32nd annual ACM conference on Human factors in computing systems, CHI '14, pp.3573-3582, 2014.
DOI : 10.1145/2556288.2557100

J. P. Dimond, M. Dye, D. Larose, and A. S. Bruckman, Hollaback!, Proceedings of the 2013 conference on Computer supported cooperative work, CSCW '13, pp.477-489, 2013.
DOI : 10.1145/2441776.2441831

M. Roeder, Social movements using social media in a mined and censored world: examples in the United States and China, 2013.

Y. M. Kow, Y. Kou, B. Semaan, and W. Cheng, Mediating the Undercurrents, Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, CHI '16, pp.3883-3894, 2016.
DOI : 10.1145/2441776.2441935

L. Dantec, C. A. Edwards, and W. K. , Designs on dignity:perceptions of technology among the homeless. CHI '08, pp.627-636, 2008.

C. Disalvo, Design and the Construction of Publics, Design Issues, vol.25, issue.1, pp.48-63, 2009.
DOI : 10.1162/desi.2009.25.1.48

E. Gordon, J. Baldwin-philippi, and M. Balestra, Why We Engage: How Theories of Human Behavior Contribute to Our Understanding of Civic Engagement in a Digital Era, SSRN Electronic Journal, 2013.
DOI : 10.2139/ssrn.2343762

A. Kavanaugh, J. M. Carroll, M. B. Rosson, D. D. Reese, and T. T. Zin, Participating in civil society: the case of networked communities, Interacting with Computers, vol.17, issue.1, pp.9-33, 2005.
DOI : 10.1016/j.intcom.2004.10.006

A. Kavanaugh, J. M. Carroll, M. B. Rosson, T. T. Zin, and D. D. Reese, Community Networks: Where Offline Communities Meet Online, Journal of Computer-Mediated Communication, vol.10, issue.4, pp.0-00, 2005.
DOI : 10.1111/j.1083-6101.2005.tb00266.x

A. Monroy-herná-ndez, D. Boyd, E. Kiciman, M. De-choudhury, and S. Counts, The new war correspondents: the rise of civic media curation in urban warfare, CSCW '13, pp.1443-1452, 2013.

Y. Wang and G. Mark, Trust in online news, Proceedings of the 2013 conference on Computer supported cooperative work, CSCW '13, pp.599-610, 2013.
DOI : 10.1145/2441776.2441843

D. Gayo-avello, Don't turn social media into another 'Literary Digest' poll, Communications of the ACM, vol.54, issue.10, pp.121-128, 2011.
DOI : 10.1145/2001269.2001297

T. Kriplean, J. Morgan, D. Freelon, A. Borning, and L. Bennett, Supporting reflective public thought with considerit. CSCW '12, pp.265-274, 2012.
DOI : 10.1145/2145204.2145249

URL : http://dub.washington.edu/djangosite/media/papers/kriplean-cscw2012.pdf

S. Bardzell, Feminist HCI, Proceedings of the 28th international conference on Human factors in computing systems, CHI '10, pp.1301-1310, 2010.
DOI : 10.1145/1753326.1753521

H. Ekbia and B. Nardi, Social Inequality and HCI, Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, CHI '16, pp.4997-5002, 2016.
DOI : 10.1145/2029976.2029994

S. Burnett, N. Feamster, and S. Vempala, Chipping Away at Censorship Firewalls with User- Generated Content, USENIX Security Symposium, pp.463-468, 2010.

N. Feamster, M. Balazinska, W. Wang, H. Balakrishman, and D. Karger, Thwarting Web Censorship with Untrusted Messenger Discovery, Privacy Enhancing Technologies, pp.125-140, 2003.
DOI : 10.1007/978-3-540-40956-4_9

URL : http://nms.lcs.mit.edu/~feamster/papers/disc-pet2003.ps.gz

A. Serjantov, Anonymizing Censorship Resistant Systems Peer-to-Peer Systems, pp.111-120, 2002.
DOI : 10.1007/3-540-45748-8_11

URL : http://www.cl.cam.ac.uk/users/aas23/papers_aas/Anon_p2p2.ps

M. Waldman and D. Maziè-res, Tangler, Proceedings of the 8th ACM conference on Computer and Communications Security , CCS '01, pp.126-135, 2001.
DOI : 10.1145/501983.502002

E. P. Baumer and M. S. Silberman, When the implication is not to design (technology), Proceedings of the 2011 annual conference on Human factors in computing systems, CHI '11, pp.2271-2274, 2011.
DOI : 10.1145/1978942.1979275

J. Pierce, Undesigning technology, Proceedings of the 2012 ACM annual conference on Human Factors in Computing Systems, CHI '12, pp.957-966, 2012.
DOI : 10.1145/2207676.2208540

Y. R. Tausczik and J. W. Pennebaker, The Psychological Meaning of Words: LIWC and Computerized Text Analysis Methods, Journal of Language and Social Psychology, vol.5, issue.1, pp.24-54, 2010.
DOI : 10.1023/B:GRUP.0000011944.62889.6f