Abstract
The Internet provides a virtual locale for the highly diverse carnival of human experience, offering a display of the best, and the worst of human nature. 1 As far as the latter is concerned, citizens expect their state to protect vulnerable populations, particularly minors, from online content that is hateful, violent, or pornographic in nature by eliminating proscribed material from the Web. This chapter will examine the practice of online censorship in two very different settings: the closed Internet system in China and the open Internet system in Europe. In each case, the state acts as a guarantor of content, censoring proscribed material according to the law in place. However, not all material that is censored is hateful, violent or pornographic; some, in fact, is highly political. The Chinese authorities have shown little tolerance for online activity that may threaten the monopoly of one-party rule in China, whereas European states have pursued a broad policy of hate speech censorship that has been extended to religious radicalism in recent years due to efforts to counteract online recruitment for jihadism. This chapter will compare and contrast (1) the interaction between Internet technology systems and censorship methods, (2) the legal constructs that frame government censorship policies, (3) the contested nature of information on the Internet, and (4) the impact of censorship on Internet users in both Europe and China. This chapter argues that, regardless of the governance system, digital censorship may violate or promote human rights according to the context. In the case of both China and Europe, Internet censorship has been relatively ineffective in countering real or perceived threats to the state and poses a problem for many in society who question the legitimacy of government officials more concerned with public opinion than the safeguarding of constitutional values.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Bibliography
Agence France Presse. (2014). China has massive internet breakdown reportedly caused by their own censoring tools. January 23. Retrieved April 3, 2016, from http://www.businessinsider.com/chinas-internet-breakdown-reportedly-caused-by-censoring-tools-2014-1?IR=T
Amnesty International. (2002). People’s Republic of China: State control of the internet in China. Index number: ASA 17/007/2002. Retrieved April 3, 2016, from https://www.amnesty.org/en/documents/ASA17/007/2002/en
Ang, P.H. (1997). How countries are regulating internet content. 7th Annual Conference of the Internet Society, Kuala Lumpur. Internet Society. Retrieved March 17, 2016, from http://www.isoc.org/inet97/proceedings/B1/B1_3.HTM
Associated Press. (2015) Poland’s lawmakers approve new law on state media control. Associated Press. Retrieved December 30, 2015, from http://www.ap.org (home page).
Bamman, D., O’Connor, B., & Smith, N. (2012). Censorship and deletion practices in Chinese social media. First Monday, 17(3), 2.
Bekmezian, H. (2016, March 17). Le Sénat enterre la déchéance de nationalité. Le Monde.
Bertho, A. (2016, March 25). De la rage sans espoir au martyre: penser la complexité du jihadisme. Libération.
Bilewicz, M., Marchlewska, M., Soral, W., Winiewski, M. (2014). Hate speech in Poland 2014: Summary of the national opinion poll. Stefan Batory Foundation, Warsaw. Retrieved March 17, 2016, from http://www.ngofund.org.pl (home page).
Bouzar, D., Caupenne, C., & Valsan, S. (2014). La Metamorphose operée chez le jeune par les nouveaux discours terroristes. Paris: CPDSI.
Bunn, M. (2015, February). Reimagining repression: New censorship theory and after. History and Theory, 54, 25–44.
Burgat, F. (2015, December 1). Réponse à Olivier Roy: les non-dits de l’islamisation de la radicalité. L’Obs avec Rue 89.
Butler, J. (1997). Excitable speech: A politics of the performative. New York: Routledge.
Cazeneuve, B., et al. (2016, March 8). La Lutte Contre le Terrorisme, Statement. Gouvernement.fr. Retrieved March 17, 2016, from http://www.gouvernement.fr/action/la-lutte-contre-le-terrorisme
Chapman, A. (2015). Don’t bring a dove to a Polish hawk fight: As Poland readies for its presidential election, one thing is certain: Russia is a threat. Foreign Policy. Retrieved May 9, 2015, fromhttp://foreignpolicy.com/2015/05/09/dont-bring-a-dove-to-a-polish-hawk-fight-presidential-election-russia-ukraine http://foreignpolicy.com (home page).
Cheung, J. (2015). China’s great firewall just got taller. Open democracy. Retrieved July 14, 2015, from https://www.opendemocracy.net (home page).
China Daily Online (2015). Snapshot of Xi on making internet an interconnected world. Retrieved January 6, 2016, from http://www.chinadaily.com.cn/china/2015-12/11/content_22692734_7.htm
China Digital Times. (2016). Fifty cent party. Retrieved March 19, 2016, from http://chinadigitaltimes.net/space/Fifty_Cent_Party
China Internet Network Information Center. (2012). The 30th Statistical report on internet development in China. Retrieved January 31, 2013, from http://www1.cnnic.cn (home page).
China Internet Network Information Center. (2013) The 31st Statistical report on internet development in China. Retrieved January 31, 2013, from http://www1.cnnic.cn (home page).
China Internet Network Information Center. (2016) The 37th Statistical report on internet development in China. Retrieved March 17, 2016, from http://www1.cnnic.cn (home page).
Clayton, R., Murdoch, S. J., & Watson R. N. M. (2006). Ignoring the great firewall of China. 6th Workshop on Privacy Enhancing Technologies Conference Paper, Cambridge.
Congressional Executive Commission on China. (2002a) Interim provisions on the administration of internet publication, Article 17, CECC. Retrieved March 17, 2016, from http://www.cecc.gov (home page).
Congressional Executive Commission on China. (2002b) International agreements and domestic legislation affecting freedom of expression. Order No. 292, CECC. Retrieved March 17, 2016, from http://www.cecc.gov (home page).
Congressional Executive Commission on China. (2002c). PRC legal provisions: Regulations on the administration of internet access service business establishments. CECC. Retrieved March 17, 2016, from http://www.cecc.gov (home page).
Conseil National Numérique. (2014, July 15). Avis n°2014-3 sur l’article 9 du projet de loi renforçant les dispositions relatives à la lutte contre le terrorisme. Conseil National Numérique.
Cornevin, C. (2016, February 3). Islamisme: 8250 individus radicalisés en France. Le Figaro.
Council of Europe. (1953). European convention for the protection of human rights and fundamental freedoms. 231 U.N.T.S. 222, Article 10, Council of Europe, Rome.
Council of Europe. (2003). Additional protocol to the convention on cybercrime, concerning the criminalisation of acts of a racist and xenophobic nature committed through computer systems. European Treaty Series, 189.
Einhorn, B. (2013). World of warcraft no longer rules in China. Bloomberg. Retrieved July 11, 2016, from http://www.bloomberg.com/bw/articles/2013-07-11/world-of-warcraft-no-longer-rules-in-china
Esarey, A., & Xiao, Q. (2011). Digital communication and political change in China. International Journal of Communication, 5, 289–319.
European Commission. (2016). Antitrust: E-commerce sector inquiry finds geo-blocking is widespread throughout EU. Retrieved April 4, 2016, from http://europa.eu/rapid/press-release_IP-16-922_en.htm
Eurostat. (2015). Information society statistics—households and individuals. Retrieved April 3, 2016, from http://ec.europa.eu/eurostat/statistics (homepage).
Fallows, J. (2008, March). The connection has been reset. The Atlantic.
Florini, A., Lai, H., & Tan, Y. (2012). China experiments: From local innovations to national reform. Washington, DC: Brookings Institute.
Freedom House. (2015). Freedom on the net: China. Freedom House. Retrieved March 18, 2016, from https://freedomhouse.org/report/freedom-net/2015/china
Global Internet Liberty Campaign. (1998). Privacy and human rights: An international survey of privacy laws and practice. Retrieved April 3, 2016, from http://gilc.org/privacy/survey
GreatFire.org. (2014). Authorities launch man-in-the-middle attack on Google. GreatFire.org Blog. Retrieved January 6, 2016, from https://en.greatfire.org/blog/2014/sep/authorities-launch-man-middle-attack-google
Hatton, C. (2016). Is Weibo on the way out? BBC China Blog. Retrieved January 6, 2016, from http://www.bbc.com/news/blogs-china-blog-31598865
House of Representatives. (1994). Communications Assistance for Law Enforcement Act, 103rd Congress, 2nd Session, H.R. 4922, The Library of Congress. Retrieved March 13, 2016, fromhttp://thomas.loc.gov/cgi-bin/query/z?c103:H.R.1494.IH: https://www.loc.gov (home page).
Jiang, M. (2010). Spaces of authoritarian deliberation: Online public deliberation in China. In B. He & E. J. Leib (Eds.), The search for deliberative democracy in China (pp. 261–287). New York: Palgrave Macmillan.
Jin, L. (2008). Chinese outline BBS sphere: What BBS has brought to China? Thesis (S.M.), Massachusetts Institute of Technology, Dept. of Comparative Media Studies.
Kandziora, K. (2016). Le théâtre menacé de censure en Pologne, Arte. Retrieved March 17, 2016, from http://info.arte.tv/fr/tentative-de-censure-wroclaw
Kelly, S., Cook, S., & Truong, M. Eds. (2012). Freedom of the Net 2012: A global assessment of internet and digital media. Freedom House, p. 131.
Kepel, G. (2015). Passion française: les voix des cités. Paris: Gallimard.
King, G., Pan, J., & Roberts, M. E. (2013). How censorship in China allows government criticism but silences collective expression. American Political Science Review, 102(2), 1–18.
Kunzru, H. (1997, January 6). Austria turns off. Wired Magazine. Retrieved April 3, 2016, from http://www.wired.com/1997/06/austria-turns-off
Laurent, S. (2015, December 21). Etat d’urgence: la carte des perquisitions administratives. Le Monde.
Lei, Y. (2011). The political consequences of the rise of the internet: Political beliefs and practices of Chinese netizens. Political Communication, 28(3), 291–322.
Loi no. 2014-1353. (2014). Renforçant les dispositions relatives à la lutte contre le terrorisme, JORF n°0263 du 14 novembre 2014’, Article 9, p. 19162, Texte n° 5.
Loi no. 2015-912. (2015). Relative au renseignement, JORF n°0171 du 26 juillet 2015’, p. 12735, Texte n° 2.
Lu, G. (2008). Old school BBS: The Chinese social networking phenomenon. ReadWrite. Retrieved March 17, 2016, from http://readwrite.com/2008/01/16/bbs_china_social_networking
Lu, J., & Weber, I. (2007). Internet and self-regulation in China: The cultural logic of controlled commodification. Media Culture & Society, 29(5), 772–789.
Lyon, D. (2001). Facing the future. Seeking ethics for everyday surveillance, 3(3), 171–181.
Majed, Z. (2014). Syrie, La Révolution Orpheline. Paris: Actes Sud et l’Orient des Livres.
Manners, I. (2008). The normative ethics of the European Union. International Affairs, 84(1), 45–60.
McGonagle, T. (2015). Freedom of expression: Still a precondition for democracy? Conference Report, Strasbourg, Council of Europe. Retrieved March 16, 2016, from http://www.ivir.nl/publicaties/download/1707
Mill, J. S. (2008). On liberty. Boston, MA: Bedford St Martin’s.
Müller, B. (Ed.). (2004). Censorship and cultural regulation in the modern age. Amsterdam: Rodopi.
National People’s Congress. (1982). Constitution of the People’s Republic of China, Fifth National People’s Congress. Retrieved January 10, 2015, from http://en.people.cn/constitution/constitution.html
Ng, T. (2015). Chinese celebrity’s air pollution video stirs online dust-up. South China Morning Post. Retrieved February 25, 2016, from http://www.scmp.com (home page).
Perry, S., & Roda, C. (2013). Conceptualizing and contextualizing the changing nature of internet usage in China. China and the new internet world. The Eleventh Chinese Internet Research Conference (CIRC11), Oxford Internet Institute, Oxford.
Pihl, N. (2011). Why Sina Weibo is winning. Tech Rice.
Poncet, G. (2014). La France, en route vers la censure d’Internet. Le Point. Retrieved March 17, 2016, from http://www.lepoint.fr (home page).
Qiang, C. Z. (2007). China’s information revolution: Managing the economic and social transformation. The World Bank. Retrieved March 17, 2016, from http://www.worldbank.org (home page).
Reuters. (2015). China to ban online impersonation accounts, enforce real-name registration. Thomson Reuters. Retrieved January 6, 2016, from http://uk.reuters.com (home page).
Secretary General of the Council of Europe. (2015). State of democracy, human rights and the rule of law in Europe: A shared responsibility for democratic security in Europe. Council of Europe, p. 10.
Sénat de la République Française. (2016). Le contrôle et l’évaluation des dispositifs législatifs relatifs à la sécurité intérieure et à la lutte contre le terrorisme: Annexes, Sénat de la République Français. Retrieved January 17, 2016, from http://www.senat.fr/ (home page).
Shaohui, T. (2014). China inspects online videos in porn, rumour crackdown. Xinhua. Retrieved January 6, 2016, from http://news.xinhuanet.com/english/china/2014-11/06/c_133771062.htm
Shaohui, T. (2015). China beefs up cyber police force. Xinhua. Retrieved January 6, 2016, from http://news.xinhuanet.com/english/2015-08/12/c_134509062.htm
Shapiro, I. (2012). On non-domination. University of Toronto Law Journal, 62(3), 293–336.
Shirk, S. (Ed.). (2011). Changing media, changing China. New York: Oxford University Press.
Spence, J. (2001). Treason by the book. London: Allen Lane History, Penguin Books.
Standing Committee. (2015). China’s draft cybersecurity Law. National People’s Congress of the People’s Republic of China. Retrieved March 17, 2016, from http://chinalawtranslate.com/cybersecuritydraft
State Council of the People’s Republic of China. (1997). Computer information network and internet security, protection, and management regulations. State Council PRC, Section 5.
Stop-Dijihadism. (2015). Stop djihadisme index. Gouvernement.fr. Retrieved December 30, 2015, from http://www.stop-djihadisme.gouv.fr/index.html
Tai, Z. (2006). The internet in China: Cyberspace and civil society. New York: Routledge.
Tai, Z. (2010). Internet surveillance in China from golden shield to green dam. In F. Duarte, R. J. Firmino, & C. Ultramari (Eds.), ICTs for mobile and ubiquitous urban infrastructures: Surveillance, locative media and global networks. Hershey, PA: IGI Global.
Tan, Z., Mueller, M., & Foster, W. (1997). China’s new internet regulations: Two steps forward, one step back. Communications of the ACM, 40(12), 11–16.
United Nations General Assembly. (1966). International Covenant of Civil and Political Rights, G.A. res. 2200A (XXI), 21 U.N. GAOR Supp. (No. 16) at 52, U.N. Doc. A/6316 (1966), 999 U.N.T.S. 171, entered into force 23 March 1976, article 19.
Wang F. (2014, August 7–8). Site-blocking orders in the EU: Justifications and feasibility. 14th Annual Intellectual Property Scholars Conference (IPSC), Boalt Hall School of Law, University of California, Berkeley.
Weber, A. (2014). Manual on hate speech. Strasbourg: Council of Europe.
World Economic Forum. (2015). Global information technology report: China. World Economic Forum. Retrieved March 17, 2016, from http://www.weforum.org (home page).
Xi, J. (2013). Outline of Xi Jinping’s speech at the National Propaganda and Ideology Work Conference (网传习近平8•19讲话全文:言论方面要敢抓敢管敢于亮剑). China Digital Times. Retrieved October 23, 2016 from http://chinadigitaltimes.net/chinese/2013/11
Xiao, Q. (2011). The rise of online public opinion and its impact. In S. Shirk (Ed.), Changing media, changing China. New York: Oxford University Press.
Xiao Q. (2013). The grass-mud horse lexicon: Translating the resistance discourse of Chinese netizens. China Digital Times. Retrieved March 17, 2016, from http://chinadigitaltimes.net (home page).
Xinhua. (2015). Sina faces suspension over lack of censorship. China Daily. Retrieved January 6, 2016, from http://www.chinadaily.com.cn/business/tech/2015-04/11/content_20410487.htm
Xinhua. (2016). China vows to make Party’s voice strongest in cyberspace. Xinhuanet. Retrieved January 17, 2016, from http://news.xinhuanet.com/english/2016-01/07/c_134986363.htm
Yang, G. (2009). The power of the internet in China: Citizen activism online. New York: Columbia University Press.
Yin, C. (2015). Push for real IDs to expand. China Daily. Retrieved January 14, 2015, from http://usa.chinadaily.com.cn/china/2015-01/14/content_19312751.htm
Yuan, G. (2015). Blocking VPN is for internet safety: Official. China Daily. Retrieved January 6, 2016, from http://usa.chinadaily.com.cn (home page).
Yuen, S. (2015). Becoming a cyber power. China Perspectives, 2015(2), 53–58.
Zhang, X., & Zheng, Y. (Eds.). (2009). China’s information and communications technology revolution: Social changes and state responses. London: Routledge.
Zheng, S., & Ward, M. R. (2011). The effects of market liberalization and privatization on Chinese telecommunications. China Economic Review, 22(2), 210–220.
Zheng, Y. (2008). Technological empowerment: The internet, state, and society in China. Stanford, CA: Stanford University Press.
Zhou, Y. (2006). Historicizing online politics: Telegraphy, the internet and political participation in China. Stanford, CA: Stanford University Press.
Author information
Authors and Affiliations
Copyright information
© 2017 The Author(s)
About this chapter
Cite this chapter
Perry, S., Roda, C. (2017). Online Censorship. In: Human Rights and Digital Technology. Palgrave Macmillan, London. https://doi.org/10.1057/978-1-137-58805-0_4
Download citation
DOI: https://doi.org/10.1057/978-1-137-58805-0_4
Published:
Publisher Name: Palgrave Macmillan, London
Print ISBN: 978-1-137-58804-3
Online ISBN: 978-1-137-58805-0
eBook Packages: Political Science and International StudiesPolitical Science and International Studies (R0)