• All Stories
  • Journalists
  • Expert Advisories
  • Media Contacts
  • X (Twitter)
  • Arts & Culture
  • Business & Economy
  • Education & Society
  • Environment
  • Law & Politics
  • Science & Technology
  • International
  • Michigan Minds Podcast
  • Michigan Stories
  • 2024 Elections
  • Artificial Intelligence
  • Abortion Access
  • Mental Health

‘Extremely aggressive’ internet censorship spreads in the world’s democracies

  • Kate McAlpine

Censored Planet by salvey on Sketchfab

The largest collection of public internet censorship data ever compiled shows that even citizens of the world’s freest countries are not safe from internet censorship.

A University of Michigan team used Censored Planet, an automated censorship tracking system launched in 2018 by assistant professor of electrical engineering and computer science Roya Ensafi, to collect more than 21 billion measurements over 20 months in 221 countries. They will present the findings Nov. 10 at the 2020 ACM Conference on Computer and Communications Security.

“We hope that the continued publication of Censored Planet data will enable researchers to continuously monitor the deployment of network interference technologies, track policy changes in censoring nations, and better understand the targets of interference,” Ensafi said. “While Censored Planet does not attribute censorship to a particular entity, we hope that the massive data we’ve collected can help political and legal scholars determine intent.”

News websites blocked in networks in Poland; social networking sites in Sudan

Ensafi’s team found that censorship is increasing in 103 of the countries studied, including unexpected places like Norway, Japan, Italy, India, Israel and Poland—countries which the paper notes are rated as some of the freest in the world by advocacy group Freedom House. They were among nine countries where Censored Planet found significant, previously undetected censorship events between August of 2018 and April of 2020. Previously undetected events were also identified in Cameroon, Ecuador and Sudan.

While the study observed an increase in blocking activity in these countries, most were driven by organizations or internet service providers filtering content. The study did not observe any nationwide censorship policies such as those in China. While the United States saw a smaller uptick in blocking activity, Ensafi points out that the groundwork for such blocking has been put in place in the United States.

“When the United States repealed net neutrality, they created an environment in which it would be easy, from a technical standpoint, for internet service providers to interfere with or block internet traffic,” Ensafi said. “The architecture for greater censorship is already in place and we should all be concerned about heading down a slippery slope.”

It’s already happening abroad, the study shows.

“What we see from our study is that no country is completely free,” said Ram Sundara Raman, a PhD candidate in computer science and engineering at U-M and the first author on the paper. “Today, many countries start with legislation that compels internet service providers to block something that’s obviously bad like child sex abuse material. But once that blocking infrastructure is in place, governments can block any websites they choose, and it’s usually a very opaque process. That’s why censorship measurement is crucial, particularly continuous measurements that show trends over time.”

Norway, for example—tied with Finland and Sweden as the world’s freest country according to Freedom House—passed a series of laws requiring internet service providers to block some gambling and pornography content, beginning in early 2018. But in Norway, Censored Planet’s measurements also identified network inconsistencies across a broader range of content, including human rights websites like Human Rights Watch and online dating sites like match.com.

Similar tactics show up in other countries, often in the wake of large political events, social unrest or new laws. While Censored Planet can detect increases in censorship, it cannot identify any direct connection to political events. It’s also important to note that it’s not always government-demanded network censorship that leads to websites being unreachable, though.

Some news websites were blocked in a few networks in Japan during the G20 Summit in June of 2019. News, human rights, and government websites saw a censorship spike in certain networks in Poland while a series of protests occurred in July of 2019, and social media websites were blocked in Sri Lanka after a series of bomb blasts in the country in January 2019. Some online dating websites were blocked in India after the country repealed laws against gay sex in September of 2018.

Censored Planet releases technical details for researchers, activists

Roya Ensafi. Image credit: Joseph Xu, Michigan Engineering

Roya Ensafi. Image credit: Joseph Xu, Michigan Engineering

The researchers say the findings show the effectiveness of Censored Planet’s approach, which turns public internet servers across the globe into automated sentries that can monitor and report when access to websites is being blocked. Running continuously, it takes billions of automated measurements and then uses a series of tools and filters to analyze the data, removing noise and teasing out trends.

The paper also makes public technical details about the workings of Censored Planet that Sundara Raman says will make it easier for other researchers to draw insights from the project’s data. It will also help activists make more informed decisions about where to focus their efforts.

“It’s very important for people who work on circumvention to know exactly what’s being censored on which network and what method is being used,” Ensafi said. “That’s data that Censored Planet can provide, and tech experts can use it to devise circumventions for censorship efforts.”

Censored Planet’s constant, automated monitoring is a departure from traditional approaches that rely on volunteers to collect data manually from inside the countries being monitored. Manual monitoring can be dangerous for volunteers, who may face reprisals from governments. The limited scope of these approaches also means that efforts are often focused on countries already known for censorship, enabling nations that are perceived as freer to fly under the radar. While censorship efforts generally start small, Sundara Raman says they could have big implications in a world that is increasingly dependent on the internet for essential communication needs.

“We imagine the internet as a global medium where anyone can access any resource, and it’s supposed to make communication easier, especially across international borders,” he said. “We find that if this upward trend of increasing censorship continues, that won’t be true anymore. We fear this could lead to a future where every country has a completely different view of the internet.”

The paper is titled “ Censored Planet: An Internet-wide, Longitudinal Censorship Observatory. ” The research team also included former U-M computer science and engineering student Prerana Shenoy, and Katharina Kohls, an assistant professor at Radboud University in Nijmegen, Netherlands. The research was supported in part by the U.S. National Science Foundation, Award CNS-1755841.

Clarifications: This story has been updated to include additional nuance about the research, including: The names of the Wall Street Journal and Washington Post websites were removed from the subhead and the body of the story because the instance of blocking was only observed in one network and may be a case of misconfiguration rather than censorship.

More information:

  • Roya Ensafi
  • Ram Sundara Raman

University of Michigan Logo

412 Maynard St. Ann Arbor, MI 48109-1399 Email [email protected] Phone 734-764-7260 About Michigan News

  • Engaged Michigan
  • Global Michigan
  • Michigan Medicine
  • Public Affairs

Publications

  • Michigan Today
  • The University Record

Office of the Vice President for Communications © 2024 The Regents of the University of Michigan

Home

Study at Cambridge

About the university, research at cambridge.

  • For Cambridge students
  • For our researchers
  • Business and enterprise
  • Colleges and Departments
  • Email and phone search
  • Give to Cambridge
  • Museums and collections
  • Events and open days
  • Fees and finance
  • Postgraduate courses
  • How to apply
  • Fees and funding
  • Postgraduate events
  • International students
  • Continuing education
  • Executive and professional education
  • Courses in education
  • How the University and Colleges work
  • Visiting the University
  • Annual reports
  • Equality and diversity
  • A global university
  • Public engagement

Internet censorship: making the hidden visible

  • Research home
  • About research overview
  • Animal research overview
  • Overseeing animal research overview
  • The Animal Welfare and Ethical Review Body
  • Animal welfare and ethics
  • Report on the allegations and matters raised in the BUAV report
  • What types of animal do we use? overview
  • Guinea pigs
  • Equine species
  • Naked mole-rats
  • Non-human primates (marmosets)
  • Other birds
  • Non-technical summaries
  • Animal Welfare Policy
  • Alternatives to animal use
  • Further information
  • Funding Agency Committee Members
  • Research integrity
  • Horizons magazine
  • Strategic Initiatives & Networks
  • Nobel Prize
  • Interdisciplinary Research Centres
  • Open access
  • Energy sector partnerships
  • Podcasts overview
  • S2 ep1: What is the future?
  • S2 ep2: What did the future look like in the past?
  • S2 ep3: What is the future of wellbeing?
  • S2 ep4 What would a more just future look like?

Barbed wire

Despite being founded on ideals of freedom and openness, censorship on the internet is rampant, with more than 60 countries engaging in some form of state-sponsored censorship. A research project at the University of Cambridge is aiming to uncover the scale of this censorship, and to understand how it affects users and publishers of information

Censorship over the internet can potentially achieve unprecedented scale Sheharbano Khattak

For all the controversy it caused, Fitna is not a great film. The 17-minute short, by the Dutch far-right politician Geert Wilders, was a way for him to express his opinion that Islam is an inherently violent religion. Understandably, the rest of the world did not see things the same way. In advance of its release in 2008, the film received widespread condemnation, especially within the Muslim community.

When a trailer for Fitna was released on YouTube, authorities in Pakistan demanded that it be removed from the site. YouTube offered to block the video in Pakistan, but would not agree to remove it entirely. When YouTube relayed this decision back to the Pakistan Telecommunications Authority (PTA), the decision was made to block YouTube.

Although Pakistan has been intermittently blocking content since 2006, a more persistent blocking policy was implemented in 2011, when porn content was censored in response to a media report that highlighted Pakistan as the top country in terms of searches for porn. Then, in 2012, YouTube was blocked for three years when a video, deemed blasphemous, appeared on the website. Only in January this year was the ban lifted, when Google, which owns YouTube, launched a Pakistan-specific version, and introduced a process by which governments can request the blocking of access to offending material.

All of this raises the thorny issue of censorship. Those censoring might raise objections to material on the basis of offensiveness or incitement to violence (more than a dozen people died in Pakistan following widespread protests over the video uploaded to YouTube in 2012). But when users aren’t able to access a particular site, they often don’t know whether it’s because the site is down, or if some force is preventing them from accessing it. How can users know what is being censored and why?

“The goal of a censor is to disrupt the flow of information,” says Sheharbano Khattak, a PhD student in Cambridge’s Computer Laboratory, who studies internet censorship and its effects. “internet censorship threatens free and open access to information. There’s no code of conduct when it comes to censorship: those doing the censoring – usually governments – aren’t in the habit of revealing what they’re blocking access to.” The goal of her research is to make the hidden visible.

She explains that we haven’t got a clear understanding of the consequences of censorship: how it affects different stakeholders, the steps those stakeholders take in response to censorship, how effective an act of censorship is, and what kind of collateral damage it causes.

Because censorship operates in an inherently adversarial environment, gathering relevant datasets is difficult. Much of the key information, such as what was censored and how, is missing. In her research, Khattak has developed methodologies that enable her to monitor censorship by characterising what normal data looks like and flagging anomalies within the data that are indicative of censorship.

She designs experiments to measure various aspects of censorship, to detect censorship in actively and passively collected data, and to measure how censorship affects various players.

The primary reasons for government-mandated censorship are political, religious or cultural. A censor might take a range of steps to stop the publication of information, to prevent access to that information by disrupting the link between the user and the publisher, or to directly prevent users from accessing that information. But the key point is to stop that information from being disseminated.

Internet censorship takes two main forms: user-side and publisher-side. In user-side censorship, the censor disrupts the link between the user and the publisher. The interruption can be made at various points in the process between a user typing an address into their browser and being served a site on their screen. Users may see a variety of different error messages, depending on what the censor wants them to know. 

“The thing is, even in countries like Saudi Arabia, where the government tells people that certain content is censored, how can we be sure of everything they’re stopping their citizens from being able to access?” asks Khattak. “When a government has the power to block access to large parts of the internet, how can we be sure that they’re not blocking more than they’re letting on?”

What Khattak does is characterise the demand for blocked content and try to work out where it goes. In the case of the blocking of YouTube in 2012 in Pakistan, a lot of the demand went to rival video sites like Daily Motion. But in the case of pornographic material, which is also heavily censored in Pakistan, the government censors didn’t have a comprehensive list of sites that were blacklisted, so plenty of pornographic content slipped through the censors’ nets. 

Despite any government’s best efforts, there will always be individuals and publishers who can get around censors, and access or publish blocked content through the use of censorship resistance systems. A desirable property, of any censorship resistance system is to ensure that users are not traceable, but usually users have to combine them with anonymity services such as Tor.

“It’s like an arms race, because the technology which is used to retrieve and disseminate information is constantly evolving,” says Khattak. “We now have social media sites which have loads of user-generated content, so it’s very difficult for a censor to retain control of this information because there’s so much of it. And because this content is hosted by sites like Google or Twitter that integrate a plethora of services, wholesale blocking of these websites is not an option most censors might be willing to consider.”

In addition to traditional censorship, Khattak also highlights a new kind of censorship – publisher-side censorship – where websites refuse to offer services to a certain class of users. Specifically, she looks at the differential treatments of Tor users by some parts of the web. The issue with services like Tor is that visitors to a website are anonymised, so the owner of the website doesn’t know where their visitors are coming from. There is increasing use of publisher-side censorship from site owners who want to block users of Tor or other anonymising systems.

“Censorship is not a new thing,” says Khattak. “Those in power have used censorship to suppress speech or writings deemed objectionable for as long as human discourse has existed. However, censorship over the internet can potentially achieve unprecedented scale, while possibly remaining discrete so that users are not even aware that they are being subjected to censored information.”

Professor Jon Crowcroft, who Khattak works with, agrees: “It’s often said that, online, we live in an echo chamber, where we hear only things we agree with. This is a side of the filter bubble that has its flaws, but is our own choosing. The darker side is when someone else gets to determine what we see, despite our interests. This is why internet censorship is so concerning.”

“While the cat and mouse game between the censors and their opponents will probably always exist,” says Khattak. “I hope that studies such as mine will illuminate and bring more transparency to this opaque and complex subject, and inform policy around the legality and ethics of such practices.”

Creative Commons License

Read this next

A visualisation of one of the design scenarios highlighted in the latest paper

Call for safeguards to prevent unwanted ‘hauntings’ by AI chatbots of dead loved ones

internet censorship research paper

Emissions and evasions

Abstract colourful background

Lights could be the future of the internet and data transmission

internet censorship research paper

The Misinformation Susceptibility Test

Barbed wire

Credit: Hernán Piñera

Search research

Sign up to receive our weekly research email.

Our selection of the week's biggest Cambridge research news sent directly to your inbox. Enter your email address, confirm you're happy to receive our emails and then select 'Subscribe'.

I wish to receive a weekly Cambridge research news summary by email.

The University of Cambridge will use your email address to send you our weekly research news email. We are committed to protecting your personal information and being transparent about what information we hold. Please read our email privacy notice for details.

  • digital technology
  • social media
  • Digital society
  • Sheharbano Khattak
  • Jon Crowcroft
  • Computer Laboratory
  • School of Technology

Connect with us

Cambridge University

© 2024 University of Cambridge

  • Contact the University
  • Accessibility statement
  • Freedom of information
  • Privacy policy and cookies
  • Statement on Modern Slavery
  • Terms and conditions
  • University A-Z
  • Undergraduate
  • Postgraduate
  • Cambridge University Press & Assessment
  • Research news
  • About research at Cambridge
  • Spotlight on...

internet censorship research paper

Selected Research Papers in Internet Censorship

Read our latest paper on Russia's network changes Paper

© 2024 Censored Planet

An Internet-wide, Longitudinal Censorship Observatory

Censored Planet is a censorship measurement platform that collects data using multiple remote measurement techniques in more than 200 countries.

internet censorship research paper

Censored Planet Dashboard

Censored Planet, in collaboration with Google Jigsaw , has developed a public dashboard for exploring processed Censored Planet data.

February 24, 2023

January 19, 2023

December 6, 2022

The Censored Planet Observatory

The Censored Planet Observatory uses remote measurement techniques such as Augur, Satellite, Qauck and Hyperquack to run remote censorship measurements for thousands of websites. These techniques use features in existing Internet protocols and infrastructure to interact with remote systems, using their responses to determine the presence or absence of censorship. Thus, we eliminate the need for accessible vantage points or volunteers in different countries, surpassing scale, coverage, continuity, and safety limitations.

The observatory uses a modular design for measuring and analyzing Internet censorship. Censored Planet continously measures reachability to 2,000 websites from more than 95,000 vantage points in 221 countries (a 42-360% increase compared to other measurement platforms). Censored Planet also includes a rapid focus feature that can analyze certain censorship events in depth. Censored Planet finds increasing levels of censorship in 103 countries, and has detected more than 15 key censorship events.

internet censorship research paper

Protecting Users from Adversarial Networks

MADWeb 2023

Censored Planet: An Internet-wide, Longitudinal Censorship Observatory

Censored Planet Community Webinar 2021

Censored Planet Community Webinar

Censored Planet: An Internet-wide, Longitudinal Censorship Observatory

Censored Planet: An Internet-wide, Longitudinal Censorship Observatory

ACM SIGCSAC CCS 2020

Censored Planet: Measuring Internet censorship remotely

Censored Planet: Measuring Internet censorship remotely

Internet Measurement Village 2020

Censored Planet: exposing internet censorship worldwide

Censored Planet: exposing internet censorship worldwide

Michigan Engineering

All the data collected from the Observatory is publicly available

Compressed files containing JSON data (1 file per scan per technique).

Documentation

Documentation about Censored Planet and data formats.

Explore Censored Planet data through our interactive dashboard.

Latest Reports

Our research publications are often technical and complex, here we aim to communicate our research to a broader audience.

CERTainty: Detecting DNS Manipulation at Scale using TLS Certificates

We developed a novel technique, *CERTainty*, to detect DNS manipulation by utilizing a widely adopted trusted infrastructure: TLS certificates.

Locating and Examining Censorship Devices

We release novel network measurement methods for locating and examining censorship devices

TSPU: Russia’s Decentralized Censorship System

We measured Russia's new TSPU censorship system, which empowers the Russian government to unilaterally roll out information control measures.

OpenVPN is Open to VPN Fingerprinting

We identified OpenVPN's fingerprinting vulnerabilities and tested them with a real-world ISP

Call for Students

We are always looking for promising students (computer science, political science, journalism) and developers to join our team!

We are always looking for promising students (CS, political science, journalism) and developers to join our team!

Featured Publications

August 2024 USENIX Security

Fingerprinting Obfuscated Proxy Traffic with Encapsulated TLS Handshakes

@inproceedings {Xue2024TLS, author = {Diwen Xue and Michalis Kallitsis and Amir Houmansadr and Roya Ensafi}, title = {{Fingerprinting Obfuscated Proxy Traffic with Encapsulated TLS Handshakes}}, booktitle = {33st USENIX Security Symposium (USENIX Security 24)}, year = {2024}, address = {Philadelphia, PA}, publisher = {USENIX Association}, }

August 2023 Usenix Security Symposium 2023

Network Responses to Russia's Invasion of Ukraine in 2022: A Cautionary Tale for Internet Freedom

@inproceedings{ramesh2023network, title = {{Network Responses to Russia's Invasion of Ukraine in 2022: A Cautionary Tale for Internet Freedom}}, author = {Ramesh, Reethika and Sundara Raman, Ram and Virkud, Apurva and Dirksen, Alexandra and Huremagic, Armin and Fifield, David and Rodenburg, Dirk and Hynes, Rod and Madory, Doug and Ensafi, Roya}, booktitle = {32nd USENIX Security Symposium (USENIX Security 23)}, year = {2023}, address = {Anaheim, CA}, publisher = {USENIX Association} }

July 2023 Free and Open Communications on the Internet

The Use of Push Notification in Censorship Circumvention

@inproceedings{Xue2023PUSH, author = {Diwen Xue and Roya Ensafi}, title = {{The Use of Push Notification in Censorship Circumvention}}, booktitle = {Free and Open Communications on the Internet}, year = {2023}, address = {Lausanne, Switzerland}, publisher = {Proceedings on Privacy Enhancing Technologies} }

July 2023 Privacy Enhancing Technology Symposium

CERTainty: Detecting DNS Manipulation using TLS Certificates

@inproceedings{tsai2023detecting, title = {CERTainty: Detecting DNS Manipulation using TLS Certificates}, author = {Tsai, Elisa and Kumar, Deepak and Sundara Raman, Ram and Li, Gavin and Eiger, Yael and Ensafi, Roya}, booktitle={Privacy Enhancing Technologies Symposium (PETS)}, year={2023} }

February 2023 Free and Open Communications on the Internet (FOCI) 2023

Advancing the Art of Censorship Data Analysis

@inproceedings{sundararaman2023advancing, title = {Advancing the Art of Censorship Data Analysis}, author = {Sundara Raman, Ram and Virkud, Apurva and Laplante, Sarah and Fortuna, Vinicius and Ensafi, Roya}, booktitle={Free and Open Communications on the Internet (FOCI)}, year={2023} }

December 2022 Conference on emerging Networking EXperiments and Technologies (CoNEXT 2022)

Network measurement methods for locating and examining censorship devices

BibTex PDF Slides

@inproceedings {SundaraRaman2022Network, author = {Ram Sundara Raman and Mona Wang and Jakub Dalek and Jonathan Mayer and Roya Ensafi}, title = {Network Measurement Methods for Locating and Examining Censorship Devices}, booktitle = {Proceedings of the 18th International Conference on emerging Networking EXperiments and Technologies (CoNEXT '22)}, year = {2022}, address = {Rome, Italy}, publisher = {Association for Computing Machinery}, }

In the Media

Censored Planet projects and research reports have appeared in various news outlets and tech publications.

Questions? Get in touch!

[email protected]

Cybercrime, Censorship, Perception and Bypassing Controls: An Exploratory Study

  • Conference paper
  • Cite this conference paper

internet censorship research paper

  • Ibrahim Baggili 17 ,
  • Moza Al Shamlan 18 ,
  • Bedoor Al Jabri 18 &
  • Ayesha Al Zaabi 18  

Part of the book series: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ((LNICST,volume 114))

Included in the following conference series:

  • International Conference on Digital Forensics and Cyber Crime

1982 Accesses

1 Altmetric

Countries have employed the Internet proxy as a censorship mechanism for various reasons. Concurrently, cyber criminal activities continue to rise. This research explores peoples’ engagement in bypassing the Internet proxy and if it is related to cyber criminal engagement. Through an experimental design, participants were randomly assigned to three groups. Using manipulation paragraphs, in the first group (Group 1), a positive view on the Internet proxy was presented. In the second group (Group 2), a negative view on the Internet proxy was presented. The third group (Group 3) was used as the control group, where the participants’ view of the Internet proxy was not manipulated. All three groups were asked to self-report their rate of proxy bypass (SRPBE) and cybercrime engagement (CCI). The results indicated a significant positive correlation between self-reported cyber criminal engagement and self-reported proxy bypass engagement. The results also showed that individuals with more knowledge in computers are more likely to bypass the Internet proxy. However, individuals with better knowledge in computers are not necessarily the ones that are more likely to commit cyber criminal activities. The results were inconclusive on whether or not the manipulation paragraphs used had an effect on the participants’ view of the Internet Proxy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Unable to display preview.  Download preview PDF.

Internet World Stats: Middle East Internet Usage Statistics, Population, Facebook and Telecommunications Reports (2009), http://www.internetworldstats.com/stats5.htm

OpenNet Initiative: Internet Filtering in the United Arab Emirates (2005), http://opennet.net/sites/opennet.net/files/ONI_UAE_2009.pdf

Olsen, E.: Rare Criticism of Gulf State Internet Censorship (2002), http://blogcritics.org/culture/article/rare-criticism-of-gulf-state-internet/

Day, N.: Censorship: Or Freedom of Expression. Learner Publishing Group (2001)

Google Scholar  

Kwong, M.: Reports High Website Censorship. The National Newspaper (2009), http://www.thenational.ae/news/uae-news/uae-reports-high-website-censorship

Nick: Top 10 Countries Censoring the Web (2008), http://www.dailybits.com/top-10-countries-censoring-the-web/

Vandergrift, K.E.: Intellectual Freedom, and Youth (1997), http://comminfo.rutgers.edu/professional-development/childlit/censorship.html

Cortes, M.V.: Internet Censorship Around the World, University of Chile, Chile (2000), http://www.isoc.org/inet2000/cdproceedings/8k/8k_4.htm

Schrader, P.: An Obsolete Honor: A Story of the German Resistance to Hitler. iUniverse (2008)

Kenney, K.: Prohibitions in the 1920s (2009), http://kim-kenney.suite101.com/prohibition-in-the-1920s-a90037

1920-30.com: Prohibition in the United States (2005), http://www.1920-30.com/prohibition/

Hesketh, T., Lu, L., Xiang, Z.W.: The Effect of China’s One-Child Family Policy after 25 years. The New England Journal of Medicine (2005), http://www.nejm.org/doi/full/10.1056/NEJMhpr051833

Macartney, J.: Factfile: China’s one-child policy. TimesOnline (2008), http://uyghuramerican.org/old/articles/1458/1/Factfile-Chinas-one-child-policy/index.html

CNN: China to keep one-child policy. CNN (2008), http://articles.cnn.com/2008-03-10/world/china.onechild_1_preference-for-male-heirs-traditional-preference-gender-imbalance?_s=PM:WORLD

Hall, A.T.: China’s one policy and male surplus as a source of demand for sex trafficking in China (2010), http://nfsacademy.org/wp-content/uploads/2011/02/Hall-Chinas-One-Child-Policy.pdf

Feminist.com: History of Abortion. Touchstone Publishing (1998), http://www.feminist.com/resources/ourbodies/abortion.html

NARAL Foundation: Choices: Women Speak Out About Abortion (2009), http://www.prochoiceamerica.org/media/fact-sheets/abortion-distorting-science-safety-legal-abortion.pdf

Thierer, A.D.: Regulating Video Games: Parents or Uncle Sam? CATO Institute (2003), http://www.cato.org/publications/commentary/regulating-video-games-parents-or-uncle-sam

Gentile, D.A., Anderson, C.A.: Violent Video Games: The Effects on Youth, and Public Policy Implications. Handbook of Children, Culture, and Violence. Thousand Oaks (2006), http://www.psychology.iastate.edu/faculty/caa/abstracts/2005-2009/05ga2.pdf

Wagner, M.A., Wagner, J.: Should We Censor Violence in the Media? (2002), http://www.yellodyno.com/pdf/Violence_in_the_media.pdf

Rhodes, R.: Hollow Claims About Fantasy Violence. The New York Times (2000), http://www.nytimes.com/2000/09/17/opinion/hollow-claims-about-fantasy-violence.html?pagewanted=all&src=pm

Castillo, F.: Banned and Controversial Books (2008), http://banned-books.com/bblist.html

Banned Books Week (2009), http://bannedbooksweek.org/about

Flanagan: The Futility of Censorship. Yahoo! News (2009), http://business.maktoob.com/20090000404858/The_futility_of_censorship/Article.htm

Furnell, S.: Cybercrime: vandalizing the Information Society. Addison-Wesley Professional Publishers (2001)

Shinder, D.: Scene of the cybercrime: computer forensics handbook (2002), http://www.google.com/books?hl=ar&lr=&id=nQyucKKH6RgC&oi=fnd&pg=PR25&dq=cyber+crime+&ots=WVbXcJB81-&sig=Oszwa45V1PaTUTneqKDE9UuvX-I#v=onepage&q=cyber%20crime&f=false

(Stocks, n.d.)

Heffner, C.: Introduction to Sensation and Perception (2004), http://allpsych.com/psychology101/sensation_perception.html

Wikia: Perception: Perception and Reality (2001), http://psychology.wikia.com/wiki/Experimental:Perception

Lacasse, M.: How the industry manipulated public opinion: Why you believe what you believe (2009), http://www.healingdaily.com/beliefs.htm

Bernay, E.L.: Propaganda. Kennikat Press (1972)

Budd, R.W., Ruben, B.D.: Beyond Media: New Approaches to Mass Communication. Transaction Publishers (1987)

Thayer, L.: On the Mass Media and Mass Communication: Notes Toward a Theory. Oxford University Press (1986)

Ball-Rokeach, S.J., DeFleur, M.L.: A dependency model of mass media effects. Communication Research 3, 3–21 (1976)

Article   Google Scholar  

Johnson, B.K.: Dawn of the Cognetic Age: Fighting Ideological War by Putting Thought in Motion with Impact (2007), http://www.airpower.maxwell.af.mil/airchronicles/apj/apj07/win07/johnson.html

Reis, H.T., Judd, C.M.: Handbook of Research: Methods in Social and Personality Psychology. Cambridge University Press, Cambridge (2000)

Bland, E.: Magnets can manipulate morality: study (2010), http://www.abc.net.au/science/articles/2010/03/30/2859767.htm

Amaral, J.R., Sabbatini, R.M.: Placebo Effect: The Power of the Sugar Pill (1999), http://www.cerebromente.org.br/n09/mente/placebo1_i.htm

Rogers, M.: A social learning theory and moral disengagement analysis of criminal computer behavior: An exploratory study. University of Manitoba, Canada (2001)

Baggili, I.M.: Effects of Anonymity, Pre-Employment Integrity and Antisocial Behavior on Self-Reported Cyber Crime Engagement: An Exploratory Study. Doctoral dissertation, Purdue University, USA (2009), http://dl.acm.org/citation.cfm?id=1834973

Baggili, I.M., Rogers, M.: Self-Reported Cyber Crime: An Analysis on the Effects of Anonymity and Pre-Employment Integrity. Zayed University, UAE, Purdue University, USA (2009), http://www.cybercrimejournal.com/ibrahimmarcusIJCCJuly2009.pdf

Download references

Author information

Authors and affiliations.

Tagliatela College of Engineering, Department of Electrical and Computer Engineering and Computer Science, University of New Haven, CT, USA

Ibrahim Baggili

College of Technological Innovation, Advanced Cyber Forensics Research Laboratory, Zayed University, United Arab Emirates

Moza Al Shamlan, Bedoor Al Jabri & Ayesha Al Zaabi

You can also search for this author in PubMed   Google Scholar

Editor information

Editors and affiliations.

Center for Education and Research in Information Assurance and Security, Purdue University, 47906, Lafayette, IN, USA

Marcus Rogers

The University of Alabama, 35487, Tuscaloosa, AL, USA

Kathryn C. Seigfried-Spellar

Rights and permissions

Reprints and permissions

Copyright information

© 2013 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper.

Baggili, I., Al Shamlan, M., Al Jabri, B., Al Zaabi, A. (2013). Cybercrime, Censorship, Perception and Bypassing Controls: An Exploratory Study. In: Rogers, M., Seigfried-Spellar, K.C. (eds) Digital Forensics and Cyber Crime. ICDF2C 2012. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 114. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-39891-9_7

Download citation

DOI : https://doi.org/10.1007/978-3-642-39891-9_7

Publisher Name : Springer, Berlin, Heidelberg

Print ISBN : 978-3-642-39890-2

Online ISBN : 978-3-642-39891-9

eBook Packages : Computer Science Computer Science (R0)

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

  • Publish with us

Policies and ethics

  • Find a journal
  • Track your research

U.S. flag

An official website of the United States government

The .gov means it’s official. Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

The site is secure. The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

  • Publications
  • Account settings

Preview improvements coming to the PMC website in October 2024. Learn More or Try it out now .

  • Advanced Search
  • Journal List
  • Elsevier - PMC COVID-19 Collection

Logo of pheelsevier

Censoring political opposition online: Who does it and why

Ashwini ashokkumar.

a Department of Psychology, University of Texas at Austin, 108 E. Dean Keeton, Austin, TX 78712-0187, United States

Sanaz Talaifar

William t. fraser, rodrigo landabur.

b Department of Psychology, Universidad de Chile, Ignacio Carrera Pinto 1045, Nuñoa, Región Metropolitana, Chile

Michael Buhrmester

c Institute of Cognitive and Evolutionary Anthropology, University of Oxford, 51-53 Banbury Road, Oxford OX2 6PE, UK

Ángel Gómez

d Department of Social and Organizational Psychology, Facultad de Psicología (UNED), C/Juan del Rosal, 10, 28040 Madrid, Spain

Borja Paredes

e Department of Communication Theories and Analysis, Facultad de Ciencias de la Información (Universidad Complutense de Madrid), Avenida Complutense, 3, 28040 Madrid, Spain

William B. Swann, Jr

Associated data.

As ordinary citizens increasingly moderate online forums, blogs, and their own social media feeds, a new type of censoring has emerged wherein people selectively remove opposing political viewpoints from online contexts. In three studies of behavior on putative online forums, supporters of a political cause (e.g., abortion or gun rights) preferentially censored comments that opposed their cause. The tendency to selectively censor cause-incongruent online content was amplified among people whose cause-related beliefs were deeply rooted in or “fused with” their identities. Moreover, six additional identity-related measures also amplified the selective censoring effect. Finally, selective censoring emerged even when opposing comments were inoffensive and courteous. We suggest that because online censorship enacted by moderators can skew online content consumed by millions of users, it can systematically disrupt democratic dialogue and subvert social harmony.

  • • We use a novel experimental paradigm to study censorship in online environments.
  • • People selectively censor online content that challenges their political beliefs.
  • • People block online authors of posts they disagree with.
  • • When beliefs are rooted in identity, selective censoring is amplified.
  • • Selective censoring occurred even for comments without offensive language.

1. Introduction

In the run-up to the 2016 presidential elections, the moderators of a large online community of Trump supporters deleted the accounts of over 2000 Trump critics. The moderators even threatened to “throw anyone over our walls who fails to behave themselves” ( Conditt, 2016 ). This phenomenon of silencing challenging voices on social media is not limited to the hundreds of thousands of designated moderators of online communities and forums; even ordinary citizens can delete comments on their own posts and report or block political opponents ( Linder, 2016 ). To study this new form of censorship, we developed a novel experimental paradigm that assessed the tendency for moderators to selectively censor (a) content that is incongruent with their political cause (a political position or principle that people strongly advocate) and (b) the authors of such incongruent content. The studies also tested whether identity-related processes amplified the selective censorship of cause-incongruent content. Further, we tested whether the identity-driven selective censoring of political opponents' posts occurs even when opponents express their views in a courteous and inoffensive manner. To set the stage for this research, we begin with a discussion of past literature on biased exposure to online content.

1.1. Biased exposure to online content: selective information-seeking and avoidance

Behavioral scientists have long noted that people create social environments that support their values and beliefs ( McPherson et al., 2001 ). People gravitate to regions, neighborhoods or occupations in which they are surrounded by individuals with similar personalities ( Rentfrow et al., 2008 ) or political ideologies ( Motyl et al., 2014 ). Once in these congruent environments, people are systematically exposed to information that aligns with their own views ( Hart et al., 2009 ; Sears and Freedman, 1967 ). In addition, people actively display biases in behavior (e.g. choice of relationship partners) and cognition (e.g. attention, recall, and interpretation of feedback) that encourage them to see more support for their beliefs than is justified by objective reality ( Garrett, 2008 ).

Parallel phenomena can occur in virtual worlds. People often find themselves in online bubbles of individuals who share political beliefs and information with each other but not with outsiders ( Adamic and Glance, 2005 ; Barberá et al., 2015 ). They also actively seek websites or online communities that support their pre-existing opinions ( Garimella and Weber, 2017 ; Iyengar and Hahn, 2009 ), and follow or connect with individuals whose opinions they endorse ( Bakshy et al., 2015 ; Brady et al., 2017 ). And when they process information that they encounter, they display confirmation biases that warp their visions of reality ( Hart et al., 2009 ; Van Bavel and Pereira, 2018 ). Some evidence also suggests that in addition to actively seeking attitude-consistent online content, people also avoid attitude-inconsistent content ( Garrett, 2009a ). Importantly, biases in information seeking are strongest for content related to political and moral issues ( Stroud, 2017 ) and are most prevalent among those who have strong views or ideologies ( Boutyline and Willer, 2017 ; Hart et al., 2009 ; Lawrence et al., 2010 ).

Although researchers have investigated biases in how people seek , consume , or avoid information in online contexts, to the best of our knowledge they have yet to examine how people might influence the content to which they and others are exposed through censorship. It is increasingly possible for individuals to censor others in online contexts by deleting others' comments on their own posts and pages ( John and Dvir-Gvirsman, 2015 ; Sibona, 2014 ). For moderators of popular social media pages and large forums, the scope of their ability to censor is multiplied as they often exercise control over content that millions view ( Matias, 2016a ; Wright, 2006 ).

Censorship is more extreme than biased information seeking because, in addition to biasing one's own online environment, censorship delimits the online content that other people are exposed to. Also, by silencing dissenters, censorship prevents them from voicing their views. And although the psychological processes underlying censorship may overlap with some of the defensive motivations producing selective information seeking ( Hart et al., 2009 ), censorship may in addition entail a hostile motivation to nullify opponents of the cause.

1.2. Censorship in offline and online environments

The majority of past studies on censorship have examined the association between political orientation and attitudes toward censorship. Whereas some studies have suggested that conservatives support censorship ( Fisher et al., 1999 ; Hense and Wright, 1992 ; Lindner and Nosek, 2009 ), others have reported evidence of censorship by people on both sides of the political spectrum ( Crawford and Pilanski, 2014 ; Suedfeld et al., 1994 ). One limitation of this work is that researchers have typically explored people's attitudes toward censorship rather than their censoring behaviors . Further, to our knowledge, no studies have systematically examined censoring behaviors in online settings.

As public pages and forums are increasingly moderated by everyday citizens ( Matias, 2016a ), the power to censor others is now widely available. For example, on the popular social media platform Reddit, almost 100,000 community moderators have the power to delete comments or entirely ban accounts associated with millions of users ( https://mods.reddithelp.com/ ). Even internet users who have no particular stature within online communities are able to moderate other people's comments on their own posts and blogs. People can “report” social media posts they find disagreeable ( John and Dvir-Gvirsman, 2015 ; Sibona, 2014 ) or simply delete or hide cause-incongruent comments on their own posts or blogs. Given that censoring in online contexts is easier (e.g., requires a single click) and may have fewer personal repercussions relative to offline contexts (e.g., more anonymity), it seems likely that online censoring will become increasingly prevalent. Here, we examine people's tendency to selectively censor content that is incongruent with a political cause they support.

1.3. Identity as a censorship amplifier

Not everyone will be equally motivated to selectively censor cause-incongruent content. For example, motivation to censor content will be particularly high when it challenges a political cause with which people's identities are strongly “fused” ( Swann Jr et al., 2012 ). For people who are strongly fused with a cause, threats to the cause will feel like threats to the self. This will induce strongly fused people to be particularly reactive to threatening content ( Gómez et al., 2011 ; Swann Jr et al., 2009 ). They may, for instance, go to great lengths to protect their group ( Swann Jr et al., 2014 ) and are even attempt to inflict serious harm on threatening outgroups ( Fredman et al., 2017 ). Therefore, we expect that strongly fused individuals would be especially apt to selectively censor incongruent content to preserve their cause against challenges. 1

Although we focused primarily on identity fusion as a potential amplifier of censorship, we also investigated several other identity-related measures that have been associated with intolerance of political opposition. The literature on self and identity broadly suggests that people's social identities relating to political groups and causes are potent predictors of action intended to advance one's group or cause (e.g., Ashokkumar et al., 2019 ; Swann Jr et al., 2012 ; Tajfel and Turner, 1979 ) and counter opponents ( Brewer, 2001 ; Fredman et al., 2017 ). In line with this reasoning, we investigated the effects of various other identity-related measures: indices of attitude strength, moral conviction, and identification with other supporters of the cause. Attitude strength and moral conviction are part of people's identities because their preferences and moral values are important parts of their self-related mental representations ( McAdams, 1995 ). Past research on attitude strength has revealed that people who hold extreme views about a cause or whose views are associated with feelings of certainty and personal significance are intolerant of others with dissimilar attitudes (e.g., Singh and Ho, 2000 ; Singh and Teoh, 1999 ). Similarly, moral convictions reflect people's deeply held beliefs regarding the morality of a cause ( Skitka and Mullen, 2002 ) and is known to predict an aversion to attitudinally dissimilar others ( Skitka et al., 2005 ). Finally, we assessed participants' identification with cause supporters, since identification has been found to be a potent predictor of pro-cause action ( Thomas et al., 2016 ). Although the foregoing variables have all been associated with intolerance of outgroups and are important components of people's identities (i.e. their mental self-representations), the causal, structural, and temporal relationships between these variables have not been clearly established. For example, it is unclear whether strong moral convictions cause greater group identification or the reverse ( Van Zomeren et al., 2012 ; Zaal et al., 2017 ). Similarly, the temporal relationship between fusion with cause and group identification is not clear ( Gómez et al., 2019 ). Prior work has shown that identity fusion is associated with moralized attitudes ( Talaifar and Swann Jr, 2019 ) but the causal relationship between these variables is unclear. Nevertheless, given that these variables have been found to predict a suite of behaviors related to intolerance of political opposition, we included them as potential predictors of selective censoring.

1.4. Overview of studies

The current research had two primary goals. First, we asked whether people assigned to moderate online content would selectively censor opposition to their political causes by deleting opposing comments and banning opponents from a forum. Second, we examined whether people whose cause-related beliefs were rooted in their identities would be especially likely to selectively censor incongruent content. In all studies, we recruited participants from the United States (US). Based on past reports that biases in information consumption are stronger for political and moral issues ( Stroud, 2017 ), we focused on political causes that are deemed to have a moral component. Specifically, we chose abortion rights (Studies 1–2) and gun rights (Study 3) as the focal issues. We also selected these issues because they are highly controversial in the US to raise the likelihood that most people would have relevant opinions. In fact, many believe that over the last half century these issues determined the outcome of multiple elections in the U.S. ( Leber, c., 2016 ; Riffkin, 2015 ).

All studies used a longitudinal design in which we measured all predictors at Time 1 (T1) and censoring at Time 2 (T2). At T1, we measured participants' position on an issue (e.g., abortion rights) and their identity fusion with the corresponding cause (e.g., pro-life or pro-choice cause). In Studies 2 and 3, we also measured other prominent identity-related measures, including strength of attitudes, moral conviction, and identification with cause supporters. As part of a seemingly unrelated study administered two weeks later (Time 2 or “T2”), we measured participants' censoring behavior using a novel simulation of an online forum. We sought participants' assistance in moderating the content of a putative online forum. Participants read comments and decided whether the comments needed to be retained or removed from the forum. Comments they chose to remove were considered “censored.” Each comment was systematically manipulated to be either congruent or incongruent with the participant's cause and either offensive or inoffensive. In Studies 2 and 3, we also asked participants whether the authors of the congruent and incongruent comments they read should be banned from the forum.

We operationalized selective censorship as either a preference for cause-congruent content or an intolerance of cause-incongruent content. We expected that cause supporters would selectively censor comments incongruent with their cause (Studies 1–3) and selectively ban the author of those incongruent comments (Study 2 & 3). We also expected that people whose identities were strongly aligned (“fused”) with the cause would be particularly likely to selectively censor incongruent comments (Studies 1–3) and selectively ban the authors of those comments (Study 2–3). We examined whether the effect of fusion was influenced by the presence of offensive language in the comments (Studies 1–3) and also whether the effect generalized to an array of other identity-related measures (Study 2 & 3). Further, in SOM-III we explored one potential mechanism driving the effect of fusion on selective censoring: strongly fused people's tendency to essentialize the cause. In all studies, we examined whether there were partisan differences in selective censoring (i.e. if selective censoring was stronger among pro-life vs. pro-choice supporters in Studies 1 and 2; pro-gun-rights vs. pro-gun-control supporters in Study 3), and we report any asymmetries between the two sides. For all three studies, we report all measures, manipulations, and exclusions.

2.1. Study 1 method

2.1.1. time 1 (t1), 2.1.1.1. participants.

In August 2017, we recruited 477 participants from Amazon's Mechanical Turk (MTurk), an appropriate source of data for our purposes given that MTurkers routinely review comments by actual website moderators ( Schmidt, 2015 ). 2 Participants first indicated their position on the issue of abortion rights (pro-choice vs. pro-life vs. neither/don't know). Thirty-five participants who reported neutral or no views on abortion rights were not allowed to proceed because a person's pre-existing position on abortion rights needs to be known in order to identify which comments are congruent vs. incongruent with their cause. We removed 32 respondents with identical IP addresses or MTurk Worker IDs to eliminate the possibility of a single respondent completing the survey twice. We excluded four participants who failed our attention check (see SOM-I). Our final T1 sample had 406 participants (49.8% female; 71.6% White; M age  = 36.06; SD age  = 11.59; 274 pro-choice and 132 pro-life participants). The higher proportion of pro-choice participants is typical in liberal-skewed online crowdsourcing platforms such as MTurk (e.g., Ashokkumar et al., 2019 ). In this and all studies, sample size was determined prior to data analysis.

2.1.1.2. Identity measures

Participants completed the seven-item verbal fusion scale (α = 0.91, 95% CI = [0.89, 0.93]) measuring fusion with their cause (e.g. “I am one with the pro-life/pro-choice position”; Gómez et al., 2011 ). They also completed a five-item measure of the mediating mechanism explored in SOM-III: essentialist beliefs relating to the cause (α = 0.91, 95% CI = [0.90, 0.93]) adapted from Bastian and Haslam (2006) ; (e.g., “There are two types of people in this world: pro-life and pro-choice”). Both constructs were rated on seven-point scale ranging from 1 ( Strongly Disagree ) to 7 ( Strongly Agree ). We standardized the fusion and essentialism scores prior to analysis. Means, standard deviations, and inter-variable correlations in the final sample are reported in Table 1 .

Means, standard deviations, and correlations of measures in Study 1 (N = 223).

Variable 123
1. Fusion with cause4.711.39
2. Censoring rate -congruent comments0.200.19−0.06
3. Censoring rate - incongruent comments0.260.220.13 0.56
4. Censoring rate - irrelevant comments0.340.160.120.56 0.51

Note . The censoring rates, ranging from 0 to 1, refer to the proportion of comments of each type (congruent, incongruent, or irrelevant) that participants censored. Fusion's effect on selective censoring is the difference between fusion's association with the censoring rates of congruent and incongruent comments. Fusion's effect was not influenced by position on abortion rights. * indicates p  < .05. ** indicates p  < .01.

Participants provided demographic information before completing the survey (see https://osf.io/4jtwk/?view_only=10627a9892464e5aa90fe92360b846ad for a full list of measures). At the end of the study, participants learned that they might be contacted again for other studies. We did not specify when or why we would re-contact them because we wanted to discourage them from associating the first session of the study with the second.

2.1.2. Time 2 (T2)

2.1.2.1. participants.

Two weeks later we re-contacted the participants regarding a seemingly unrelated “comment moderation task.” A total of 251 participants completed the second session of the study, amounting to a 38.2% attrition rate, which is comparable to previously reported attrition rates on MTurk ( Stoycheff, 2016 ). There were no differences in fusion ( t (400) = −0.19, p  = .85, d  = −0.02) between those who did vs. did not complete the second session of the study. We excluded 25 respondents with identical IP addresses or MTurk worker IDs and three participants who evaluated fewer than 50% of the comments in the comment moderation task, resulting in a final sample of 223 participants (52% female; 71.8% White; M age  = 38.36; SD age  = 11.99; 148 pro-choice and 75 pro-life participants) who completed both time points. We were unable to conduct an a priori power analysis because the lack of previous research on censoring made it difficult for us to estimate expected path coefficients, which is required for power analyses for Structural Equation Models (SEM; Muthén and Muthén, 2012 ). To give a general sense of how much power we had with the present sample size, we conducted a sensitivity analysis, which revealed that the sample had 80% power to detect a minimum effect size of f 2  = 0.04 in a multiple regression.

2.1.2.2. Comment moderation procedure

In the comment moderation task, participants read about a new blog purportedly launched with the goal of “encouraging discussion about current issues.” We informed participants that we had received complaints regarding a surge in inappropriate comments posted on the blog and that we needed their help in deleting inappropriate comments. To make sure that participants took the task seriously, we informed them that the blog's administrator would delete all comments that they flagged. Participants then read a series of 40 statements that were adapted from comments from real online blogs and forums. Of the 40 comments, 15 were pro-choice (e.g.: “I love that even though Norma couldn't herself get an abortion (because of the terrible world we live in), she fought so hard to make sure other women could.”), 15 were pro-life (e.g.: “I love that Lily didn't have an abortion even though she didn't want to be a parent. She hadn't planned a baby and wasn't ready for it, but she didn't get an abortion.”), and 10 were irrelevant to the cause (e.g.: “I still can't wrap my head around this horrific, senseless act. Sickening.”). Participants could recommend either deletion or retention of each comment. The full list of comments is available at https://osf.io/4jtwk/?view_only=10627a9892464e5aa90fe92360b846ad .

For each participant, we calculated three censoring rates corresponding to the proportion of comments that the participant deleted among (a) congruent comments (i.e., comments endorsing the participant's position on abortion rights), (b) incongruent comments (i.e., comments against the participant's position on abortion rights), and (c) irrelevant comments (i.e., comments irrelevant to abortion rights). The three censoring rates were inter-correlated (see Table 1 ), which indicates that individual differences in people's general tendency to censor were relatively stable across comments.

2.1.2.3. Post-hoc assessment of comment offensiveness

To determine whether strongly fused people's tendency to selectively censor incongruent comments depended on whether the comments included offensive language, we asked five objective judges from MTurk to provide post-hoc ratings of each comment's offensiveness. Of the five judges, two were pro-choice, two were pro-life, and one was neutral (i.e., did not favor either side of the abortion debate). The judges were told that offensive comments were those that “a reasonable person would consider to be abusive, harassing, or involving hate speech or ad hominem attacks.” The inter-judge reliability across the five judges was α = 0.84. We coded each comment as offensive or inoffensive based on the judges' majority opinion (see SOM-I for more details). The offensive vs. inoffensive classification generated from the post-hoc pilot was then applied in the selective censoring analyses. 3 For each participant, we computed four censoring rates corresponding to the proportion of comments that the participant censored among comments of four categories: Offensive-Congruent, Offensive-Incongruent, Inoffensive-Congruent, and Inoffensive-Incongruent.

2.2. Study 1 results

2.2.1. did people selectively censor comments incongruent with their cause.

To test whether people censored incongruent comments at a higher rate than congruent comments, censoring rates for incongruent vs. congruent comments were compared via a paired t -test. A significant effect emerged ( t (220) = 4.0, p  < .001, d  = 0.25). On average, people censored 25.64% ( SD  = 22.35) of the incongruent comments they read but only 20.41% ( SD  = 18.72) of the congruent comments. Later in this section, we report differences in selective censoring between pro-life and pro-choice participants.

2.2.2. Did identity fusion amplify the selectively censoring of incongruent comments?

We used structural equation modeling (SEM) for our analyses to simultaneously model fusion effects on two dependent variables: censoring rate for congruent and incongruent comments. We also conducted alternate analyses treating the difference between people's rates of censoring incongruent and congruent comments as the index of selective censoring and regressing the index over fusion (see SOM-II). Although this method feels intuitively appealing, it is not ideal because the method would not tell us whether any detected effect is driven by people's preference for congruent comments or their antagonism against incongruent comments. Past theorists have warned against conflating these two separate processes and recommend that each should be modeled separately ( Garrett, 2009a , Garrett, 2009b ; Holbert et al., 2010 ). The SEM approach allows us to simultaneously model effects on censoring rates for congruent and incongruent comments treating them as two separate variables with different variances rather than assuming them to constitute a single variable. Note however that both the methods (SEM and computing a difference index) lead us to the same conclusions.

To evaluate our hypothesis that strongly fused people would be especially likely to selectively censor incongruent comments relative to congruent comments, we tested whether the effect of fusion on censoring incongruent comments (indicated by the c 1 path in Fig. 1 ) is significantly larger than the effect of fusion on censoring congruent comments ( c 2 path). A significant difference between the two path coefficients (i.e., Δ c  =  c 1 - c 2 ) would suggest that fusion is associated with disproportionately censoring incongruent, over congruent, comments. In this and all other models, we allowed for residual covariances between the censoring rates. In all the models, we used standardized scores for the continuous predictors, but we did not standardize the censoring rates (they ranged from 0 to 1) to allow the censoring effects to be interpreted in meaningful units. We report unstandardized regression coefficients.

Fig. 1

Structural Equations Model depicting the effect of identity fusion on selective censoring of incongruent vs. congruent comments (Study 1). The c 1 and c 2 paths represent the effects of fusion on censoring incongruent and congruent comments respectively. The significant difference between the two paths (i.e., Δ c ) indicates that fusion is associated with selectively censoring incongruent comments. The coefficients reported are unstandardized. * indicates p  < .05. ** indicates p  < .01.

Fusion was associated with censoring incongruent comments ( c 1 path; b  = 0.03, 95% CI = [0.001, 0.06], p  = .04) but not with censoring congruent comments ( c 2 path; b  = −0.01, 95% CI = [−0.04, 0.01], p  = .38). A Wald test revealed that the difference between the two paths was statistically significant, (χ 2 (1) = 9.88, p  = .002), which is evidence for our main hypothesis that strongly fused individuals are more likely to selectively censor incongruent than congruent comments. To illustrate, participants who were strongly fused (1 SD above the mean) censored 29.56% of the incongruent comments they read but only 15.75% of the congruent comments, while those who were weakly fused (1 SD below the mean) did not censor incongruent comments (20.74%) any more than they censored congruent comments (20.37%). The significant c 1 path suggests that the effect of fusion on selective censoring is driven by strongly fused people's intolerance for incongruent comments rather than their leniency toward congruent comments.

Controlling for the censoring rate of comments irrelevant to abortion rights (to account for participants' general censoring rate and other response biases) did not alter the effect of fusion on selective censoring (χ 2 (1) = 9.88, p  = .002). The fusion effect remained robust when we controlled for participants' position on abortion rights (i.e., pro-life vs. pro-choice; χ 2 (1) = 8.33, p  = .004). Further, the fusion effect was not influenced by the participant's abortion rights position (χ 2 (1) = 1.28, p  = .26), indicating that fusion was equally associated with selective censoring among both pro-life and pro-choice participants. In SOM-III, we report exploratory analyses testing whether essentialist beliefs about people's views on abortion rights mediates the fusion effect on selective censoring.

2.2.2.1. Did offensiveness influence the effect of fusion on selectively censoring?

We asked whether the tendency for strongly fused participants to selectively censor incongruent comments depended on how offensive the comments were. As depicted in Fig. 2 , we modeled the paths from fusion to participants' censoring rates for four types of comments: Offensive-Congruent, Offensive-Incongruent, Inoffensive-Congruent, and Inoffensive-Incongruent. We allowed for residual covariances between the censoring rates.

Fig. 2

Structural Equations Model examining the effect of identity fusion on selective censoring of incongruent vs. congruent comments among offensive and inoffensive comments (Study 1). Δ p and Δ q represent fusion's effects on selective censoring among offensive comments and inoffensive comments, respectively. The significant effects indicate that strongly fused people selectively censored incongruent comments whether the comments were offensive or inoffensive. See SOM-IV for path coefficients. * indicates p  < .05. ** indicates p  < .01.

We first computed the effects of fusion on selective censoring of incongruent vs. congruent comments separately for offensive and inoffensive comments. To compute the effect of fusion on selective censoring for offensive comments, we compared fusion's effect on censoring Offensive-Incongruent (path p1 ) vs. Offensive-Congruent (path p2 ) comments. The significant difference between the two p paths (Δ p  =  p1 – p2 , b  = 0.05, 95% CI = [0.01, 0.09], p  = .008) suggests that among offensive comments, strongly fused individuals selectively censored incongruent comments more than congruent comments. (Refer to SOM-IV for the path coefficients). Similarly, we computed fusion's effect on selective censoring for inoffensive comments as the difference between fusion's effect on censoring Inoffensive-Incongruent comments (path q1 ) vs. Inoffensive-Congruent comments (path q2 ). The resulting significant difference (Δ q  =  q1 – q2 ; b  =  0 .03, 95% CI = [0.002, 0.05], p  = .04) indicated that among inoffensive comments, participants censored incongruent comments more than congruent comments. In short, strongly fused individuals selectively censored incongruent comments more than congruent comments both when the comments were offensive and inoffensive.

Finally, to test whether strongly fused people's tendency to selectively censor incongruent comments was stronger for offensive comments, we compared the two selective censoring effects reported above for offensive vs. inoffensive comments. The difference (Δ p – Δ q ) was non-significant (χ 2 (1) = 2.10, p  = .15), suggesting that the effect of fusion on selective censoring was independent of the offensiveness of comments. That is, strongly fused individuals selectively censored incongruent, as opposed to congruent, comments regardless of whether the content of the comments included offensive language.

2.2.3. Did selective censoring of incongruent comments depend on people's ideologies?

Using a SEM model similar to the fusion analysis, we tested whether there were differences in people's tendency to selectively censor incongruent vs. congruent comments as a function of their stance on abortion rights (i.e., whether they were pro-choice or pro-life). Participants who endorsed the pro-life position showed a stronger tendency to selectively censoring incongruent comments relative to those who endorsed the pro-choice position (χ 2 (1) = 7.36, p  = .007). Pro-life participants also reported marginally higher fusion levels than did pro-choice participants [ t (220) = 1.76, p  = .08, d  = 0.25].

2.3. Study 1 discussion

Study 1 used a novel paradigm to explore people's censoring behaviors in online settings. People tended to censor online content more if the content was incongruent, rather than congruent, with their cause, and this tendency was higher among supporters of the pro-life cause. Importantly, identity-related processes amplified selective censoring of incongruent online content for people on both sides of the abortion rights cause. Specifically, the results showed that people whose identities were strongly fused with a cause were most willing to selectively censor online content posted by their ideological opponents. Interestingly, strongly fused people's tendency to selectively censor comments was driven by their intolerance for incongruent comments rather than an elevated affinity for congruent comments. Post-hoc analyses also showed that fusion's effect on selective censoring occurred regardless of whether the incongruent comments used offensive language. It is notable that strongly fused people showed a stronger selective censoring effect than weakly fused people even though they were not primed to think about their identity before reading the comments.

Study 2 attempted to replicate Study 1 in a pre-registered longitudinal study. The method was largely similar to that of Study 1. To verify the preliminary findings from Study 1's post-hoc analysis on the effects of offensiveness, Study 2 systematically manipulated comment offensiveness a priori. The comments used in the study were pretested and categorized as containing offensive vs. inoffensive content. This allowed us to more robustly probe whether the fusion effect on selective censoring was moderated by offensiveness. Further, it was not clear from Study 1 whether strongly fused people's tendency to selectively censor incongruent comments would extend to censoring the authors of the comments. To test this possibility, the study tested whether strongly fused individuals would opt to ban people who repeatedly posted content that threatened their position on the cause. The hypotheses were pre-registered prior to data collection (see https://osf.io/2jvau?view_only=754165d77cbe4e69baf6b11740b1a422 ).

Finally, although we have only focused on identity fusion thus far, we wanted to test whether the effects generalize to other identity-related measures explored in the broad literature: attitude strength, moral conviction, and identification with cause supporters. Studies have found that these constructs predict pro-cause action and an intolerance for opposition (e.g., Singh and Ho, 2000 ; Skitka et al., 2005 ; Thomas et al., 2016 ). We examined the extent to which each of these identity-related measures predicted selective censoring.

4. Study 2 method

4.1. power analysis.

An a priori power analysis was conducted using Monte Carlo simulations to estimate the sample size required to detect the SEM models reported in Study 1. As mentioned in our pre-registration, a sample of 345 participants was required to detect the selective censoring effect computed from the mediation model explored in Study 1 (see SOM-III) with an alpha of 0.05 and 80% power. In addition to replicating Study 1 effects, we wanted to test models examining the impact of the other identity-related measures (attitude strength, moral conviction, and identification with cause supporters) on censoring and also test a model with all identity-related measures simultaneously entered into a structural equation model. Because we had no easy way to estimate the path coefficients for these models, we estimated the required sample size by conducting a conservative power analysis using the models reported in Study 1. As mentioned in our pre-registration, we conducted Monte Carlo simulations to detect the Study 1 mediation model with a conservative alpha of 0.01 and found that we would need a sample size of 510. This conservative estimate would give us sufficient power to detect smaller effects than the ones reported in Study 1. Given the longitudinal nature of the study, we estimated that about 35% of the sample would either drop out between T1 and T2 or be excluded because of failing attention checks, and so we decided to recruit 800 participants at T1. The power analysis and exclusion criteria followed were specified in the pre-registration. Any deviations from the pre-registered plan are noted.

4.2. Comment offensiveness pretest

We wanted to systematically manipulate the offensiveness of comments. To classify comments as offensive vs. inoffensive, we conducted a pilot study on MTurk. We recruited five Mturkers who reported having neutral or no opinions about the abortion rights issue to be objective judges. We piloted 40 comments of which 20 were pro-choice and 20 were pro-life. For each position (pro-choice and pro-life), we piloted 10 comments that we believed contained offensive content and 10 that did not. The instructions provided to the objective judges were the same as in Study 1. The judges evaluated the content of each comment as either offensive or inoffensive. The inter-judge reliability across the five judges was α = 0.87. For each of the four types of comments (Offensive-Prochoice, Inoffensive-Prochoice, Offensive-Prolife, and Inoffensive-Prolife), the seven comments with the highest levels of agreement among the judges were selected for the study. At least three of the five judges agreed on the categorization of the 28 comments that were finally selected for the study (see https://osf.io/4jtwk/?view_only=10627a9892464e5aa90fe92360b846ad for the final list of comments).

4.3. Time 1 (T1)

4.3.1. participants.

A sample of 793 participants from Prolific Academic completed the first part of the study in July 2019. The method followed was largely similar to Study 1. As mentioned in the pre-registration, only participants who endorsed either the pro-choice or pro-life position were eligible for the study. This was ensured by setting a pre-screening condition on Prolific such that the study posting was visible only to participants who had previously identified as pro-choice or pro-life. To be sure that the pre-screening worked, participants' views on abortion rights were measured again in the T1 survey, and 15 participants who indicated holding neutral views on abortion were excluded. We also excluded 29 participants who failed either of two attention checks or did not complete them (see SOM-I). Our final sample at T1 had 749 participants (48% female; 69.88% White; M age  = 32.88; SD age  = 11.79; 616 pro-choice and 133 pro-life participants).

4.3.2. Identity measures

As in Study 1, participants completed the seven items of the verbal fusion scale measuring fusion with their own position on the abortion rights (either pro-choice or pro-life) on a seven-point scale (α = 0.92, 95% CI = [0.91, 0.93]). The survey also included measures of a series of identity-related measures including four facets of attitude strength such as attitude extremity (“What is your opinion about the pro-life/pro-choice position?”; 1 =  Strongly against, 9 =  Strongly favor ; Binder et al., 2009 ), attitude centrality (“To what extent does your opinion toward the pro-life/pro-choice position reflect your core values and beliefs”; Clarkson et al., 2009 ), attitude certainty (e.g., “How certain are you of your opinion about the pro-life/pro-choice position?”; 1 =  Not certain at all , 9 =  Extremely certain ; Fazio and Zanna, 1978 ) and attitude importance (e.g., “To what extent is the pro-life/pro-choice position personally important to you?”; Boninger et al., 1995 ; α = 0.91, 95% CI = [0.89, 0.92]). Attitude extremity, centrality, and certainty were measured using one item each, and attitude importance was measured using two items. Attitude centrality and attitude importance used nine-point scales (e.g., 1 =  Not at all ; 9 =  Very Much ). We also measured moral conviction (e.g., “To what extent is your position on the pro-life position a reflection of your core moral beliefs and convictions?”; Skitka and Morgan, 2014 ) using two items on a five-point scale (α = 0.86, 95% CI = [0.83, 0.88]) and identification with cause supporters (e.g. “I identify with other supporters of the prochoice position”; adapted from Thomas et al., 2016 ) using three items and on a seven-point scale (α = 0.83, 95% CI = [0.81, 0.86]). The order of presentation of the above measures was randomized. Participants then completed a measure of the mediating mechanism explored in SOM-III: people's essentialist beliefs about a cause (α = 0.92, 95% CI = [0.90, 0.93]); Bastian and Haslam, 2006 ). Finally, they provided demographic information before exiting the survey. No mention was made of the second session of the study. Means, standard deviations, and inter-variable correlations are reported in Table 2 .

Means, standard deviations, and correlations of measures in Study 2 (N = 540).

Variable 12345678
1. Fusion with cause4.481.44
2. Attitude extremity8.141.220.39
3 Attitude centrality7.271.920.51 0.52
4. Attitude certainty8.171.220.43 0.69 0.57
5. Attitude importance7.091.960.64 0.58 0.66 0.60
6. Moral conviction3.761.100.49 0.43 0.72 0.47 0.55
7. Identification with cause supporters6.251.030.52 0.72 0.48 0.58 0.58 0.47
8. Rate of censoring congruent comments0.210.16−0.03−0.16 −0.12 −0.15 −0.08−0.11 −0.17
9. Rate of censoring incongruent comments0.320.230.11 0.060.020.080.09 0.030.010.53

Note . The censoring rates, ranging from 0 to 1, refer to the proportion of comments of each type (congruent, incongruent, or irrelevant) that participants censored. Fusion's effect on selective censoring is the difference between fusion's association with the censoring rates of congruent and incongruent comments. This effect was not moderated by position on abortion rights. * indicates p  < .05. ** indicates p  < .01.

4.4. Time 2 (T2)

4.4.1. participants.

Approximately two weeks later, the second session of the study, titled “Comment Moderation Task”, was posted. Only participants who completed the T1 survey could view the posting, but they were not aware of this, and the study posting did not describe the eligibility criterion or its connection to the first part of the study. Under these circumstances, it is highly likely that participants perceived no connection between the first and second session of the study. A total of 542 participants completed the second session of the study. Two participants who completed less than 50% of the task were excluded, 4 leaving us with a final sample of 540 participants (48.70% female; 68.83% White; M age  = 33.53; SD age  = 12.30; 440 pro-choice and 100 pro-life participants). A sensitivity analysis using Monte Carlo simulations revealed that our sample had 99.8% power to detect the fusion effect on selective censoring reported in Study 1. There were no differences in fusion ( t (743) = 1.19, p  = .23, d  = 0.10) between those who did vs. did not complete the second session of the study.

4.4.2. Comment moderation procedure

Participants read about an online forum for discussions on current affairs. They learned that the forum's administrators had received complaints about inappropriate posts by some users and that their task was to help the administrators identify inappropriate posts and block people who repeatedly posted such content. Participants also learned that the comments and users flagged by them would be removed from the forum by its moderators. Because the study was posted on Prolific using a lab account that had previously been used to post other research studies, participants may have easily linked the task to our university and thus may have felt skeptical about our claims that they were evaluating comments from an actual discussion forum and that their evaluations would have real-world consequences. To address this, the study description said that users of the forum were college students and that the forum was owned and run by our university.

Participants then read a series of 28 comments on the abortion rights issue. The comments were designed to look like screenshots of posts from an actual online discussion forum (see Fig. 3 for an example). As shown in the figure, a user icon and handle were displayed next to each comment. The comments that participants read were systematically varied on two factors: Each comment was either pro-choice or pro-life and either offensive or inoffensive. Of the 28 comments, 14 were pro-choice and 14 were pro-life; 14 were pre-determined via the pilot study to be offensive and 14 were inoffensive. In sum, there were four types of comments ( N  = 7 for each type): Offensive-Prochoice, Inoffensive-Prochoice, Offensive-Prolife, and Inoffensive-Prolife. The pro-choice comments were all posted by a single user, and the pro-life comments were all posted by another user. For each comment, participants could recommend deletion or retention, which was our primary measure of censoring. After evaluating all comments, participants were also asked whether the two users whose comments they read should be banned from the blog (“Ban this user from the blog” or “Do not ban this user from the blog”). Finally, participants were asked about the extent to which they doubted the veracity of our claims on a five-point scale (1 =  Not at all ; 5 =  A great deal ), and the mean rating ( M  = 2.56, SD  = 0.98) was lower than the mid-point of the scale (i.e., 3 = A moderate amount; t(533) = −10.282, p  < .001, d  = −0.45), suggesting that a considerable proportion of participants believed that they were helping the moderators of a real blog.

Fig. 3

Example of an inoffensive pro-choice comment used in the comment moderation task (Study 2).

For each participant, we calculated censoring rates corresponding to the proportion of comments congruent with the participant's position on abortion rights and also the proportion of incongruent comments that they flagged. As in Study 1, selective censoring was indicated by a higher censoring rate for incongruent than congruent comments. For the offensiveness-related analyses, we also computed censoring rates for each of the four types of comments (Offensive-Congruent, Offensive-Incongruent, Inoffensive-Congruent, and Inoffensive-Incongruent) to determine whether participants selectively censored incongruent comments among both offensive and inoffensive comments. Overall, participants censored offensive comments ( M  = 0.47, SD  = 0.29) more than inoffensive comments ( M  = 0.06, SD  = 0.13; t (559) = 35, p  < .001, d  = 1.79) indicating that the offensiveness manipulation was successful. The censoring rates for offensive and inoffensive comments were correlated [ r (538) = 0.27, p  < .001], indicating that there are relatively stable individual differences in participants' censoring rates.

5. Study 2 results

5.1. did people selectively censor comments incongruent with their cause and the comments' authors.

Although not pre-registered, we tested whether people generally selectively censored incongruent comments more than congruent comments We compared the censoring rates for incongruent vs. congruent comments via a paired t -test. Replicating Study 1 findings, people censored 32.40% ( SD  = 22.88) of the incongruent comments but only 20.64% ( SD  = 16.18%) of the congruent comments, t(539) = 13.84, p  < .001, d  = 0.58.

We also conducted exploratory analysis testing whether people were disproportionately willing to ban the author of the incongruent comments relative to the author of the congruent comments. We used a McNemar's Chi-squared test to account for the within-subjects nature of the data and found a significant effect (χ 2 (1) = 9.24, p  = .002) such that 21.31% of participants opted to ban the user who posted incongruent comments as opposed to just 15.41% who banned the user posting congruent comments.

5.2. Did identity fusion amplify the selectively censoring of incongruent comments and their authors?

5.2.1. selectively censoring of incongruent comments.

To test our pre-registered hypothesis that strongly fused individuals would be especially likely to selectively censor incongruent comments, we tested a SEM model similar to Study 1 (see Fig. 4 ) with residual covariances between the censoring rates. Alternate analyses treating the difference between censoring rates of incongruent and congruent comments as the selective censoring index did not alter our conclusions (see the last column in Table 3 in the article and SOM-II). As in Study 1, we standardized the continuous predictors in all the SEM analyses, and we report unstandardized regression coefficients. Fusion positively predicted censoring incongruent comments ( c 1 path; b  = 0.03, 95% CI = [0.01, 0.045], p  = .008) but not censoring congruent comments ( c 2 path; b  = −0.005, 95% CI = [−0.02, 0.01], p  = .50). Replicating Study 1's main finding, the difference between the fusion effects on censoring incongruent vs. congruent comments was statistically significant, (Δ c  =  c 1 - c 2 ; χ 2 (1) = 13.14, p  < .001), which is evidence that fusion is associated with selective censoring. To illustrate, participants who were strongly fused (+ 1 SD ) censored 36.36% of the incongruent comments they read but only 18.65% of the congruent comments. Weakly fused participants censored 29.49% of the incongruent comments and 21.26% of the congruent comments, indicating a weaker selective censoring tendency. Fusion's effect on selective censoring remained significant when we controlled for whether participants were pro-choice or pro-life (χ 2 (1) = 13.50, p  < .001), and the effect was not moderated by position on abortion rights (χ 2 (1) = 0.04, p  = .85).

Fig. 4

Structural Equations Model depicting the effect of identity fusion on selective censoring of incongruent vs. congruent comments (Study 2). The c 1 and c 2 paths represent the effects of fusion on censoring incongruent and congruent comments respectively. The path coefficients in the figure are unstandardized. The significant difference between the two paths (Δ c ) indicates that fusion is associated with selectively censoring incongruent comments. ** indicates p  < .01. *** indicates p  < .001.

Path coefficients (c 1 and c 2 ) and Chi-sq values (χ 2 ) of SEM models and coefficients from regression models testing the effects of each identity-related measure on selective censoring (Study 2). Note that each model included only one predictor.

Predictor in modelSemantic equation modeling (SEM) Selective Censoring difference index
( )
Censoring incongruent comments
( )
Censoring congruent comments
( )
Selective censoring (Δ  =  - )
χ
Model 1: Fusion with cause0.03 −0.00513.14 0.03
Model 2: Attitude importance0.02 −0.01 15.09 0.03
Model 3: Attitude certainty0.02 −0.025 25.25 0.04
Model 4: Attitude centrality0.004−0.02 7.35 0.02
Model 5: Attitude extremity0.01−0.025 20.095 0.04
Model 6: Identification with cause supporters0.002−0.03 11.595 0.03
Model 7: Moral conviction0.007−0.02 8.68 0.03

Note . In each model, the predictor was standardized, but the censoring rates were not. The censoring rates ranged from 0 to 1. The path coefficients reported are unstandardized. † indicates p  < .1. * indicates p  < .05. ** indicates p  < .01. *** indicates p  < .001.

Our pre-registered mediational analyses (see SOM-III) suggest that essentialistic beliefs regarding people's stance on abortion rights might be at least one mediating mechanism explaining the fusion effect on selective censoring. In our pre-registration, we also proposed to test the fusion effect controlling for other identity-related measures. We accordingly report a model in which the predictive ability of all the identity-related measures are compared (see SOM-V). Nevertheless, because the measured variables are all strongly related both conceptually and empirically (see Table 2 ), after establishing that multicollinearity was not a problem, we examined whether each of these variables independently predicts selective censoring.

5.2.2. Selective censoring of the authors of incongruent comments

The foregoing analyses revealed that identity fusion with a cause is associated with a tendency to disproportionately censor online content that is incongruent with the cause. To test the pre-registered hypothesis that strongly fused individuals would also display a censoring bias against the authors of incongruent content, we examined a SEM model with two dependent variables corresponding to the binary indicators of whether the participant decided to ban the authors of incongruent, and congruent comments. Fusion was not significantly associated with banning the author of the incongruent comments (OR = 1.17, 95% CI = [0.95, 1.45], p  = .14) or congruent comments (OR = 0.99, 95% CI = [0.78, 1.25], p  = .90). The difference between the two paths, computed as two times the negative loglikelihood of the difference between the two paths, was not significant (χ 2 (1) = 1.18, p  = .28), indicating that fusion was not associated with selectively censoring authors of incongruent comments. However, given that the non-significant coefficients of the two paths were in the predicted direction, it is possible that there exists a small effect that our sample was not sufficiently powered to detect.

5.2.3. Did offensiveness moderate the effect of fusion on selectively censoring?

To verify Study 1's exploratory finding and our pre-registered hypothesis that the offensiveness of comments would not moderate the effect of fusion on selective censoring, we modeled the paths from fusion to participants' censoring rates for four types of comments: Offensive-Congruent, Offensive-Incongruent, Inoffensive-Congruent, and Inoffensive-Incongruent (see Fig. 5 ).

Fig. 5

Structural Equations Model examining the effect of identity fusion on selective censoring of incongruent vs. congruent comments among offensive and inoffensive comments (Study 2). Δ p and Δ q represent fusion's effects on selective censoring among offensive comments and inoffensive comments, respectively. The significant effects indicate that strongly fused people selectively censored incongruent comments whether the comments were offensive or inoffensive. See SOM-IV for path coefficients. * indicates p  < .05. ** indicates p  < .01.

Among offensive comments, fusion was associated with selectively censoring incongruent comments over congruent comments (Δ p  =  p1 – p2 ; b  = 0.04, 95% CI = [0.02, 0.06], p  = .001). Similarly, among inoffensive comments, strongly fused individuals selectively censored incongruent comments (Δ q  =  q 1 – q 2; b  =  0 .02, 95% CI = [0.005, 0.04], p  = .008). (The four path coefficients are reported in SOM-IV). The two significant selective censoring effects suggest that strongly fused people's selective intolerance for incongruent comments was observable among both offensive and inoffensive comments. Comparing two selective censoring effects for offensive vs. inoffensive comments (Δ p – Δ q ) revealed a marginally significant difference (χ 2 (1) = 3.34, p  = .07), suggesting that fusion's effect on selective censoring may have been larger for offensive than inoffensive comments. What is striking however is that as in Study 1, strongly fused people selectively censored incongruent comments even when the comments were inoffensive.

5.3. Did fusion's effect on selective censoring of incongruent comments generalize to other identity-related measures?

Thus far, we focused on the effects of identity fusion. Nevertheless, we conducted exploratory analyses testing the possibility that selective censoring of incongruent comments results from a constellation of identity-related processes. To test this possibility, we assessed the effects of attitude strength (attitude extremity, attitude centrality, attitude certainty, and attitude importance), moral conviction, and identification with supporters, which all index different aspects of people's alignment with a cause. Using the same approach as in the fusion analysis, we sequentially tested the relation of each of the seven predictors to selective censoring. Table 3 reports each model's path coefficients from the tested variable to censoring incongruent comments ( c 1 ) and to censoring congruent comments ( c 2 ). Table 3 also reports the chi-square difference between the two paths ( c 1 – c 2 ) indicating the extent to which the tested variable is associated with selectively censoring incongruent comments. The last column presents linear regression coefficients from alternate analyses testing the effect of each identity-related measure on the difference in participants' censoring rates for incongruent vs. congruent comments.

As indicated by the significant chi-square differences (Δ c ) and the significant regression coefficients ( b ) in Table 3 , each of the constructs produced selective censoring similar to the fusion effects, which is preliminary evidence that broader identity-related processes motivate selective censoring.

Interestingly, most of the predictors (attitude certainty, attitude centrality, attitude extremity, identification with cause supporters, and moral conviction) were negatively associated with censoring congruent comments (see c 2 coefficients in Table 3 ), indicating that they produce a tendency to be lenient toward congruent comments. On the contrary, fusion and attitude importance were not correlated with censoring congruent comments; instead, they were positively associated with censoring incongruent comments (see c 1 coefficients in Table 3 ), implying that these constructs were associated with an intolerance for incongruent comments. We speculate that a preference for congruent content and an intolerance against incongruent content reflect two independent mechanisms leading to selective censorship of incongruent comments.

5.4. Did selective censoring of incongruent comments depend on people's ideologies?

We tested another SEM model (not pre-registered) similar to the fusion analysis to assess the effect of people's stance on abortion rights (pro-choice vs. pro-life). Unlike Study 1, pro-choice participants selectively censored incongruent comments as much as pro-life participants (χ 2 (1) = 2.38, p  = .12), which may be due to higher threat levels among pro-choice participants following the, 2018 nomination Justice Kavanaugh to the Supreme Court. That is, owing to the conservative shift in the makeup of the Supreme Court in, 2018, pro-choice participants in Study 2 may have generally faced higher threat relative to Study 1, which could have increased their tendency to selectively censor pro-life comments. There was also no difference in fusion levels among pro-choice and pro-life participants ( t (537) = 0.59, p  = .56, d  = 0.07).

6. Study 2 discussion

Study 2 replicated Study 1's main findings that people censor online content that is incongruent with their own political views and that strongly fused individuals are especially likely to selectively censor incongruent content. Strongly fused people's tendency to selectively censor incongruent comments was robust for both offensive and inoffensive comments. Contrary to Study 1, we did not find evidence that pro-life participants selectively censored more than pro-choice participants, which we believe could be due to the socio-political environment during Study 2 data collection.

In addition to replicating Study 1 effects, Study 2 also examined people's willingness to ban the authors of incongruent vs. congruent comments from the forum. We found that cause supporters selectively banned the author who consistently posted cause-incongruent content. Contrary to our hypothesis, this effect was not amplified by fusion. This may have been because banning authors is a relatively extreme action that participants in our samples generally did not endorse. Conceivably, there is a small association of fusion with selective censoring of authors that our sample was underpowered to detect.

Finally, the study found that the selective censoring effect extends to an array of identity-related measures in the literature. The findings also indicate that there may be different paths to selective censorship of opposing content: Whereas fusion and attitude importance were associated with an increased tendency to censor incongruent comments, the other identity-related predictors were associated with a weaker tendency to censor congruent comments.

In short, the results of Study 2 replicated the selective censoring effect that emerged in Study 1. A potential limitation of these studies, however, is that both focused on an issue rooted in religious values, abortion rights. To address this, Study 3 focused on gun rights. The gun-rights issue was particularly relevant in the time that the study was conducted because gun sales peaked during the COVID-19 crisis ( Collins and Yaffe-Bellany, 2020 ).

The method used in Study 3 resembled those used in previous studies except that we used a more controlled manipulation of comment offensiveness that kept the content of the comments constant. Whereas in Study 2 comments were categorized as offensive or inoffensive based on coders' ratings, in Study 3, for each inoffensive comment, we generated an offensive version by adding offensive phrases. In this way, the content of inoffensive and comments was identical except for offensive language. Finally, as in Study 2, we assessed whether the selective censoring effect of fusion generalized to other identity-related measures such as indices of attitude strength, moral conviction, and identification with cause supporters.

8. Study 3 Method

8.1. power analysis.

As mentioned in our pre-registration (see https://osf.io/x3w7h/?view_only=a25d722f3a03405e9e4f074a622b10b4 ), an a priori power analysis conducted using Monte Carlo simulations indicated that a sample of 325 participants was required to detect the selective censoring effect detected in Study 2 with an alpha of 0.05 and 80% power. Given the longitudinal nature of the study, we estimated that approximately 30% of the sample would either drop out between T1 and T2 or fail attention checks, and so we decided to recruit 460 participants at T1.

8.2. Time 1 (T1)

8.2.1. participants.

A sample of 466 participants (49.6% female; 67.0% White; M age  = 31.18; SD age  = 11.14) from Prolific Academic completed the first part of the study in May 2020. Participants' views on gun rights were measured in the T1 survey (370 pro-gun-control and 96 pro-gun-rights participants).

8.2.2. Identity measures

Participants completed the identity fusion scale for their position on gun rights (either pro-gun or anti-gun) on a seven-point scale (α = 0.93). Using the measures used in Study 2, we measured four facets of attitude strength – attitude extremity, attitude centrality, attitude certainty and attitude importance, moral conviction, and identification with cause supporters (α = 0.86). The order of presentation of the above constructs was randomized. Means, standard deviations, and inter-variable correlations are reported in Table 5 . Finally, they provided demographic information.

Means, standard deviations, and correlations with confidence intervals in Study 3 (N = 371).

Variable 12345678
1. Fusion with cause3.451.43
2. Attitude extremity7.621.360.31
3 Attitude centrality6.751.840.49 0.53
4. Attitude certainty7.581.460.38 0.69 0.55
5. Attitude importance6.551.790.61 0.55 0.73 0.59
6. Moral conviction3.371.030.49 0.49 0.68 0.54 0.56
7. Identification with cause supporters5.651.060.50 0.63 0.56 0.63 0.61 0.57
8. Rate of censoring congruent comments0.280.18−0.04−0.01−0.05−0.01−0.04−0.06−0.04
9. Rate of censoring incongruent comments0.370.200.080.11 0.10 0.13 0.13 0.070.070.56

Note . The censoring rates, ranging from 0 to 1, refer to the proportion of comments of each type (congruent and incongruent) that participants censored. Fusion's effect on selective censoring is the difference between fusion's association with the censoring rates of congruent and incongruent comments. This effect was not moderated by position on gun rights. * indicates p  < .05. ** indicates p  < .01.

8.3. Time 2 (T2)

8.3.1. participants.

Two weeks after completing the T1 survey, participants were able to complete a “Comment Moderation Task”. A total of 373 participants completed the task. Two participants who completed less than 50% of the task were excluded, leaving us with a final sample of 371 participants (52.85% female; 66.85% White; M age  = 31.45; SD age  = 11.61; 297 pro-gun-control and 74 pro-gun-rights participants). A sensitivity analysis revealed that our sample had 85% power to detect the fusion effect on selective censoring reported in Study 2. We found a difference in fusion levels between people who did vs. did not complete the T2 session such that individuals who completed T2 were more fused with the cause ( t (462) = 2.01, p  = .05, d  = −0.23).

8.3.2. Comment moderation procedure

As in the previous studies, we asked participants to help moderators of a college-run discussion forum identify inappropriate posts for removal. We gathered 14 pro-gun-rights comments and 14 pro-gun-control comments from the internet, resulting in 28 comments. We created offensive and inoffensive versions of each comment by including or excluding offensive phrases. Participants read either the offensive or inoffensive version of each of the 28 comments. Overall, participants read four types of comments ( N  = 7 for each type): Offensive-Pro-gun-rights, Inoffensive-Pro-gun-rights, Offensive-Pro-gun-control, and Inoffensive-Pro-gun-control (See Table 4 for example comments). As in Study 2, each comment was accompanied by a user icon and timestamp like in real online forums. The pro-gun-rights comments were all posted by a single user, and the pro-gun-control comments were all posted by another user. As in the previous studies, for each comment, participants recommended deletion or retention. After evaluating all comments, participants were also asked whether the two users whose comments they read should be banned from the blog (“Ban this user from the blog” or “Do not ban this user from the blog”). Finally, participants rated how much they doubted that the forum was not real on a five-point scale (1 = not at all, 5 = a great deal). The mean rating ( M  = 2.65, SD  = 0.99) was lower than the mid-point of the scale (i.e., 3 = A moderate amount; t(366) = −6.77, p  < .001, d  = −0.35), suggesting that participants generally did not doubt the veracity of the paradigm.

Sample comments rated by participants in Study 3. The study included 28 comments (14 pro-gun-rights and 14 pro-gun-control), each of which had an offensive and an inoffensive version. Participants rated either the offensive or inoffensive version of each of the 28 comments. The comments were presented in the format illustrated in Fig. 3 and in random order.

Sample comments rated by
Participant 1
Sample comments rated by
Participant 2
Pro-gun-rights : We must defend the right to keep and bear arms through communication and coordinated action, retarded dumbasses like you just don't get it. [ ]

: Everyone should be pro gun.
Pro gun = pro freedom.
Pro gun = anti tyranny.
[ ]
: We must defend the inherent right to keep and bear arms through communication and coordinated action.
[ ]

: You're must be an unfixable dumbfuck if you don't get this:
Pro gun = pro freedom.
Pro gun = anti tyranny.
[ ]
Pro-gun-control - : Why aren't guns and, oh yeah, assault rifles banned? Why aren't you banned? It is unbelievable that this has been allowed to continue. I am mortified that you exist. Enough is enough! #guncontrol #fuckguns [ ]

- : I don't care about Thoughts and Prayers. It's just a phrase that people use instead of “Thoughts and Actions”. [ ]
- : Why aren't guns and specifically assault rifles banned? It is unbelievable that this has been allowed to continue. Enough is enough! #guncontrol #nomoreguns
[ ]

- : I Don't Give a Fuck About Your Thoughts and Prayers. It's just a shitty, waste of words that people use instead of “Thoughts and Actions”. [ ]

For each participant, we calculated censoring rates corresponding to comments congruent and incongruent with their own position on guns. For the offensiveness-related analyses, we also computed censoring rates for each of the four types of comments (Offensive-Congruent, Offensive-Incongruent, Inoffensive-Congruent, and Inoffensive-Incongruent). Overall, participants censored offensive comments ( M  = 0.58, SD  = 0.28) more than inoffensive comments ( M  = 0.07, SD  = 0.12; t (370) = 33.98, p  < .001¸ d  = 2.27) indicating that the offensiveness manipulation was successful. The censoring rates for offensive and inoffensive comments were correlated albeit more weakly than in Study 1 ( r (369) = 0.17, p  < .001).

9. Study 3 results

9.1. did people selectively censor comments incongruent with their cause and the comments' authors.

We tested the pre-registered hypothesis that people would selectively censor incongruent comments more than congruent comments. We conducted a paired t -test comparing the censoring rates for incongruent vs. congruent comments. Replicating findings from the first two studies, people censored more incongruent comments ( M  = 36.97%; SD  = 19.64) than congruent comments ( M  = 27.88%; SD  = 17.62), t (370) = 10.02, p  < .001, d  = 0.49.

We also conducted a pre-registered analysis testing whether people were disproportionately willing to ban the author of the incongruent comments relative to the author of the congruent comments. Contrary to our hypothesis and the results of Study 1, we did not find a significant difference (χ 2 (1) = 1.92, p  = .17). Nevertheless, the means trended in the expected direction. That is, 32.69% of participants banned the user who posted incongruent comments as opposed to just 29.51% who banned the user posting congruent comments.

9.2. Did identity fusion amplify the selectively censoring of incongruent comments?

To test our pre-registered hypothesis that strongly fused individuals would be especially likely to selectively censor incongruent comments, we tested a SEM model (see Fig. 6 ) with residual covariances between the censoring rates. (Alternate analyses treating the difference between censoring rates of incongruent and congruent comments as the selective censoring index, reported in Table 6 below and in SOM-II, result in the same findings). As in Studies 1 and 2, we standardized the predictors in all the SEM analyses, and we report unstandardized regression coefficients. Fusion positively (but not significantly) predicted censoring incongruent comments ( c 1 path; b  = 0.02, 95% CI = [−0.004, 0.04], p  = .12) but not censoring congruent comments ( c 2 path; b  = −0.006, 95% CI = [−0.02, 0.01], p  = .49). The difference between the fusion effects on censoring incongruent vs. congruent comments was significant, (Δ c  =  c 1 - c 2 ; χ 2 (1) = 6.01, p  = .01), which is evidence that fusion is associated with selective censoring. To illustrate, participants who were strongly fused (+ 1 SD ) censored 41.47% of the incongruent comments they read but only 28.56% of the congruent comments. Weakly fused participants censored 35.92% of the incongruent comments and 29.52% of the congruent comments, indicating weaker selective censoring. The effect of fusion on selective censoring remained significant when we controlled for whether participants favored pro-gun-rights or pro-gun-control (χ 2 (1) = 9.24, p  = .002), and the effect was not moderated by position on gun rights (χ 2 (1) = 0.05, p  = .83).

Path coefficients (c 1 and c 2 ) and Chi-sq values (χ 2 ) of SEM models and coefficients from regression models testing the effects of each identity-related measure on selective censoring (Study 3). Note that each model included only one predictor.

Predictor in modelSemantic equation modeling (SEM) Selective Censoring difference index
( )
Censoring incongruent comments
( )
Censoring congruent
comments
( )
Selective censoring
(Δ  =  - )
χ
Model 1: Fusion with cause0.02−0.0066.01 0.02
Model 2: Attitude importance0.03 −0.0113.45 0.03
Model 3: Attitude certainty0.03 −0.0029.86 0.03
Model 4: Attitude centrality0.02 −0.0111.26 0.03
Model 5: Attitude extremity0.02 −0.0027.01 0.02
Model 6: Identification with cause supporters0.02−0.0075.51 0.02
Model 7: Moral conviction0.01−0.017.33 0.03

Note . In each model, the predictor was standardized, but the censoring rates were not. The censoring rates ranged from 0 to 1. The path coefficients reported are unstandardized. * indicates p  < .05. ** indicates p  < .01. *** indicates p  < .001.

Fig. 6

Structural Equations Model depicting the effect of identity fusion on selective censoring of incongruent vs. congruent comments (Study 3). The c 1 and c 2 paths represent the effects of fusion on censoring incongruent and congruent comments respectively. The significant difference between the two paths (Δ c ) indicates that fusion is associated with selectively censoring incongruent comments. * indicates p  < .05.

9.2.1. Did offensiveness moderate the effect of fusion on selectively censoring?

As in the previous studies and consistent with the pre-registration, we modeled the paths from fusion to participants' censoring rates for four types of comments: Offensive-Congruent, Offensive-Incongruent, Inoffensive-Congruent, and Inoffensive-Incongruent (see Fig. 7 ). Among inoffensive comments, fusion was associated with selectively censoring incongruent comments over congruent comments (Δ q  =  q1 – q2 ; b  = 0.03, 95% CI = [0.009, 0.04], p  = .003). Among offensive comments, the effect was in the predicted direction but not significant (Δ p  =  p 1 – p 2; b  =  0 .02, 95% CI = [−0.007, 0.04], p  = .16). (The four path coefficients are reported in SOM-IV). Comparing two selective censoring effects for offensive vs. inoffensive comments (Δ p – Δ q ) revealed no difference (χ 2 (1) = 0.39, p  = .53).

Fig. 7

Structural Equations Model examining the effect of identity fusion on selective censoring of incongruent vs. congruent comments among offensive and inoffensive comments (Study 3). Δ p and Δ q represent fusion's effects on selective censoring among offensive comments and inoffensive comments, respectively. The difference between them was not significant, which indicates that comment offensiveness did not moderate fusion's effect on selective censoring. See SOM-IV for path coefficients. ** indicates p  < .01.

9.3. Did fusion's effect on selective censoring of incongruent comments generalize to other identity-related measures?

We then tested our pre-registered hypothesis that fusion's effect on selective censoring would extend to seven identity-related measures. Using models similar to the fusion analysis, we tested the effect of each predictor on selective censoring. Table 6 reports each model's path coefficients from the tested variable to censoring incongruent ( c 1 ) and congruent ( c 2 ) comments, and the chi-square difference between the two paths ( c 1 – c 2 ) indicating the extent to which the tested variable is associated with selective censoring. The last column in Table 6 presents linear regression coefficients from alternate models testing the effect of each identity-related measures on the difference between participants' censoring rates for incongruent and congruent comments. The significant chi-square differences (Δ c ) and regression coefficients ( b ) indicate that the selective censoring effect generalized to each of the seven identity-related measures. In contrast to Study 2, the selective censoring effect was largely driven by positive associations between the identity-related measures and censoring incongruent comments.

9.4. Did selective censoring of incongruent comments depend on people's ideologies?

We tested another exploratory SEM model to assess the effect of people's stance on gun rights (pro-gun-rights vs. pro-gun-control). Gun-control supporters selectively censored incongruent comments more than gun-rights supporters (χ 2 (1) = 17.09, p  < .001) even though pro-gun- rights supporters tended to be more strongly fused than pro-gun- control supporters ( t (367) = 2.18, p  = .03, d  = 0.28). Study 3 was conducted during a period that saw increased gun sales ( Collins and Yaffe-Bellany, 2020 ), which should have increased the threat perceived by gun-control supporters, increasing their tendency to selectively censor opposition.\.

10. Study 3 discussion

Study 3 demonstrated that the selective censoring effect extends to issues beyond religiously tinged issues such as abortion rights. Specifically, people selectively censored comments that opposed their views on the gun rights debate, and this effect was amplified among people who were strongly fused with their cause. As in Studies 1 and 2, people selectively censored incongruent comments even when they were inoffensive. Contrary to Study 2, we did not find a significant selective censoring effect on offensive comments, but it could be that our study was underpowered to detect this effect. Further, gun-control proponents selectively censored more than gun-rights proponents, which when taken together with Studies 1 and 2, suggests that people's willingness to selectively censor may depend on the cause at hand (pro-choice or pro-gun-control) and the political context (e.g., level of threat faced by the cause) rather than political ideology (left or right).

Study 3 also replicated the Study 2 finding that selective censoring extends to a range of identity related constructs including attitude strength, identification with supporters, and moral conviction. Nevertheless, we did not find similar results across Studies 2 and 3 regarding the degree to which each identity-related process produced a lenience toward congruent content or an intolerance of incongruent content. Future research will need to disentangle the links between identity related processes and selective censoring.

10.1. General discussion

The current research provides an initial glimpse into how people censor political opponents when moderating online content. Specifically, in three studies, participants who were asked to moderate an online forum deleted approximately 5–12% more identity-incongruent, relative to identity-congruent, comments from putative online forums. Moreover, we found weak evidence that participants were about 3–5% points more likely to ban authors of incongruent as compared to congruent comments. These findings transcend past research on selective exposure and avoidance ( Bakshy et al., 2015 ; Garrett, 2009a ; van der Linden, 2017 ) because censorship is a particularly extreme action that affects not just one's own online environment but also the environments of other people. Furthermore, unlike traditional censorship enforced only by the state ( Bonsaver, 2007 ; Fishburn, 2008 ), the decentralized nature of this new form of censorship implemented by independent users could make it easy to overlook and thus potentially more insidious.

Our evidence that people censor the social media posts of political opponents is consistent with recent evidence that the salutary impact of intergroup contact on intergroup harmony ( Paluck et al., 2018 ) may not extend to online interactions ( Bail et al., 2018 ). We also show, however, that selective censorship of opponents' comments was amplified among people whose cause-related views were firmly rooted in their identities. Strongly fused participants deleted approximately 13–18% more identity-incongruent than identity-congruent comments, while weakly fused participants were much less biased (0–9%). Strikingly, strongly fused individuals disproportionately censored opponents' comments even when the comments conveyed opposing views in an inoffensive and courteous manner. The identity-driven effect on selective censoring generalized to six other identity-related measures including indices of attitude strength, moral conviction, and identification with cause supporters. The converging results across the various predictors suggest that selective censoring results from a combination of several identity-related processes.

Future research might work toward developing a theoretical model of selective censoring that elaborates the relationships between various identity-related processes. Such work might also investigate the two possible mechanisms underlying selective censoring: lenience toward congruent content versus intolerance of incongruent content. Future researchers might also follow up on our evidence that strongly fused participants were especially apt to censor opponents' comments but not their opponents themselves . Also, perhaps people ban individuals based on their most offensive comment rather than based on evaluating multiple comments. Further, whereas we focused on identity-related processes, future research might consider other processes such as expectations regarding the content online subscribers of a given forum prefer ( Haselmayer et al., 2017 ) that may also contribute to moderators' selective censoring.

The censorship effects described here could have considerable impact on online forums and communities that millions of people follow. Studies of moderators have noted that a small number of them govern very large online communities and that they hold enormous power over their communities ( Frith, 2014 ; Matias, 2016b ). Still, past work on moderators has largely focused on how people become moderators ( Shaw and Hill, 2014 ), and the nature of their roles ( Berge and Collins, 2000 ; Colladon and Vagaggini, 2017 ; Frith, 2014 ) and struggles ( Matias, 2016a ). Although some case studies have examined abuse of power by moderators ( Yang, 2019 ), including anecdotal evidence of politically motivated censorship ( Wright, 2006 ), the current research is the first systematic investigation of censoring among people who moderate online communities. This investigation is consequential because selective censoring that favors the viewpoints of a small number of moderators could produce huge biases in the content that millions see. Indeed, censoring by powerful moderators can give onlookers who are not aware that censoring has occurred a false sense of the views of the people in an online community and who belongs there.

Still, our findings may generalize beyond the groups of people who serve as moderators of large online communities or forums. The millions of people who own blogs, YouTube channels, and social media pages, can moderate others' comments on the platforms they control. Even regular social media users can moderate others' comments on their own posts. Of course, in our studies, participants were explicitly given the goal of deleting inappropriate comments. Because most regular social media users may not experience a strong deletion-focused goal, they may censor less than moderators do. Nevertheless, the collective impact of each of these individuals' censoring could produce substantial consequences.

We believe censorship is a potentially overlooked factor in the heightened political polarization our culture is witnessing. This could have important ramifications. For example, selective censoring could lead to a lack of exposure to different viewpoints, creating echo chambers and causing people to develop increasingly extreme opinions ( Price et al., 2006 ) and to overestimate the prevalence of their own viewpoints ( Ross et al., 1977 ). In addition, opponents of causes may witness the increased extremism of inhabitants of the echo chamber and respond in kind by adopting extreme opposing views of their own ( Bail et al., 2018 ). These processes may reinforce themselves, producing more and more polarization over time ( Allcott et al., 2020 ). Censorship could also have implications for the people being censored, who may feel marginalized and become disengaged from the online community or be less likely to share his or her views in the future. Future studies should examine the consequences of selective censoring in online contexts.

11. Conclusion

Contemporary pundits often blame the apparent increase in polarization on “the internet” or “social media.” Researchers have found some basis for such assertions by demonstrating that internet users are indeed selectively exposed to evidence that would lend support to their views. Our findings move beyond this literature by demonstrating that moderators employ censorship to not only bring online content into harmony with their values, but to actively advance their causes and attack opponents of their causes. From this vantage point, those whose political beliefs are rooted in their identities are not passive participants in online polarization; rather, they are agentic actors who actively curate online environments by censoring content that challenges their ideological positions. By providing a window into the psychological processes underlying these processes, our research may open up a broader vista of related processes for systematic study.

This work was supported by the National Science Foundation [grants BCS-1124382 and BCS1528851 to William B. Swann, Jr.], an Advanced Grant from the European Research Council 694986 to Michael Buhrmester, and grant by Ministerio de Ciencia, Innovación y Universidades RTI2018-093550-B-I00 to Angel Gomez. The funders played no role in the study design; in the collection, analysis and interpretation of data; in the writing of the report; and in the decision to submit the article for publication.

Acknowledgments

We thank Elliot Tucker-Drob and Greg Hixon for their help with the data analysis.

Open practices

All study materials and data used in this research have been made publicly available and can be accessed at https://osf.io/4jtwk/?view_only=10627a9892464e5aa90fe92360b846ad . The design, methods, and analysis plan of Studies 2 and 3 were pre-registered, and these can be viewed at https://osf.io/2jvau?view_only=754165d77cbe4e69baf6b11740b1a422 and https://osf.io/x3w7h/?view_only=a25d722f3a03405e9e4f074a622b10b4 respectively.

☆This paper has been recommended for acceptance by Ashwini Ashokkumar

1 Selective censorship can occur as a result of two processes: greater censoring of cause-incongruent content and/or less censoring of cause-congruent content. We did not have an a priori hypothesis regarding which of these selective censoring processes fusion would amplify.

2 Note that the data were collected before reports of drop in the quality of the MTurk participant pool surfaced in, 2018 ( TurkPrime, 2018 ).

3 When designing the Study 1 materials, we did not ensure that the three types of comments (i.e., pro-choice, pro-life, and irrelevant comments) were equally offensive. For example, the post-hoc offensiveness ratings suggest that the pro-life comments may have been generally less offensive than the pro-choice and irrelevant comments. For this reason, the estimates of censoring obtained in Study 2, in which we systematically varied offensiveness a priori, are more trustworthy.

4 In Studies 2 and 3, we excluded participants who responded to fewer than 50% of the comments because their censoring rates are likely to be inaccurate estimates. Note that this exclusion criterion was not pre-registered. In both studies, including these participants did not alter our findings.

Appendix A Supplementary data to this article can be found online at https://doi.org/10.1016/j.jesp.2020.104031 .

Appendix A. Supplementary data

Supplementary material

  • Adamic L.A., Glance N. Proceedings of the 3rd international workshop on Link discovery. ACM; 2005, August. The political blogosphere and the 2004 US election: divided they blog; pp. 36–43. [ Google Scholar ]
  • Allcott H., Braghieri L., Eichmeyer S., Gentzkow M. The welfare effects of social media. American Economic Review. 2020; 110 (3):629–676. [ Google Scholar ]
  • Ashokkumar A., Galaif M., Swann W.B., Jr. Tribalism can corrupt: Why people denounce or protect immoral group members. Journal of Experimental Social Psychology. 2019; 85 :103874. [ Google Scholar ]
  • Bail C.A., Argyle L.P., Brown T.W., Bumpus J.P., Chen H., Hunzaker M.F., Volfovsky A. Exposure to opposing views on social media can increase political polarization. Proceedings of the National Academy of Sciences. 2018; 115 (37):9216–9221. [ PMC free article ] [ PubMed ] [ Google Scholar ]
  • Bakshy E., Messing S., Adamic L.A. Exposure to ideologically diverse news and opinion on Facebook. Science. 2015; 348 (6239):1130–1132. doi: 10.1126/science.aaa1160. [ PubMed ] [ CrossRef ] [ Google Scholar ]
  • Barberá P., Jost J.T., Nagler J., Tucker J.A., Bonneau R. Tweeting from left to right: Is online political communication more than an echo chamber? Psychological Science. 2015; 26 (10):1531–1542. [ PubMed ] [ Google Scholar ]
  • Bastian B., Haslam N. Psychological essentialism and stereotype endorsement. Journal of Experimental Social Psychology. 2006; 42 (2):228–235. doi: 10.1016/j.jesp.2005.03.003. [ CrossRef ] [ Google Scholar ]
  • Berge Z.L., Collins M.P. Perceptions of e-moderators about their roles and functions in moderating electronic mailing lists. Distance Education. 2000; 21 (1):81–100. [ Google Scholar ]
  • Binder A.R., Dalrymple K.E., Brossard D., Scheufele D.A. The soul of a polarized democracy: Testing theoretical linkages between talk and attitude extremity during the 2004 presidential election. Communication Research. 2009; 36 (3):315–340. doi: 10.1177/0093650209333023. [ CrossRef ] [ Google Scholar ]
  • Boninger D.S., Krosnick J.A., Berent M.K. Origins of attitude importance: Self-interest, social identification, and value relevance. Journal of Personality and Social Psychology. 1995; 68 (1):61. doi: 10.1037/0022-3514.68.1.61. [ PubMed ] [ CrossRef ] [ Google Scholar ]
  • Bonsaver G. University of Toronto Press; 2007. Censorship and literature in fascist Italy. [ Google Scholar ]
  • Boutyline A., Willer R. The social structure of political echo chambers: Variation in ideological homophily in online networks. Political Psychology. 2017; 38 (3):551–569. [ Google Scholar ]
  • Brady W.J., Wills J.A., Jost J.T., Tucker J.A., Van Bavel J.J. Emotion shapes the diffusion of moralized content in social networks. Proceedings of the National Academy of Sciences. 2017; 114 (28):7313–7318. doi: 10.1073/pnas.1618923114. [ PMC free article ] [ PubMed ] [ CrossRef ] [ Google Scholar ]
  • Brewer M.B. Ingroup identification and intergroup conflict. Social Identity, Intergroup Conflict, and Conflict Reduction. 2001; 3 :17–41. [ Google Scholar ]
  • Clarkson J.J., Tormala Z.L., DeSensi V.L., Wheeler S.C. Does attitude certainty beget self-certainty? Journal of Experimental Social Psychology. 2009; 45 (2):436–439. doi: 10.1016/j.jesp.2008.10.004. [ CrossRef ] [ Google Scholar ]
  • Colladon A.F., Vagaggini F. Robustness and stability of enterprise intranet social networks: The impact of moderators. Information Processing & Management. 2017; 53 (6):1287–1298. [ Google Scholar ]
  • Collins K., Yaffe-Bellany D. The New York times. 2020, April 2. About 2 million guns were sold in the US as virus fears spread. www.nytimes.com Retrieved from. [ Google Scholar ]
  • Conditt J. Engadget. 2016, July 28. Moderators banned 2,200 accounts during Donald Trump’s AMA. https://www.engadget.com Retrieved from. [ Google Scholar ]
  • Crawford J.T., Pilanski J.M. Political intolerance, right and left. Political Psychology. 2014; 35 (6):841–851. [ Google Scholar ]
  • Fazio R.H., Zanna M.P. Attitudinal qualities relating to the strength of the attitude-behavior relationship. Journal of Experimental Social Psychology. 1978; 14 (4):398–408. doi: 10.1016/0022-1031(78)90035-5. [ CrossRef ] [ Google Scholar ]
  • Fishburn M. Burning Books. Palgrave Macmillan; London: 2008. The burning of the books; pp. 31–48. [ Google Scholar ]
  • Fisher R., Lilie S., Evans C., Hollon G., Sands M., Depaul D.…Hultgren T. Political ideologies and support for censorship: Is it a question of whose ox is being gored? Journal of Applied Social Psychology. 1999; 29 (8):1705–1731. [ Google Scholar ]
  • Fredman L.A., Bastian B., Swann W.B., Jr. God or country? Fusion with Judaism predicts desire for retaliation following Palestinian stabbing Intifada. Social Psychological and Personality Science. 2017; 1948550617693059 doi: 10.1177/1948550617693059. [ CrossRef ] [ Google Scholar ]
  • Frith J. Forum moderation as technical communication: The social web and employment opportunities for technical communicators. Technical Communication. 2014; 61 (3):173–184. [ Google Scholar ]
  • Garimella V.R.K., Weber I. Eleventh international AAAI conference on web and social media. 2017, May. A long-term analysis of polarization on Twitter. [ Google Scholar ]
  • Garrett R. Selective processes, exposure, perception, memory. In: Kaid L.L., Holtz-Bacha C., editors. Encyclopedia of political communication. Vol. 1. SAGE Publications, Inc.; Thousand Oaks, CA: 2008. p. 741. [ CrossRef ] [ Google Scholar ]
  • Garrett R.K. Echo chambers online?: Politically motivated selective exposure among internet news users. Journal of Computer-Mediated Communication. 2009; 14 (2):265–285. doi: 10.1111/j.1083-6101.2009.01440.x. [ CrossRef ] [ Google Scholar ]
  • Garrett R.K. Politically motivated reinforcement seeking: Reframing the selective exposure debate. Journal of Communication. 2009; 59 (4):676–699. [ Google Scholar ]
  • Gómez Á., Brooks M.L., Buhrmester M.D., Vázquez A., Jetten J., Swann W.B., Jr. On the nature of identity fusion: Insights into the construct and a new measure. Journal of Personality and Social Psychology. 2011; 100 (5):918. doi: 10.1037/a0022642. [ PubMed ] [ CrossRef ] [ Google Scholar ]
  • Gómez Á., Vázquez A., López-Rodríguez L., Talaifar S., Martínez M., Buhrmester M.D., Swann W.B., Jr. Why people abandon groups: Degrading relational vs collective ties uniquely impacts identity fusion and identification. Journal of Experimental Social Psychology. 2019; 85 :103853. [ Google Scholar ]
  • Hart W., Albarracín D., Eagly A.H., Brechan I., Lindberg M.J., Merrill L. Feeling validated versus being correct: A meta-analysis of selective exposure to information. Psychological Bulletin. 2009; 135 (4):555. [ PMC free article ] [ PubMed ] [ Google Scholar ]
  • Haselmayer M., Wagner M., Meyer T.M. Partisan bias in message selection: Media gatekeeping of party press releases. Political Communication. 2017; 34 (3):367–384. [ PMC free article ] [ PubMed ] [ Google Scholar ]
  • Hense R., Wright C. The development of the attitudes toward censorship questionnaire 1. Journal of Applied Social Psychology. 1992; 22 (21):1666–1675. [ Google Scholar ]
  • Holbert R.L., Garrett R.K., Gleason L.S. A new era of minimal effects? A response to Bennett and Iyengar. Journal of Communication. 2010; 60 (1):15–34. [ Google Scholar ]
  • Iyengar S., Hahn K.S. Red media, blue media: Evidence of ideological selectivity in media use. Journal of Communication. 2009; 59 (1):19–39. doi: 10.1111/j.1460-2466.2008.01402.x. [ CrossRef ] [ Google Scholar ]
  • John N.A., Dvir-Gvirsman S. “I don’t like you any more”: Facebook unfriending by Israelis during the Israel–Gaza conflict of 2014. Journal of Communication. 2015; 65 (6):953–974. [ Google Scholar ]
  • Lawrence E., Sides J., Farrell H. Self-segregation or deliberation? Blog readership, participation, and polarization in American politics. Perspectives on Politics. 2010; 8 (1):141–157. [ Google Scholar ]
  • Leber, c. The New Republic; 2016, January 14. Gun control can swing the 2016 election. https://newrepublic.com Retrieved from. [ Google Scholar ]
  • Linder M. Block. Mute. Unfriend. Tensions rise on Facebook after election results. 2016, November 9. https://www.chicagotribune.com Chicago Tribune. Retrieved from.
  • Lindner N.M., Nosek B.A. Alienable speech: Ideological variations in the application of free-speech principles. Political Psychology. 2009; 30 (1):67–92. [ Google Scholar ]
  • Matias J.N. Internet politics and policy conference. United Kingdom; Oxford: 2016. The civic labor of online moderators. [ Google Scholar ]
  • Matias J.N. Proceedings of the 2016 CHI conference on human factors in computing systems. 2016. Going dark: Social factors in collective action against platform operators in the Reddit blackout; pp. 1138–1151. [ Google Scholar ]
  • McAdams D.P. What do we know when we know a person? Journal of Personality. 1995; 63 (3):365–396. [ Google Scholar ]
  • McPherson M., Smith-Lovin L., Cook J.M. Birds of a feather: Homophily in social networks. Annual Review of Sociology. 2001; 27 (1):415–444. [ Google Scholar ]
  • Motyl M., Iyer R., Oishi S., Trawalter S., Nosek B.A. How ideological migration geographically segregates groups. Journal of Experimental Social Psychology. 2014; 51 :1–14. [ Google Scholar ]
  • Muthén L.K., Muthén B.O. 2012. MPlus: Statistical analysis with latent variables—User’s guide. [ Google Scholar ]
  • Paluck E.L., Green S.A., Green D. The contact hypothesis re-evaluated. Behavioural Public Policy. 2018:1–30. doi: 10.1017/bpp.2018.25. [ CrossRef ] [ Google Scholar ]
  • Price V., Nir L., Cappella J.N. Normative and informational influences in online political discussions. Communication Theory. 2006; 16 (1):47–74. [ Google Scholar ]
  • Rentfrow P.J., Gosling S.D., Potter J. A theory of the emergence, persistence, and expression of geographic variation in psychological characteristics. Perspectives on Psychological Science. 2008; 3 (5):339–369. doi: 10.1111/j.1745-6924.2008.00084.x. [ PubMed ] [ CrossRef ] [ Google Scholar ]
  • Riffkin R. Abortion edges up as important voting issue for Americans. Gallup. 2015, May 29. http://news.gallup.com Retrieved from.
  • Ross L., Greene D., House P. The “false consensus effect”: An egocentric bias in social perception and attribution processes. Journal of Experimental Social Psychology. 1977; 13 (3):279–301. doi: 10.1016/0022-1031(77)90049-X. [ CrossRef ] [ Google Scholar ]
  • Schmidt G.B. Fifty days an MTurk worker: The social and motivational context for Amazon Mechanical Turk workers. Industrial and Organizational Psychology. 2015; 8 (2):165–171. doi: 10.1017/iop.2015.20. [ CrossRef ] [ Google Scholar ]
  • Sears D.O., Freedman J.L. Selective exposure to information: A critical review. Public Opinion Quarterly. 1967; 31 (2):194–213. [ Google Scholar ]
  • Shaw A., Hill B.M. Laboratories of oligarchy? How the iron law extends to peer production. Journal of Communication. 2014; 64 (2):215–238. [ Google Scholar ]
  • Sibona C. 2014 47th Hawaii international conference on system sciences. IEEE; 2014, January. Unfriending on Facebook: Context collapse and unfriending behaviors; pp. 1676–1685. [ Google Scholar ]
  • Singh R., Ho S.Y. Attitudes and attraction: A new test of the attraction, repulsion and similarity-dissimilarity asymmetry hypotheses. British Journal of Social Psychology. 2000; 39 :197–211. [ PubMed ] [ Google Scholar ]
  • Singh R., Teoh J.B.P. Attitudes and attraction: A test of two hypotheses for the similarity-dissimilarity asymmetry. British Journal of Social Psychology. 1999; 38 :427–443. [ PubMed ] [ Google Scholar ]
  • Skitka L.J., Morgan G.S. The social and political implications of moral conviction. In: Lavine H., editor. Advances in Political Psychology. Vol. 35. 2014. pp. 95–110. [ Google Scholar ]
  • Skitka L.J., Mullen E. Understanding judgments of fairness in a real-world political context: A test of the value protection model of justice reasoning. Personality and Social Psychology Bulletin. 2002; 28 (10):1419–1429. [ Google Scholar ]
  • Skitka L.J., Bauman C.W., Sargis E.G. Moral conviction: Another contributor to attitude strength or something more? Journal of Personality and Social Psychology. 2005; 88 (6):895. [ PubMed ] [ Google Scholar ]
  • Stoycheff E. Please participate in part 2: Maximizing response rates in longitudinal MTurk designs. Methodological Innovations. 2016; 9 doi: 10.1177/2059799116672879. 2059799116672879. [ CrossRef ] [ Google Scholar ]
  • Stroud N.J. The Oxford handbook of political communication. 2017. Selective exposure theories. [ Google Scholar ]
  • Suedfeld P., Steel G.D., Schmidt P.W. Political ideology and attitudes toward censorship 1. Journal of Applied Social Psychology. 1994; 24 (9):765–781. [ Google Scholar ]
  • Swann W.B., Jr., Gómez A., Seyle D.C., Morales J., Huici C. Identity fusion: The interplay of personal and social identities in extreme group behavior. Journal of Personality and Social Psychology. 2009; 96 (5):995. [ PubMed ] [ Google Scholar ]
  • Swann W.B., Jr., Jetten J., Gómez Á., Whitehouse H., Bastian B. When group membership gets personal: A theory of identity fusion. Psychological Review. 2012; 119 (3):441. doi: 10.1037/a0028589. [ PubMed ] [ CrossRef ] [ Google Scholar ]
  • Swann W.B., Jr., Buhrmester M.D., Gómez A., Jetten J., Bastian B., Vázquez A., Finchilescu G. What makes a group worth dying for? Identity fusion fosters perception of familial ties, promoting self-sacrifice. Journal of Personality and Social Psychology. 2014; 106 (6):912. [ PubMed ] [ Google Scholar ]
  • Tajfel H., Turner J.C. An integrative theory of intergroup conflict. Organizational Identity: A Reader. 1979; 56 :65. [ Google Scholar ]
  • Talaifar S., Swann W.B., Jr. Deep alignment with country shrinks the moral gap between conservatives and liberals. Political Psychology. 2019; 40 (3):657–675. [ Google Scholar ]
  • Thomas E.F., McGarty C., Reese G., Berndsen M., Bliuc A.M. Where there is a (collective) will, there are (effective) ways: Integrating individual-and group-level factors in explaining humanitarian collective action. Personality and Social Psychology Bulletin. 2016; 42 (12):1678–1692. [ PubMed ] [ Google Scholar ]
  • TurkPrime After the bot scare: Understanding What's been happening with data collection on MTurk and how to stop it [web log post] 2018, September 18. https://blog.turkprime.com Retrieved from.
  • Van Bavel J.J., Pereira A. The partisan brain: An identity-based model of political belief. Trends in Cognitive Sciences. 2018; 22 (3):213–224. [ PubMed ] [ Google Scholar ]
  • van der Linden S. The nature of viral altruism and how to make it stick. Nature Human Behavior. 2017; 1 :0041. doi: 10.1038/s41562-016-0041. [ CrossRef ] [ Google Scholar ]
  • Van Zomeren M., Postmes T., Spears R. On conviction's collective consequences: Integrating moral conviction with the social identity model of collective action. British Journal of Social Psychology. 2012; 51 (1):52–71. [ PubMed ] [ Google Scholar ]
  • Wright S. Government-run online discussion fora: Moderation, censorship and the shadow of Control1. The British Journal of Politics and International Relations. 2006; 8 (4):550–568. [ Google Scholar ]
  • Yang Y. When power goes wild online: How did a voluntary moderator's abuse of power affect an online community? Proceedings of the Association for Information Science and Technology. 2019; 56 (1):504–508. [ Google Scholar ]
  • Zaal M.P., Saab R., O’Brien K., Jeffries C., Barreto M., van Laar C. You’re either with us or against us! Moral conviction determines how the politicized distinguish friend from foe. Group Processes & Intergroup Relations. 2017; 20 (4):519–539. [ Google Scholar ]

Censorship of the Internet: The Job of Parents, Not Government

Article sidebar.

cover image

Main Article Content

Article details.

internet censorship research paper

Academia.edu no longer supports Internet Explorer.

To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to  upgrade your browser .

  •  We're Hiring!
  •  Help Center

Internet censorship

  • Most Cited Papers
  • Most Downloaded Papers
  • Newest Papers
  • Save to Library
  • Last »
  • Censorship Follow Following
  • Singapore Politics Follow Following
  • Comparative Communication Law Studies Follow Following
  • Media & Communication Follow Following
  • Internet Law Follow Following
  • Conflict of Laws Follow Following
  • Internet Studies Follow Following
  • State Theory Follow Following
  • Functional Medicine Follow Following
  • Physicians Follow Following

Enter the email address you signed up with and we'll email you a reset link.

  • Academia.edu Publishing
  •   We're Hiring!
  •   Help Center
  • Find new research papers in:
  • Health Sciences
  • Earth Sciences
  • Cognitive Science
  • Mathematics
  • Computer Science
  • Academia ©2024
  • Share full article

Advertisement

Supported by

the new new world

As China’s Internet Disappears, ‘We Lose Parts of Our Collective Memory’

The number of Chinese websites is shrinking and posts are being removed and censored, stoking fears about what happens when history is erased.

An illustration of a large creature with glowing red eyes. Its paws are on stacks of paper, which are also in its mouth, in between its baring fangs. Nearby, people are holding documents, two of them holding up one that says “404.”

Chinese people know their country’s internet is different. There is no Google, YouTube, Facebook or Twitter. They use euphemisms online to communicate the things they are not supposed to mention. When their posts and accounts are censored, they accept it with resignation.

They live in a parallel online universe. They know it and even joke about it.

Now they are discovering that, beneath a facade bustling with short videos, livestreaming and e-commerce, their internet — and collective online memory — is disappearing in chunks.

A post on WeChat on May 22 that was widely shared reported that nearly all information posted on Chinese news portals, blogs, forums, social media sites between 1995 and 2005 was no longer available.

“The Chinese internet is collapsing at an accelerating pace,” the headline said. Predictably, the post itself was soon censored.

“We used to believe that the internet had a memory,” He Jiayan, a blogger who writes about successful businesspeople, wrote in the post. “But we didn’t realize that this memory is like that of a goldfish.”

It’s impossible to determine exactly how much and what content has disappeared. But I did a test. I used China’s top search engine, Baidu, to look up some of the examples cited in Mr. He’s post, focusing on about the same time frame between the mid-1990s and mid-2000s.

We are having trouble retrieving the article content.

Please enable JavaScript in your browser settings.

Thank you for your patience while we verify access. If you are in Reader mode please exit and  log into  your Times account, or  subscribe  for all of The Times.

Thank you for your patience while we verify access.

Already a subscriber?  Log in .

Want all of The Times?  Subscribe .

  • IEEE Xplore Digital Library
  • IEEE Standards
  • IEEE Spectrum Online
  • More IEEE Sites

Home

Call For Papers [Main Conference]

Submission link and the pdf of Call-for-Papers will be posted soon. 

IEEE INFOCOM 2025 is scheduled to take place in London, United Kingdom. This event will be conducted in person, allowing attendees to fully immerse themselves in the conference experience. However, we understand that some authors may encounter travel difficulties, such as obtaining visas. In such cases, assistance for remote presentation of their papers will be considered upon approval by the General Chairs. Virtual participation in the conference will no longer be supported.

IEEE INFOCOM is a top-ranked networking conference of the IEEE Communications Society. IEEE INFOCOM 2025 solicits research papers describing significant and innovative research contributions to the field of computer and data communication networks. We invite submissions on a wide range of research topics, spanning both theoretical and systems research. Topics include but are not limited to:

  • Artificial Intelligence/Machine learning for networking
  • Cellular wireless broadband systems, including 6G and beyond
  • Censorship circumvention and net neutrality
  • Challenging Network Environments (underwater, underground)
  • Cloud computing/mobile cloud computing
  • Cross-layer designs
  • Cyber-physical network systems
  • Datacenter networking
  • Dynamic spectrum sharing
  • Edge and fog computing/networking
  • Extremely high-frequency communications (mmWave, THz)
  • Fault tolerance, reliability, and survivability
  • Full duplex communication networks
  • Green networks
  • Information-centric networking
  • Interference management and mitigation
  • Internet architectures
  • Internet of Things
  • Large-scale MIMO-based networking
  • Localization and location-based services
  • Medium access control
  • Mobile sensing and applications
  • Mobility management and models
  • Multimedia networking
  • Network economics and pricing
  • Network management
  • Network measurement and analysis
  • Network security and privacy
  • Network support for VR/AR
  • Network virtualization
  • Networked autonomous aerial/terrestrial/underwater systems
  • Non-terrestrial networks
  • Online social networks
  • Optical networks
  • Overlay and peer-to-peer networks
  • Quality-of-service and resource management
  • Quantum networking
  • Radio Frequency Identification (RFID) and Near-Field Communication (NFC)
  • Router and switch design
  • Routing and multicast
  • Scaling laws and fundamental limits
  • Software-defined networking (SDN)
  • Tactile Internet
  • Testbeds, experimentations, and networked experimental platforms
  • Ultra-Reliable Low-Latency Communications (URLLC)
  • Vehicular networks
  • Visible light communications (VLC)
  • Web applications and content distribution
  • Wireless local/personal area networks

IEEE INFOCOM incorporates a rigorous double-blind review process, empowered by a fully automated review assignment system that analyzes the submitted manuscripts and the representative publications of TPC members and matches the submissions to TPC members’ expertise and interests. The automated review assignment system, termed Erie, is described in the following paper.

B. Li and Y. T. Hou. “The new automated INFOCOM review assignment system,” IEEE Network, vol.30, no.5, pp.18-24, Sept./Oct. 2016. http://ieeexplore.ieee.org/document/7579022/

Papers that present data that include experiments on or with humans or animals and/or presentation or analysis of personally identifiable information, including aggregated data, must have the appropriate approval from the author(s)’ institution(s). An explicit statement about the approval must be included in the paper (with appropriate anonymization in the paper submitted for review).

Preprints Policy

The submitted manuscript or its title/abstract should not be posted on a public website, such as arXiv.org, or transmitted via public mailing lists.

Conflict of Interest (CoI)

Before submission, please update your CoIs in the EDAS system. A CoI occurs when a person’s objective judgment is — or is perceived by a reasonable observer — compromised by an existing relationship, affiliation, or connection to a person whose work they must evaluate.

The following are considered to be specific examples of relationships that produce CoIs. Individuals in such relationships should not be involved in peer review of, or making editorial decisions about, materials provided by the related parties.

  • The lifelong relationship between Ph.D. student and Ph.D. supervisor
  • Working closely together (e.g., at the same institution, company, or organization; or within the same organizational team).
  • Recipients of joint funding or significant professional collaboration.
  • Joint authorship of an archival publication.
  • Personal or family relationships that would reasonably cause others to doubt the impartiality of the review
  • Notable personal or professional conflicts (publicly known or not).

Submission Cap, Length, and Formatting Requirements

The maximum number of papers an author can submit to IEEE INFOCOM 2025 is five . Accepted and presented papers will be published in the IEEE INFOCOM 2025 Conference Proceedings and submitted to IEEE Xplore®. Submitted papers must be written in English, with a maximum length limit of 10 printed pages . The main text (including figures, tables, appendices, and any material other than references) must be no more than 9 pages . Papers that do not comply with the length limit will not be reviewed. Use the standard IEEE Transactions templates for Microsoft Word or LaTeX formats found at: https://www.ieee.org/conferences/publishing/templates.html

If the paper is typeset in LaTeX, please use an unmodified version of the LaTeX template IEEEtran.cls version 1.8, and use the preamble: \documentclass[10pt, conference, letterpaper]{ IEEEtran }

Do not use additional LaTeX commands or packages to override and change the default typesetting choices in the template, including line spacing, font sizes, margins, space between the columns, and font types. This implies that the manuscript must use 10-point Times font, two-column formatting, as well as all default margins and line spacing requirements as dictated by the original version of IEEEtran.cls version 1.8. If you are using Microsoft Word to format your paper, you should use an unmodified version of the Microsoft Word IEEE Transactions template (US letter size). Regardless of the source of your paper formatting, you must submit your paper in Adobe PDF format.

The paper must print clearly and legibly, including all the figures, on standard black-and-white printers. Reviewers are not required to read your paper in color. The submitted manuscript should be self-contained. Inclusion of additional material (e.g., a technical report containing the detailed math proof through an anonymous Dropbox or OneDrive link) is not allowed.

Important Dates:

Abstract Due: Wednesday, July 24, 2024 (11:59pm, PDT) Full Paper Due: Wednesday, July 31, 2024 (11:59pm, PDT) Notification of Acceptance: Friday, December 6, 2024

Accepted and presented papers will be published in the IEEE INFOCOM 2025 Conference Proceedings and submitted to IEEE Xplore®. Full details regarding the submission procedures and requirements are available at https://infocom2025.ieee-infocom.org/. The submission website will be posted soon.

Technical Program Chairs

Carla Chiasserini (Politecnico di Torino, Italy) Aaron Striegel (University of Notre Dame, USA) Lei Ying (University of Michigan, Ann Arbor, USA)

Technical Program Vice-Chair for Information Systems

Huacheng Zeng (Michigan State University, USA)

Internet Censorship in India: Boom or Bane

17 Pages Posted: 2 Jul 2020

Suman Pathak

Independent

Date Written: August 26, 2019

The advent of internet has brought the fastest way of accessing information and connecting with each other. The internet has made everyone a publisher of their own. The number of people who use internet as their way of expression is comparatively more than the one who uses the traditional media. This popularity of internet made government to exercise control over it. This gives birth to the concept of Internet Censorship. Internet Censorship is good for eradicating social evils over the internet like pornography, fake news, bullying etc. There are some Information Technology Laws in India used for the punishment of such crime but if these provisions are used in the name of regulations to promote agenda of a political party which is not in the interest of public at large, it would amount to violation of Fundamental Rights. On the other hand an unrestricted internet will be no less than a disaster caused by humans. In this paper the researchers have attempted to discuss the battle between the Freedom of speech and Expression versus Internet Censorship. In furtherance of it, the paper detailed about the incidents of online censorship involving politics and other corrupt practices. The views in the paper are neither inclined over the Freedom of speech nor over the censorship. Thus it also includes elaboration on the question that why internet censorship is required in today’s era? Some of the judicial pronouncements and day to day incidents are also discussed to explain this tussle between the individual’s freedom and Internet censorship.

Suggested Citation: Suggested Citation

Suman Pathak (Contact Author)

Independent ( email ), do you have a job opening that you would like to promote on ssrn, paper statistics, related ejournals, public international law: human rights ejournal.

Subscribe to this fee journal for more curated articles on this topic

Law & Society: International & Comparative Law eJournal

India law ejournal, legal anthropology: laws & constitutions ejournal, communication law & policy ejournal, comparative political economy: regulation ejournal, visual anthropology, media studies & performance ejournal, human rights ejournal.

Subscribe to this free journal for more curated articles on this topic

Why librarians at Harvard and elsewhere are racing to save vintage porn

Research libraries in cambridge and across the country are hurrying to collect sexual ephemera from americans’ pasts, before it’s too late..

A photo illustration with a TV in the background with a fuzzy image of a person. In the foreground, there are two small stacks of VCR tapes.

H ARVARD’S SCHLESINGER LIBRARY didn’t set out to be a repository of 1980s pornographic history.

It all started with the death of the feminist pornographer Candida Royalle. In 2015, the library’s then-director, Jane Kamensky, spotted Royalle’s obituary in The New York Times, which described her work as “female-oriented, sensuously explicit cinema as opposed to formulaic hard-core pornographic films that she said degraded women for the pleasure of men.”

Kamensky , intrigued, wrangled an invitation to Royalle’s memorial service, where she kept hearing allusions to a rich collection of diaries, letters, and other material. Soon, Kamensky persuaded Royalle’s friend, the writer and sex worker Veronica Vera, to give Royalle’s papers to the library, which specializes in the history of women.

The Royalle archive includes everything from Royalle’s Femme line of adult films to her testimony during government obscenity investigations in the 1980s. It has videos of her Phil Donahue Show appearances, products from her sex toy line, and letters to fellow directors, friends, and family.

Once Royalle’s archive landed at the library, “There was a kind of flood” of sex and pornography-related materials to Schlesinger , Kamensky says, including papers from the late First Amendment advocate and adult film star Gloria Leonard .

Advertisement

But the collecting isn’t just at Harvard. As anti-porn laws sweep the United States, librarians and archivists across the country are vacuuming up the sexual ephemera from Americans’ pasts, trying to preserve the remnants of pre-internet pornography.

It’s all a relatively new development: In the 1960s, with the rise of the field of social history in academia, there was a turn across disciplines toward collecting materials from ordinary people and those who were less wealthy to study “history from the bottom up,” as the late historian Jesse Lemisch famously put it. But it’s only within the past decade that more institutions have been creating their own archives devoted to what once was nearly always thrown out.

“Sex archives are having a moment,” says Lynn Comella , a professor of gender and sexuality studies. She helped found the Sexual Entertainment and Economies collection at University of Nevada, Las Vegas, which opened its doors earlier this year. “Sexual history is history, and this message is beginning to resonate more widely with people both in and outside the adult industry.”

The more recent collections — at Harvard’s Schlesinger library, UNLV, and the University of Toronto, which began building its Sexual Representation Collection around 2018 — join a few longstanding archives including Cornell’s Human Sexuality Collection , which opened in 1988, and The Kinsey Institute at Indiana University , which dates to 1947.

Recently, Kinsey acquired the collection of the late Cynthia “Plaster Caster” Albritton , an artist and self-described “recovering groupie” who made plaster molds of famous musicians’ penises, starting with Jimi Hendrix. (In the 2000s, Albritton began making molds of female musicians’ breasts as well.) Her collection was particularly rich: bronze casts and plaster molds, diaries, and her personal library of books.

The historian Jane Kamensky, with items from the personal archive of Candida Royalle, the porn star who became the godmother of sex-positive feminists, at Harvard’s Schlesinger Library, in Cambridge, Mass., Dec. 1, 2023. Royalle’s voluminous archive is now housed at the Harvard library, where the trove of diaries, letters, photographs, scrapbooks, videos and memorabilia is opening up a new window into the sexual revolution.

Critics of such collections say public funds or tuition dollars shouldn’t be paying for them. Even Kinsey, the nation’s first major collection of sexual materials at a public university, has been on shaky ground. In May of last year, the institute was defunded by the Indiana Legislature for the first time since its founding more than seven decades ago, which means it now mostly has to rely on grants and donations.

“We’re in a place culturally right now where people are still weaponizing knowing about sex, knowing about our bodies,” says Kinsey curator Rebecca Fasman .

So what are the benefits of saving breast and penis casts — or such films as Bisexual Buggery (1969), Dr. Longpeter (1947), and The Foxy Fireman (1952), as Kinsey does? Why preserve Space Virgins (1984) and Debbie Does Dallas Part II (1981) as the Library of Congress does within its collection of more than 200 pornographic films?

“Without primary source materials on assorted sexual topics and populations and practices, there is no scholarship: only speculation and assumptions and prejudices and gossip,” says Gayle Rubin, an associate professor of anthropology and women’s studies at the University of Michigan . When Rubin was studying leather culture in the gay community in San Francisco, she had to collect her own archives, which was common for sexuality scholars in the 1970s, ‘80s, and ‘90s. Rubin thinks that archives such as UNLV’s help researchers create “better, deeper, more evidence-based histories of queer and other sexual populations” than was possible a few decades ago.

UNLV has received some important donations, including the archives of Brian Gross, an adult industry publicist, and the records of Norma Jean Almodovar, who advocated for sex workers’ rights. Because of its small budget, Comella had to fund-raise for the collection’s launch in January. One of the donors: legal brothel The Chicken Ranch.

Porn is so prevalent now that it is probably having a greater effect on people than it did a century ago. For example, rough sex in porn has normalized the practice and may have contributed to the marked — and sometimes dangerous — increase in teens doing so in real life, according to surveys.

One of the questions porn archives can help answer is: Does pornography hold a mirror to our culture or does it shape it? Does it cause social and sexual problems or merely reflect those that already exist?

Black and white photo taken from behind three people sitting in chairs on a stage in front of an audience. The person in the middle, Candida Royalle, has her head turned so she's facing the camera.

Comella, from UNLV, believes the answer to the question is both: porn reflects people’s desires and shapes them. Jackie Strano , cofounder of S.I.R. Video Productions, a lesbian porn company created in the 1990s, was working at San Francisco’s Good Vibrations sex toy shop (which has locations in Brookline and Harvard Square) and saw that more and more straight couples were coming in to ask about “pegging” (though the term wasn’t popularized by sex columnist Dan Savage until years later). With partner Shar Rednour, Strano went on to make an instructional film about it, Bend Over Boyfriend, as “a direct response to growing interest in a specific sexual practice,” says Comella. At the same time, the movie helped bring the practice “out of the closet and introduce it to more couples.” Strano’s records of the world of 1990s and early 2000s adult film are now at UNLV.

“Pornography often shows existing sexual interests,” adds Amanda Gesselman of the Kinsey Institute . “But pornography can also shape viewers’ future sexual interests because pornography introduces and normalizes different activities and roles that viewers may not have been exposed to before.”

Overall, the types of things we like to watch on screen mostly haven’t changed all that much from the 1920s. “Anything that can be seen today they were doing then, too — and sometimes in even more adventurous and boundary-pushing ways,” says Peter Alilunas , associate professor of cinema studies at the University of Oregon and the author of Smutty Little Movies: The Creation and Regulation of Adult Video.

The first known instance of male-male penetration on film was in 1924′s Exclusive Sailor, says Patrick Keilty , former director of the University of Toronto’s Sexual Representation Collection. “There’s a long tradition of gay sailors.”

Keilty also cites examples of women being sexually empowered long before the sexual revolution, pointing to a 1940s video of a couple having sex that’s in Toronto’s Collection. “Her body language appears self-assured, relaxed, satisfied, and comfortable. There’s a casual way in which she seems in command and confident,” Keilty says.

What has changed is how we view the films, who is making them, and who has access to them.

In the early 1900s, porn was generally watched on celluloid films by groups of men in grind houses, secret basement viewing rooms. By the 1970s, it was viewed in public movie theaters by a wider crowd because by then, obscenity laws “are starting to come undone,” Keilty says. In the 1980s, porn films started being viewed in the home on TV, thanks to the advent of the VCR. Now, most of us have access to a full universe of porn on our smartphones.

The viewership spike is striking. In the 1970s, 45 percent of men and 28 percent of women ages 18-26 had seen an X-rated movie in the past year, according to an analysis of a General Social Survey . In 2008-2012, in the same age groups, 62 percent of men and 36 percent of women had. (Although respondents tend to underreport pornography viewing.)

The storytelling has changed too. In the early 1900s, most porn films were shorter and focused narrowly on sex acts, according to Alilunas.

In the 1950s and ‘60s, filmmakers evaded censorship by making “lab coat films.” In these movies, Keilty says, “Some doctor in a white lab coat comes out at the start of it and tells you why this film is educational.” But in the 1970s, when adult films were in movie theaters raking in millions, as Deep Throat did, they were longer and more narrative driven. ( Deep Throat was among the early films to earn an X-rating, originally introduced to alert parents to the presence of violence or sex, but soon a selling point on its own.)

In the 1980s, the industry was dominated by lower-cost VHS. By the DVD era in the 1990s and 2000s, “There was a re-emergence of sophisticated stories and larger budgets,” Alilunas says. There’s one throughline “in the history of media technology and that’s the broad, steady, and widespread demand by people that it include sexually explicit material.” Now, the porn industry is dominated by cheap-to-record 10 minute clips on “tube sites” such as Pornhub.

Archives show the struggles women have always had in the porn industry, both as actors and directors, and they document the shift in the adult industry to more female directors making films, although the percentage remains small.

At Harvard, Schlesinger’s archives of iconic 1980s-era feminist porn stars show that while in some ways porn was a woman’s world — actresses were generally paid more than men per scene — in other ways it was firmly a patriarchal place: Actresses didn’t have much of a say about what they did on screen; films were nearly always directed in service of the male gaze.

Royalle’s archive charts the course of the industry from the 1970s so-called porno chic era of Deep Throat through the 1980s, when Royalle began her own production company, one of the first female-driven porn companies, focused on female sexual pleasure and foreplay.

Before Kamensky brought Royalle’s archive to Harvard, almost all of the pornography-related materials in the collection were the perspectives of anti-porn feminists such as Catharine MacKinnon and Andrea Dworkin. So scholars who wanted to study pornography were met with one point of view: that of women who opposed it.

Black and white photo of women holding signs on top of sticks marching through a busy city street. Some of the signs say, "Pornography is not art it's violence"; "porn is violence against women"; "pornography is anti-female propaganda."

“We need to be able to study the difficult issues of women, gender, and sexuality from a 360 perspective,” says Kamensky, who recently published the biography Candida Royalle & the Sexual Revolution based on the collections at Harvard. With Royalle’s archive, “Now, you can assess that argument by looking [at] what women in the adult industry say about their own experience.”

Kamensky is primarily a historian of the American Revolution era, and she “had no intention” of writing about Royalle when her archive came in. But she decided to take a quick glance, she says. “From the first look at a randomly chosen diary from a randomly chosen box, it was clear that her life story did not fit any received narrative. So that it’s not a simple story of self-liberation and joy. And it’s also not a story only of victimization, and constraint,” Kamensky says. “[I saw] the potential for the material to redraw our narrative of the sexual revolution.”

Pornography also reflects and responds to world events. The University of Southern California’s archive of erotic physique photos and magazines gives a shifting account of what the ideal body was for gay men, librarian Michael C. Oliveira says. In the 1960s and ‘70s, the ideal male body was a thin one, but in the ‘80s, that changed. “You have HIV/AIDS hitting and people that are thin are probably sick, at least that’s what society feels,” Oliveira says. “And then all of a sudden you see people starting to bulk up, especially in the queer community.” That history is visible in porn.

A worn red diary that says "1 year diary" on the front. It's on top of a dark wooden surface.

KAMENSKY LEFT HARVARD earlier this year. But Schlesinger has been continuing to collect sex-related materials.

On a recent Wednesday afternoon, Schlesinger’s curator for gender and society, Jenny Gotwals , escorted me up a set of stairs to the third floor, where some unprocessed collections and archivists’ offices are. She pointed to “the AV graveyard,” a cubicle stuffed with a tape recorder, a gleaming silver reel-to-reel player with VHS and BETA tapes piled on top, a vintage film camera, and a boombox for CDs. A five-shelf metal bookcase holds rows of cardboard archival boxes. She showed me the collection of the newest sex-positive activist’s papers they’ve acquired: the records of Priscilla Alexander, who persuaded the National Organization of Women to form a committee on Prostitutes’ Rights. Among other achievements, Alexander spent four years at Geneva’s World Health Organization working on their Global Program on AIDS.

Gotwals directed me to Harvard’s other collection of porn, which is in Houghton Library, a repository of rare books and archives. There, I met curator Leslie A. Morris in her office, where a life mask of John Keats looks down from a shelf above her desk.

One problem she encounters is that few researchers or students know to look for pornographic material in Harvard’s collections, Morris says. When the library received a large recent donation of materials relating to sex and drug use, it staged an exhibition to alert people to the fact that it was available. Because, she says, “No one would associate this kind of material with Harvard.”

I asked Morris, who went to Catholic school, if she ever rejects materials for being too racy. “I don’t see it as my job to say, ‘this is too explicit,’” Morris says. “I mean, it is a reflection of a sexual practice that someone considers normal and enjoyable.” But she does sometimes have to pace herself. “I find I can’t look at a lot of this stuff for a long time, so I might spend half a day on it,” Morris says. “At times, I just don’t look too closely.”

Hallie Lieberman is a writer, sex historian, and the author of Buzz: A Stimulating History of the Sex Toy . Send comments to [email protected] .

IMAGES

  1. ISYS100 Final Research Paper on Internet Censorship

    internet censorship research paper

  2. Internet Censorship Should it be allowed

    internet censorship research paper

  3. Internet Censorship

    internet censorship research paper

  4. ⇉Essay

    internet censorship research paper

  5. Internet censorship research paper

    internet censorship research paper

  6. Internet Censorship Essay Research Paper

    internet censorship research paper

VIDEO

  1. Internet Censorship in Pakistan, PTA to Install National Firewall to Filter Social Media #firewall

  2. The Internet is Losing Content and No One's Talking About It // Research

  3. Paper Mario Censorship Is GOOD.. I'll Explain Why

  4. Paper Mario Censorship Is Beneficial

COMMENTS

  1. 'Extremely aggressive' internet censorship spreads in the world's

    The paper is titled "Censored Planet: An Internet-wide, Longitudinal Censorship Observatory. " The research team also included former U-M computer science and engineering student Prerana Shenoy, and Katharina Kohls, an assistant professor at Radboud University in Nijmegen, Netherlands.

  2. Internet censorship: making the hidden visible

    Despite being founded on ideals of freedom and openness, censorship on the internet is rampant, with more than 60 countries engaging in some form of state-sponsored censorship. A research project at the University of Cambridge is aiming to uncover the scale of this censorship, and to understand how it affects users and publishers of information.

  3. Freedom of expression in the Digital Age: Internet Censorship

    Internet is regarded as an important issue that shapes free expression in today's volatile nature of human rights world (Momen 2020 ). In the digital age, authoritarian governments in the world always attempt to undermine political and social movement through the complete shutdown of the Internet or providing partial access to it.

  4. PDF The Shifting Landscape of Global Internet Censorship

    His research focuses on Internet censorship in the Middle East and North Africa; exploring the impact of information and communication technologies on the Arab information societies; how the use of the Internet defies the social and political structures; and the potential systemic changes cyberspace can bring to real ...

  5. (PDF) A Taxonomy of Internet Censorship and Anti-Censorship

    Abstract and Figures. Internet is supposed to be born free, yet it is censored almost everywhere, and severely censored in a few countries. The tug-of-war on the Internet between censors and anti ...

  6. Walking Through Firewalls: Circumventing Censorship of Social Media and

    Although authoritarian governments often employ a mix of increasingly sophisticated censorship tactics (e.g., removing a tweet versus demonizing the act of tweeting) belonging to different "generations of control" (Deibert & Rohozinski, 2010), restricting access to content and social media platforms through a variety of technical means (e.g., blocking internet protocols [IPs], removing ...

  7. The Shifting Landscape of Global Internet Censorship

    This study documents the practice of Internet censorship around the world through empirical testing in 45 countries of the availability of 2,046 of the world's most-trafficked and influential websites, plus additional country-specific websites. ... Public Law & Legal Theory Research Paper Series. Subscribe to this free journal for more ...

  8. Selective Control: The Political Economy of Censorship

    Further research is needed to test how well recent trends respond to our theoretical predictions. ... This paper asks whether the censorship strategies employed by censors vary across individual targets. ... Pan, J. (2017). How market dynamics of domestic and foreign social media firms shape strategies of Internet censorship. Problems of Post ...

  9. The Internet censorship bibliography

    The Internet censorship bibliography in Internet Censorship is a comprehensive collection of academic papers and technical reports on various aspects of online censorship, such as detection, circumvention, and analysis. The bibliography is maintained by Philipp Winter, a computer scientist and researcher who works on privacy and security issues. The bibliography covers topics such as probe ...

  10. Communications of the IIMA

    In this paper I focus on the rise of Internet censorship and circumvention. The main objectives are to trace the history of Internet censorship over the last twenty years. I survey technologies and strategies employed by various governments, especially repressive governments, for Internet censorship.

  11. Introduction to: Internet Censorship and Control

    In the collection, we present five peer reviewed papers on the topic of Internet censorship and control. The topics of the papers include a broad look at information controls, censorship of microblogs in China, new modes of online censorship, the balance of power in Internet governance, and control in the certificate authority model.

  12. (PDF) Need of Internet Control and Censorship

    This paper investigates the need for internet control. surveillance, self-censorship, website blocking, and DNS blocking. The. access, loss of trust, and threats to human rights. The paper ...

  13. (PDF) Media censorship: Freedom versus responsibility

    Internet domain, digital censorship followed with tools such as filtering, blocking, hacking, and ... this paper is one of the first research contributions to analyse the relationships between ...

  14. PDF A Worldwide View of Nation-state Internet Censorship

    trends in Internet censorship globally. The narrow scope of a case study only shows the experience of one country or region, for a limited time period. Few works provide global insights over multi-year measurement periods. This paper fills this gap by providing a worldwide represen-tative view of Internet censorship methods. By drawing from

  15. Censored Planet

    An Internet-wide, Longitudinal Censorship Observatory. ... Read our USENIX 2023 paper on network changes after Russia's invasion of Ukraine in 2022. January 19, 2023. Join Censored Planet as a 2023 ICFP Fellow. ... Our research publications are often technical and complex, here we aim to communicate our research to a broader audience. ...

  16. PDF The Impact of Media Censorship: Evidence from a Field Experiment in China

    citizens' reach. Scholars have long suggested that censorship is key to the popular support and stability of these regimes (Ford, 1935). Nonetheless, direct empirical evidence about the effect of removing censorship is limited. In this paper, we ask two questions. Does providing access to an uncensored Internet lead citizens to

  17. Cybercrime, Censorship, Perception and Bypassing Controls: An

    Abstract. Countries have employed the Internet proxy as a censorship mechanism for various reasons. Concurrently, cyber criminal activities continue to rise. This research explores peoples' engagement in bypassing the Internet proxy and if it is related to cyber criminal engagement. Through an experimental design, participants were randomly ...

  18. Censoring political opposition online: Who does it and why

    Although some case studies have examined abuse of power by moderators , including anecdotal evidence of politically motivated censorship (Wright, 2006), the current research is the first systematic investigation of censoring among people who moderate online communities. This investigation is consequential because selective censoring that favors ...

  19. Full article: Internet Shutdowns

    Like so many other technologies, the internet poses a double-edged sword in the context of human rights. Footnote 1 While civilians can mobilise the internet to assemble and voice dissent, it can also be weaponised to consolidate power and suppress any form of opposition. Internet shutdowns, meaning intentional disruptions of internet services, Footnote 2 represent one method that limits ...

  20. Censorship of the Internet: The Job of Parents, Not Government

    This paper presents arguments against censorship of the Internet. The Internet has become one of the most valuable technological tools in our society. For the first time in history, people can freely express their opinions. In fact, it has been suggested "that on-line systems give people far more genuinely free speech and free press than [has] ever [occurred] in human history" (Com-Revere 71).

  21. Internet Censorship by Suraj Yadav :: SSRN

    The views expressed in the paper are neither pro-freedom of expression nor anti-censorship. As a result, it also explains why internet censorship is essential in today's world. Some legal rulings and everyday occurrences are also explored to understand the conflict between individual rights and Internet censorship.

  22. Internet censorship Research Papers

    The research results and the analysis of the literature on the subject, as presented in this paper, confirm the main hypothesis of the paper, which was: "The concept of free flow of information has little chances of success at this stage of development of means of communication, due to the existing risk of limiting free access to Internet".

  23. As China's Internet Disappears, 'We Lose Parts of Our Collective Memory

    Internet publishers, especially news portals and social media platforms, have faced heightened pressure to censor as the country has made an authoritarian and nationalistic turn under Mr. Xi's ...

  24. Call For Papers [Main Conference]

    Call For Papers [Main Conference] Submission link and the pdf of Call-for-Papers will be posted soon. ... IEEE INFOCOM 2025 solicits research papers describing significant and innovative research contributions to the field of computer and data communication networks. We invite submissions on a wide range of research topics, spanning both ...

  25. Internet Censorship in India: Boom or Bane

    Internet Censorship is good for eradicating social evils over the internet like pornography, fake news, bullying etc. There are some Information Technology Laws in India used for the punishment of such crime but if these provisions are used in the name of regulations to promote agenda of a political party which is not in the interest of public ...

  26. Pornography: Harvard librarians maintain a porn archive

    In the 1950s and '60s, filmmakers evaded censorship by making "lab coat films." In these movies, Keilty says, "Some doctor in a white lab coat comes out at the start of it and tells you ...