
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Internet Censorship in China
Dakuo Wang, Gloria Mark
ACM Transactions on Computer-Human Interaction (2015) Vol. 22, Iss. 6, pp. 1-22
Closed Access | Times Cited: 49
Dakuo Wang, Gloria Mark
ACM Transactions on Computer-Human Interaction (2015) Vol. 22, Iss. 6, pp. 1-22
Closed Access | Times Cited: 49
Showing 1-25 of 49 citing articles:
Algorithmic Censorship by Social Platforms: Power and Resistance
Jennifer Cobbe
Philosophy & Technology (2020) Vol. 34, Iss. 4, pp. 739-766
Open Access | Times Cited: 92
Jennifer Cobbe
Philosophy & Technology (2020) Vol. 34, Iss. 4, pp. 739-766
Open Access | Times Cited: 92
Restoring trust through transparency: Examining the effects of transparency strategies on police crisis communication in Mainland China
Qi Zheng
Public Relations Review (2023) Vol. 49, Iss. 2, pp. 102296-102296
Closed Access | Times Cited: 18
Qi Zheng
Public Relations Review (2023) Vol. 49, Iss. 2, pp. 102296-102296
Closed Access | Times Cited: 18
Effects of perceived online–offline integration and internet censorship on mobile government microblogging service continuance: A gratification perspective
Yixiao Li, Shuiqing Yang, Yuangao Chen, et al.
Government Information Quarterly (2018) Vol. 35, Iss. 4, pp. 588-598
Closed Access | Times Cited: 59
Yixiao Li, Shuiqing Yang, Yuangao Chen, et al.
Government Information Quarterly (2018) Vol. 35, Iss. 4, pp. 588-598
Closed Access | Times Cited: 59
Exploring the Use of Personalized AI for Identifying Misinformation on Social Media
Farnaz Jahanbakhsh, Yannis Katsis, Dakuo Wang, et al.
(2023), pp. 1-27
Open Access | Times Cited: 14
Farnaz Jahanbakhsh, Yannis Katsis, Dakuo Wang, et al.
(2023), pp. 1-27
Open Access | Times Cited: 14
Provably Secure Public-Key Steganography Based on Elliptic Curve Cryptography
Xin Zhang, Kejiang Chen, Jinyang Ding, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 3148-3163
Closed Access | Times Cited: 4
Xin Zhang, Kejiang Chen, Jinyang Ding, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 3148-3163
Closed Access | Times Cited: 4
Unpacking drivers of online censorship endorsement: Psychological and demographic factors
Houman Jafari, Hamid Keshavarz, Mahmood Khosrowjerdi, et al.
Computers in Human Behavior Reports (2025) Vol. 18, pp. 100639-100639
Closed Access
Houman Jafari, Hamid Keshavarz, Mahmood Khosrowjerdi, et al.
Computers in Human Behavior Reports (2025) Vol. 18, pp. 100639-100639
Closed Access
Robbing Peter to Pay Paul: Surrendering Privacy for Security’s Sake in an Identity Ecosystem
Robert E. Crossler, Clay Posey
Journal of the Association for Information Systems (2017) Vol. 18, Iss. 7, pp. 487-515
Open Access | Times Cited: 33
Robert E. Crossler, Clay Posey
Journal of the Association for Information Systems (2017) Vol. 18, Iss. 7, pp. 487-515
Open Access | Times Cited: 33
Censorship as Reward: Evidence from Pop Culture Censorship in Chile
Jane Esberg
American Political Science Review (2020) Vol. 114, Iss. 3, pp. 821-836
Closed Access | Times Cited: 32
Jane Esberg
American Political Science Review (2020) Vol. 114, Iss. 3, pp. 821-836
Closed Access | Times Cited: 32
The Government's Dividend: Complex Perceptions of Social Media Misinformation in China
Zhicong Lu, Yue Jiang, Cheng Lü, et al.
(2020), pp. 1-12
Closed Access | Times Cited: 29
Zhicong Lu, Yue Jiang, Cheng Lü, et al.
(2020), pp. 1-12
Closed Access | Times Cited: 29
People from the U.S. and China think about their personal and collective future differently
Will Deng, Alexa Rosenblatt, Thomas Talhelm, et al.
Memory & Cognition (2022) Vol. 51, Iss. 1, pp. 87-100
Open Access | Times Cited: 17
Will Deng, Alexa Rosenblatt, Thomas Talhelm, et al.
Memory & Cognition (2022) Vol. 51, Iss. 1, pp. 87-100
Open Access | Times Cited: 17
“I know it's sensitive”: Internet censorship, recoding, and the sensitive word culture in China
Weiming Ye, Luming Zhao
Discourse Context & Media (2022) Vol. 51, pp. 100666-100666
Open Access | Times Cited: 17
Weiming Ye, Luming Zhao
Discourse Context & Media (2022) Vol. 51, pp. 100666-100666
Open Access | Times Cited: 17
The Culture of Censorship: State Intervention and Complicit Creativity in Global Film Production
Jun Fang
American Sociological Review (2024) Vol. 89, Iss. 3, pp. 488-517
Closed Access | Times Cited: 3
Jun Fang
American Sociological Review (2024) Vol. 89, Iss. 3, pp. 488-517
Closed Access | Times Cited: 3
Political trust in the internet context: A comparative study in 36 countries
Jia Lu, Li Qi, Xin Yu
Government Information Quarterly (2019) Vol. 36, Iss. 4, pp. 101386-101386
Closed Access | Times Cited: 27
Jia Lu, Li Qi, Xin Yu
Government Information Quarterly (2019) Vol. 36, Iss. 4, pp. 101386-101386
Closed Access | Times Cited: 27
Predicting the antecedents of discontinuous usage intention of mobile government social media during public health emergencies
Houcai Wang, Li Xiong, Jialu Guo, et al.
International Journal of Disaster Risk Reduction (2023) Vol. 87, pp. 103582-103582
Closed Access | Times Cited: 8
Houcai Wang, Li Xiong, Jialu Guo, et al.
International Journal of Disaster Risk Reduction (2023) Vol. 87, pp. 103582-103582
Closed Access | Times Cited: 8
Culturally-Embedded Visual Literacy
Yuan Wang, Yukun Li, Xinning Gui, et al.
Proceedings of the ACM on Human-Computer Interaction (2019) Vol. 3, Iss. CSCW, pp. 1-24
Closed Access | Times Cited: 23
Yuan Wang, Yukun Li, Xinning Gui, et al.
Proceedings of the ACM on Human-Computer Interaction (2019) Vol. 3, Iss. CSCW, pp. 1-24
Closed Access | Times Cited: 23
Malicious Selling Strategies in Livestream E-commerce: A Case Study of Alibaba’s Taobao and ByteDance’s TikTok
Qunfang Wu, Yisi Sang, Dakuo Wang, et al.
ACM Transactions on Computer-Human Interaction (2022) Vol. 30, Iss. 3, pp. 1-29
Closed Access | Times Cited: 13
Qunfang Wu, Yisi Sang, Dakuo Wang, et al.
ACM Transactions on Computer-Human Interaction (2022) Vol. 30, Iss. 3, pp. 1-29
Closed Access | Times Cited: 13
Internet Censorship in Thailand: User Practices and Potential Threats
Genevieve Gebhart, Tadayoshi Kohno
(2017), pp. 417-432
Closed Access | Times Cited: 23
Genevieve Gebhart, Tadayoshi Kohno
(2017), pp. 417-432
Closed Access | Times Cited: 23
A Confucian Look at Internet Censorship in China
Yubo Kou, Bryan Semaan, Bonnie Nardi
Lecture notes in computer science (2017), pp. 377-398
Open Access | Times Cited: 23
Yubo Kou, Bryan Semaan, Bonnie Nardi
Lecture notes in computer science (2017), pp. 377-398
Open Access | Times Cited: 23
Normalization of Censorship: Evidence from China
Tony Zirui Yang
SSRN Electronic Journal (2021)
Closed Access | Times Cited: 16
Tony Zirui Yang
SSRN Electronic Journal (2021)
Closed Access | Times Cited: 16
Relatively Democratic: How Perceived Internet Interference Shapes Attitudes about Democracy
Elizabeth Stoycheff
The International Journal of Press/Politics (2020) Vol. 25, Iss. 3, pp. 390-406
Closed Access | Times Cited: 16
Elizabeth Stoycheff
The International Journal of Press/Politics (2020) Vol. 25, Iss. 3, pp. 390-406
Closed Access | Times Cited: 16
To Disclose or Not to Disclose: An Evaluation of the Effects of Information Control and Social Network Transparency
Wenxi Pu, Siyuan Li, Gregory J. Bott, et al.
Computers & Security (2021) Vol. 112, pp. 102509-102509
Closed Access | Times Cited: 14
Wenxi Pu, Siyuan Li, Gregory J. Bott, et al.
Computers & Security (2021) Vol. 112, pp. 102509-102509
Closed Access | Times Cited: 14
The Origin and Value of Disagreement Among Data Labelers: A Case Study of Individual Differences in Hate Speech Annotation
Yisi Sang, Jeffrey M. Stanton
Lecture notes in computer science (2022), pp. 425-444
Closed Access | Times Cited: 9
Yisi Sang, Jeffrey M. Stanton
Lecture notes in computer science (2022), pp. 425-444
Closed Access | Times Cited: 9
Censorship or Protectionism? Reassessing China’s Regulation of Internet Industry
C. Y. Cyrus Chu
International Journal of Social Science and Humanity (2017), pp. 28-32
Open Access | Times Cited: 15
C. Y. Cyrus Chu
International Journal of Social Science and Humanity (2017), pp. 28-32
Open Access | Times Cited: 15
Resisting the Censorship Infrastructure in China
Yubo Kou, Yong Ming Kow, Xinning Gui
Proceedings of the ... Annual Hawaii International Conference on System Sciences/Proceedings of the Annual Hawaii International Conference on System Sciences (2017)
Open Access | Times Cited: 12
Yubo Kou, Yong Ming Kow, Xinning Gui
Proceedings of the ... Annual Hawaii International Conference on System Sciences/Proceedings of the Annual Hawaii International Conference on System Sciences (2017)
Open Access | Times Cited: 12
Mapping power and jurisdiction on the internet through the lens of government-led surveillance
Oskar Josef Gstrein
Internet Policy Review (2020)
Open Access | Times Cited: 11
Oskar Josef Gstrein
Internet Policy Review (2020)
Open Access | Times Cited: 11