Table of Contents

Comment Icon0 2600 News. (2002, June 5). Internet censorship in South Korea. Retrieved on June 10, 2008 from

Comment Icon0 Abbott, J.P., (2001, February). Democracy@Internet.Asia? The Challenges to the Emancipatory Potential of the Net: Lessons from China and Malaysia. Third World Quarterly, 22(1), 99-114.

Comment Icon0 Alekseyeva, L. (1992). The Birth of Samizdat History of Dissident Movement in the USSR, Vilnius.

Comment Icon0 Alexa Top Sites in English (2008). Retrieved on January 16, 2009 from

Comment Icon0 Maitlin, A. (2006, April 18). Skype says texts are censored by partner in China. The Financial Times.

Comment Icon0 Aljazeera News. (2007, October 7). More protesters held in Myanmar. Retrieved June 5, 2008, from

Comment Icon0 Amnesty International. (2000, December 19). China: Falun Gong deaths in custody continue to rise as crackdown worsens. Retrieved on June 2, 2009, from

Comment Icon0 Amnesty International. (2006, July). Undermining Freedom of Expression in China. London, U.K.: Amnesty International.

Comment Icon0 Kim, A.J. (2000). Community Building on the Web: Secret Strategies for Successful Online Communities. Peachpit, 8-9.

Comment Icon0 Anandarajan, M., Simmers, C., & Igbaria, M. (2000). An exploratory investigation of the antecedents and impact of Internet usage: An individual perspective. Behaviour & Information Technology, 19, 69–85.

Comment Icon0 Anderson, N. (2006, May 12). Yahoo on China: “We’re doing some good”. Ars Technica. Retrieved on July 21, 2008 from

Comment Icon0 Andsager, J. L. (1990). Perceptions of Credibility of Male and Female Syndicated Political Columnists. Journalism Quarterly. 67 (3), 485-91.

Comment Icon0 Aspinwall, L.G. & Taylor, S.E. (1992). Modeling cognitive adaptation: A longitudinal investigation of the impact of individual differences and coping on college adjustment and performance. Journal of Personality and Social Psychology, 63 (December), 989-1003.

Comment Icon0 Au, W. (2007, August 25). A First-Hand Look at a Chinese Second Life, HiPiHi. Retrieved June 26, 2008, from

Comment Icon0 Bae, K.-M. (2004, August 19). Teenagers to be blocked from cyber pornography. Korea Times. Retrieved on June 13, 2009 from

Comment Icon0 Baiocchi, G. (2003). Emergent Public Spheres: Talking Politics in Participatory Governance. American Sociological Review. 68 (1), 52.

Comment Icon0 Bambauer, D.E., Delbert, R.J., Palfrey, J.G., Rohozinzki, R. Villeneuve, N, & Zittrain, J. (2005, April 15). Internet Filtering in China in 2004-2005: A Country Study. Berkman Center for Internet & Society at Harvard Law School Research Publication No. 2005-10. Available at SSRN: or doi:10.2139/ssrn.706681

Comment Icon0 Ball-Rokeach, S. J., & Reardon, K. (1988). Monologue, dialogue and telelogue: Comparing an emerging form of communication with traditional forms. In R. Hawkins, S. Wieman, & S. Pingree (Eds.), Advancing communication science: Merging mass and interpersonal processes. Newberry Park, CA: Sage, 135-161.

Comment Icon0 Bandurski, D. (August 2008). “China’s Guerrilla War for the Web,” Far Eastern Economic Review. Retrieved November 24, 2008, from

Comment Icon0 Bangkok Post. (2007, September 28). Burma ‘cuts all Internet links’. Retrieved March 5, 2008 from

Comment Icon0 Bankston, K. (2005, January 14). EFF: Can the FBI Monitor Your Web Browsing Without a Warrant?. Retrieved November 14, 2007, from

Comment Icon0 Baran, P., Boehm, S., & Smith, P. (1964). On Distributed Communication. Tech. Rep., 1 (9), Rand Corp., Santa Monica, California.

Comment Icon0 Barme, G, & Sang Y. (1997, June). The Great Firewall of China. Wired, 5(6).

Comment Icon0 Baran, S. J., & Davis, D. K. (2009). Mass communication theory: Foundations, ferment, and future. Wadsworth series in mass communication and journalism. Boston, MA: Wadsworth Cengage Learning.

Comment Icon0 Barlow, J.P. (1996, February 9). A Declaration of the Independence of Cyberspace. Retrieved July 29, 2005 from

Comment Icon0 BBC News (2002, September 2). China blocking Google. Retrieved October 15, 2008 from

Comment Icon0 Beck, S. (1995, January 8). Concern grows over secret ban; Rights chief puts exiles on agenda. South China Morning Post.

Comment Icon0 Becker, J. (1999, January 12). Review of Dissidents, Human Rights Issues. South China Morning Post.

Comment Icon0 Becker, J., Hedebro, G., & Paldan, L. (Eds.). (1986). Communication and Domination. Ablex Publishing, New Jersey: Norwood.

Comment Icon0 Beijnum, I. (2008, September 25). Tech boom means China will run out of IP addresses by 2011. Ars Technica. Retrieved June 2, 2009, from

Comment Icon0 Bell, D. (2008). China’s new Confucianism: Politics and everyday life in a changing society. Princeton, N.J.: Princeton University Press.

Comment Icon0 Belloc, H. (1918). The free press. London: G. Allen & Unwin Ltd.

Comment Icon0 Benhabib, S. (1996). Democracy and difference: Contesting the boundaries of the political. Princeton, N.J.: Princeton University Press.

Comment Icon0 Benkler, Y. (2006). The Wealth of Networks: How Social Production Transforms Markets and Freedom. Yale University Press.

Comment Icon0 Berkman Center. (2002, February 24). Replacement of Google with Alternative Search Systems in China. Retrieved March 29, 2009, from

Comment Icon0 Bin, Z. & Taylor, R. (2004, September). Regulation and telecommunications market development in China. An East-West expert dialogue on September 28-30, 2004, Washington, D.C.

Comment Icon0 Birch, D. (2005, July 14). The Age of Sousveillance. The Guardian. Retrieved on June 24, 2008 from

Comment Icon0 Blood, R. (2000, September 7). Weblogs: A History And Perspective. Retrieved November 10, 2008, from

Comment Icon0 Blumler, J. G. & Katz, E. (1974) The Uses of Mass Communication. Newbury Park, CA: Sage

Comment Icon0 Blumler, J. G. & McQuail, D. (1969). Television in Politics: Its Uses and Influence. Chicago: University of Chicago Press.

Comment Icon0 Bogdan, R.C., & Biklen, S.K. (1998). Qualitative research for education: An introduction to theory and methods. Needham Heights, MA: Ally & Bacon.

Comment Icon0 Booz Allen & Hamilton. (2000, June 30). E-Commerce at the Grass Roots: Implications of a “Wired” Citizenry in Developing Nations, prepared for the National Intelligence Council.

Comment Icon0 Bougon, F. (2007, June 26). ‘Citizen journalism’ beating path through Chinese censorship. The China Post. Retrieved June 11, 2008, from

Comment Icon0 Bowman, S. & Willis, C. (2003). We Media: How Audiences are Shaping the Future of News and Information. Reston, VA: The Media Center at The American Press Institute.

Comment Icon0 Boyer, M. (2006, September 19). China’s top Internet cop. Foreign Policy. Retrieved June 17, 2009, from

Comment Icon0 Boyer, P. S. (2002). Purity in print: Book censorship in America from the Gilded Age to the Computer Age. Madison, Wis: Univ. of Wisconsin Press

Comment Icon0 Brenders, D.A. (1987). Perceived control: Foundations and directions for communication research. Communication Yearbook, 10, 86-116.

Comment Icon0 Brooker, P. (2000). Non-Democratic Regimes, Theory, Government and Policies. St. Martins Press, New York.

Comment Icon0 Bruns, A. (2008). Blogs, Wikipedia, Second life and Beyond: From production to produsage. Digital formations, v. 45. New York: Peter Lang

Comment Icon0 Burton, J. & Moldofsky, L. (2006, June 22). Single party rule ‘best for Singapore’, Financial Times. Retrieved June 5, 2009 from

Comment Icon0 Burton, P. F. (1995). Regulation and control of the Internet: Is it feasible? Is it necessary?.Journal of Information Science, 21: 413-428.

Comment Icon0 Ian, B. (2001). Bad Elements: Chinese Rebels from Los Angeles to Beijing. Random House.

Comment Icon0 Cameron, M. A., Lawson, R. J., & Tomlin, B. W. (eds.), (1999). To Walk Without Fear: The Global Movement to Ban Landmines. New York: Oxford University Press.

Comment Icon0 Canaves, S. (2008, November 28). Chinese Bloggers Win Big at Best of Blogs Awards. Retrieved March 24, 2009 from

Comment Icon0 Cao, X. (1999). Here Comes the Wolf, Raise Your Hunting Rifle- Be Alert to Computer Network Security. Jiefangjun bao, August 25, 1999, p. 5, in FBIS, August 25, 1999.

Comment Icon0 Carey, J and Quirk, J. (1989). The Mythos of the Electronic Revolution. In J. Carey (Ed.). Communication as Culture. Winchester, MA: Unwin Hyman, Inc.

Comment Icon0 Cartledge, S. & Lovelock, P. (1999). Special Subject: E-China. China Economic Quarterly 3(1). 19-35.

Comment Icon0 Castells, M. (1996). The Rise of the Network Society. Blackwell Publishers Inc. MA: Malden.

Comment Icon0 Castells, M. (1998). End of Millennium, vol. 3 of ‘The Information Age: Economy, Society and Culture’, Oxford: Blackwell.

Comment Icon0 CBC News (2008, October 2). Skype messages being monitored in China. Retrieved November 3, 2008 from

Comment Icon0 CCC (2008, August 4). Chaos Computer Club offers help to victims of censorship in China. Retrieved Oct 20, 2008 from

Comment Icon0 CECC. (2006, April). Freedom of Expression – Laws and Regulations. Retrieved on August 2, 2008 from

Comment Icon0 CERNET. (2001, January 1). Evolution of Internet in China. China Education and Research Network. Retrieved May 7, 2009, from

Comment Icon0 China to issue its first VoIP license. (2006, March 13). SinoCast China IT Watch.

Comment Icon0 Charney, E. (1998). Political Liberalism, Deliberative Democracy, and the Public Sphere. The American Political Science Review. 92 (1), 97.

Comment Icon0 Charney, T.R., & Greenberg, B.S. (2002). Uses and gratifications of the internet. In C.A.L. & D.J. Atkin (Eds.), Communication technology and society. Cresskill, NJ: Hampton Press, Inc.

Comment Icon0 Chase, M. S., & Mulvenon, J. C. (2002). You’ve got dissent!: Chinese dissident use of the Internet and Beijing’s counter-strategies. Santa Monica (CA): RAND, National Security Research Division Center for Asia Pacific Policy.

Comment Icon0 Chen, C. (1996). University Students Transmit Messages on Defending the Diaoyu Islands Through the Internet, and the Authorities Are Shocked at This and Order the Strengthening of Control. Sing Tao Jih Pao, September 17, 1996, in FBIS September 18, 1996.

Comment Icon0 Chen, Jian, (2002, March 26). Chinese Internet Industry Self-Discipline Pact Formally Signed, Renminwang.

Comment Icon0 China Hosting Blog. (2009, April 2). ICP License in China: What you need to know. Retrieved June 17, 2009 from

Comment Icon0 China Sets New Net Rules. (2002, January 21). South China Morning Post.

Comment Icon0 China: We’re Only Human. (1998, October 26). Reuters.

Comment Icon0 (2006, December 27). 2006 China in Brief: Mass Media. Retrieved June 22, 2009 from

Comment Icon0 ChinaTechNews. (2008, March 12). Real-name Registration To Be Adopted In Beijing Internet Cafes. Retrieved November 24, 2008 from

Comment Icon0 Clarke, D. (1999a). Private enforcement of intellectual property rights in China. Intellectual Property Rights in China: Evolving Business and Legal Frameworks, 10(2), Seattle: National Bureau of Research Analysis.

Comment Icon0 Clarke, R. (1999b). Information Wants to be Free. Retrieved June 10, 2009 from

Comment Icon0 (2009, June 11). Polls by four leading portals say over 80% of netizens “reject” Green Dam. Retrieved on June 18, 2009 from

Comment Icon0 CNN (1998, October 29). China cyber-cops partially block hacked website. Retrieved on November 27, 2008 from

Comment Icon0 CNN/Associated Press. (2007, October 14). China rules out copying Western democracy. Retrieved October 15, 2008 from

Comment Icon0 CNNIC. (2007, December 26). 2007 Survey Report on China Weblog Market Number of Blog Writers Reaches 47 million Equalling One Fourth of Total Netizens. Retrieved on November 28, 2008 from

Comment Icon0 CNNIC. (2009, July 16). Twenty-fourth Statistical Survey Report on the Internet Development in China. Retrieved August 20, 2009 from

Comment Icon0 Committee to Protect Journalists. (2005). China: Yahoo gave email account data used to imprison journalist. Retrieved on June 18, 2008 from

Comment Icon0 Committee to Protect Journalists. (2008). Falling short Olympic promises go unfulfilled as China falters on press freedom. New York: Committee to Protect Journalists. Retrieved on June 18, 2009 from

Comment Icon0 Committee to Protect Journalists. (2009, April 30). 10 Worst Countries to be a Blogger. New York: Committee to Protect Journalists. Retrieved June 6, 2009, from

Comment Icon0 Congressional Research Service. (2005, November 22). Internet Development and Information Control in the People’s Republic of China. Retrieved November 25, 2008 from

Comment Icon0 Court Verdict on Dissident Lin Hai. (1999, January 20). Hong Kong Information Center.

Comment Icon0 Cummings, J.N., & Kraut, R. (2002). Domesticating computers and the Internet. Information Society, 18, 221.

Comment Icon0 Davis, D.K. & Baron, S.J. (1981). A History of Our Understanding of Mass Communication. In: Davis, D.K. & Baron and S.J. (Eds.). Mass Communication and Everyday Life: A Perspective on Theory and Effects (19-52). Belmont: Wadsworth Publishing.

Comment Icon0 Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1989). User Acceptance of Computer Technology: A Comparison of Two Theoretical Models. Management Science, 35, 982-1003.

Comment Icon0 Dean, J. (2005, December 16). As Google Pushes into China, It Faces Clash With Censors. Retrieved on June 12, 2009 from

Comment Icon0 Deibert, R., et al. (2008). Access denied: The practice and policy of global Internet filtering. Cambridge, Mass: MIT Press.

Comment Icon0 DeLoach, A. (1997, February). The Intertwined Fortunes of Netizens and Online Communities. CMC Magazine. Retrieved on July 26, 2008 from

Comment Icon0 Del-Valle, A.E. (2006, November 2). Estados Unidos Bloquea Internet en Cuba (l). Juventud Rebelde. Retrieved on 10 August, 2008, from

Comment Icon0 Deuze, M. (2007). Media Work. Cambridge: Polity Press

Comment Icon0 Dickie, M. (2007, November 12). China traps online dissent. Financial Times. Retrieved September 10, 2008 from

Comment Icon0 Dietz, B. (2008, August 13). Olympics: Jing Jing, Cha Cha, and other online cops. Committee to Protect Journalists. Retrieved May 3, 2009, from

Comment Icon0 Digital Freedom Network. (2000, January 31). The new Net regulations in Burma. Retrieved on July 28, 2008 from

Comment Icon0 Ding, S. (2008, July 12). Examining the Weng’an riot: Does autocracy work?. Retrieved November 24, 2008 from

Comment Icon0 Dobson, W. (1998, June 28). Dissidence in Cyberspace Worries Beijing. San Jose Mercury News.

Comment Icon0 Donoghue, A. (2006, January 4). Microsoft censors Chinese blogger. CNET News. Retrieved November 2, 2008, from

Comment Icon0 Dorgan, M. (2000, May 25). Critics of Taiwan Policy Outwit the Censor. South China Morning Post.

Comment Icon0 Drake, W.J., Kalathil, S., & Boas, T.C. (2000, October). Dictatorships in the Digital Age”, iMP: The Magazine on Information Impacts. Retrieved June 1, 2009 from

Comment Icon0 Dreze, X., & Zufryden, F. (1997). Testing web site design and promotional content. Journal of Advertising Research, 37(2), 77-91.

Comment Icon0 Ducoffe, R. H. (1996). Advertising Value and Advertising on the Web. Journal of Advertising Research, 21-35.

Comment Icon0 Durndell, A., & Haag, Z. (2002). Computer self-efficacy, computer anxiety, attitudes towards the Internet and reported experience with the Internet, by gender, in an East European sample. Computers in Human Behavior, 18, 521–535.

Comment Icon0 EastSouthWestNorth. (2005, November 29). The Impact of the Real Name System in University. Retrieved June 3, 2009, from

Comment Icon0 EastSouthWestNorth. (2008, July 31). The Weng’an Mass Incident. Retrieved August 21, 2008 from

Comment Icon0 Eberlein, X. (2008, June 3). China: Democracy or Confucianism?. Retrieved November 21, 2008 from

Comment Icon0 Ebersole, S. (2000). Uses and Gratifications of the Web among Students. Journal of Computer Mediated Communication, September, 6(1). Retrieved on June 4, 2008 from

Comment Icon0 Eckholm, E. (1999, October 9). China Sect Members Covertly Meet Press and Ask World’s Help. New York Times. Retrieved on June 8, 2009 from

Comment Icon0 Eighmey, J. (1997). Profiling User Responses to Commercial Web Sites. Journal of Advertising Research, 37(May-June), 59-66.

Comment Icon0 Electronic Frontiers Australia. (2002). Internet Censorship: Law & Policy Around the World. Retrieved on June 20, 2009 from

Comment Icon0 Endeshaw, A. (2004). Internet regulation in China: The never-ending cat and mouse game. Information & Communications Technology Law, 13(1), 41-57. doi:10.1080/1360083042000190634

Comment Icon0 Epoch Times. (2003, October 22). 金盾工程前期耗8亿美元 建全国性监视. Retrieved July 27, 2008 from

Comment Icon0 Epoch Times. (2009, May 11). Words Censored by China’s Largest Search Engine. Retrieved June 15, 2009 from

Comment Icon0 Eckholm, E. (1999, October 29). China Sect Members Covertly Meet Press and Ask World’s Help. New York Times.

Comment Icon0 FBIS. (1999, January 8). PRC Said Interfering in Information Center’s Work. Hong Kong Information Center of Human Rights and Democratic Movement in China.

Comment Icon0 Faiola, A. (2004, November 22). South Korea weighs allowing once-taboo support for the North. Washington Post. Retrieved on June 22, 2009 from

Comment Icon0 Fallows, D. (2007). China’s online population explosion What it may mean for the internet globally… and for U.S. users. Washington, D.C.: Pew Internet & American Life Project. Retrieved on June 12, 2008 from

Comment Icon0 Fallows, D. (2008a). Most Chinese Say They Approve of Government Internet Control. Pew Internet & American Life Project. Retrieved on June 27, 2008 from

Comment Icon0 Fallows, D. (2008b). Search Soars, Challenging Email as a Favorite Internet Activity. Pew Research Center. Retrieved November 21, 2008 from

Comment Icon0 Falungong followers silently protesting outside Zhongnanhai in April 1999 [Online Image]. (2008, August 2). Retrieved June 16, 2009 from

Comment Icon0 Farley, M. (1999, January 4). Hactivists Besiege China. Los Angeles Times.

Comment Icon0 FCC. (2008). FCC Consumer Facts: Children’s Internet Protection Act. Retrieved on March 2, 2009 from

Comment Icon0 Feng, D. (2007, November 4). Chinese Blogger Conference 2007: Day Two. Blognation China. Retrieved on 7th November, 2007 from

Comment Icon0 Ferguson, D.A., & Perse, E.M. (2000). The World Wide Web as a functional alternative to television. Journal of Broadcasting & Electronic Media, 44, 155–174.

Comment Icon0 Fildes, J. (2009, June 11). China’s computers at hacking risk. BBC News. Retrieved 13 June 2009 from

Comment Icon0 Fitzpatrick, M. (2008, January 3). While Japanese face web censorship. The Guardian. Retrieved June 2, 2009, from

Comment Icon0 Flaherty, L.M., Pearce, K.J., & Rubin, R.B. (1998). Internet and face-to-face communication: Not func- tional alternatives. Communication Quarterly, 46, 250–268.

Comment Icon0 Flanagin, A., & Metzger, M. (2000). Perception of Internet information credibility. Journalism and Mass Communication Quarterly, 77(3). 515-540.

Comment Icon0 Foster, W. & Goodman, S.E. (2000). The Diffusion of the Internet in China. A Report of the CISAC, Standford University.

Comment Icon0 Fouché, G. (2008, September 24). Chinese dissident tipped to win Nobel peace prize. The Guardian. Retrieved June 16, 2009, from

Comment Icon0 Fraleigh, Douglas (2003). “Reno v. ACLU”. in Parker, Richard A. (ed.). Free Speech on Trial: Communication Perspectives on Landmark Supreme Court Decisions. Tuscaloosa, AL: University of Alabama Press. pp. 298–312.

Comment Icon0 Fukuyama, F. (1992). The End of History and the Last Man. New York: Free Press.

Comment Icon0 Freedom House. (2006, February). Speak No Evil – Mass Media Control in Contemporary China. Retrieved June 6, 2009 from

Comment Icon0 Freedom House. (2009a). Freedom Of The Press 2009: Table of Global Press Freedom Rankings. Retrieved June 10, 2009 from

Comment Icon0 Freedom House. (2009b). Press Freedom In The World 2009: Charts. Retrieved June 12, 2009 from

Comment Icon0 French, H. (2006, July 4). Chinese discuss plan to tighten restrictions on cyberspace. The New York Times.

Comment Icon0 Friedman, T. L. (1999). The Lexus and the olive tree. New York: Farrar, Straus, Giroux.

Comment Icon0 Friedman, T. L. (2005). The World is Flat: A brief history of the twenty-first century. New York: Farrar, Straus and Giroux.

Comment Icon0 Fuller, B. (1991). Growing up Modern: The Western State Builds Third-World Schools. Routledge, New York.

Comment Icon0 Gastil, J. & Black, L. (2008). Public Deliberation as the Organizing Principle of Political Communication Research. Journal of Public Deliberation, 4(1). Retrieved on July 15, 2008 from

Comment Icon0 Gao, Y. (2006, October 7). Mainlanders send 2 bln text messages at Mid-Autumn Festival. Xinhua. Retrieved December 3, 2008, from

Comment Icon0 Gaziano, C., & McGrath, K. (1986). Measuring the concept of credibility. Journalism Quarterly, 63, 451-462.

Comment Icon0 Gharbia, S. B. (2007, August 30). Chinese cartoon cops patrolling websites. Global Voices Advocacy. Retrieved December 3, 2009, from

Comment Icon0 George, C. (2000). Singapore: The air-conditioned nation : essays on the politics of comfort and control, 1990-2000. Singapore: Landmark Books.

Comment Icon0 Gillmor, D. (2004). We the media: Grassroots journalism by the people, for the people. Sebastopol, CA: O’Reilly.

Comment Icon0 Gimmler, A. (2001). Deliberative Democracy, the Public Sphere and the Internet. Philosophy, & Social Criticism. 27(4), 21-39.

Comment Icon0 Global Internet Freedom Consortium (n.d.). Our Mission. Retrieved December 15, 2008 from

Comment Icon0 Global Petition Campaign. (1999, 29 September). Wang Dan Demands Change in China. Retrieved September 15, 2008 from ASA170521999en.pdf

Comment Icon0 Global Voices. (2005, June 16). Screenshots of Censorship. Retrieved on June 10, 2009 from

Comment Icon0 Goldkorn, J. (2007, September 5). Chinese bloggers endure harmony overload. Danwei. Retrieved May 4, 2009, from

Comment Icon0 Goldkorn, J. (2008, June). China Media Timeline. Danwei. Retrieved June 7, 2009 from

Comment Icon0 Goldsmith, J. (1999, August 13). Against Cyberanarchy. Occasional Papers from The Law School The University of Chicago, Number 40. Retrieved November 21, 2008 from

Comment Icon0 Goldsmith, J. & Wu, T. (2006). Who Controls the Internet?: Illusions of a Borderless World. New York: Oxford University Press.

Comment Icon0 Gomez, J. (2004, Sept). Dumbing Down Democracy: Trends in Internet Regulation, Surveillance and Control in Asia. Pacific Journalism Review, 10 (2), 130-150.

Comment Icon0 Google Corporate Information. (n.d.). Our Philosophy, No. 6: You can make money without doing evil. Retrieved on June 11, 2009 from

Comment Icon0 Grace-Farfaglia, P., Dekkers, A., Sundararajan, B., Peters, L., and Park, S. (2006, January). Multinational web uses and gratifications: Measuring the social impact of online community participation across national boundaries. Electronic Commerce Research 6(1), 75-101. DOI=

Comment Icon0 Green, S. (2000, March). The pen, the sword and the networked computer. The World Today, 13-15.

Comment Icon0 Griffin, E. (1997). A First Look at Communication Theory. New York: McGraw-Hill Company.

Comment Icon0 Grubisich, T. (2005, October 6). “Grassroots Journalism: Actual Content vs Shining Ideal”. Retrieved June 22, 2008, from

Comment Icon0 Guardian News. (2008, February 1). Living under house arrest in Beijing: A Video Diary by Hu Jia & Zeng Jinyan. Retrieved October 25, 2008 from

Comment Icon0 Gunderson, S.H. (2008, Oct). Global IPv6 Statistics – Measuring the current state of IPv6 for ordinary users. Symposium conducted at RIPE 57 Conference, Dubai. Retrieved on May 8, 2009 from

Comment Icon0 Guosheng, D. (2000). New Environment for Development of NGOs in China. Global Economic Review. 29, 43-61.

Comment Icon0 Habermas, J. (1987). The theory of communicative action. Cambridge: Polity Press.

Comment Icon0 Habermas, J. (1989). The structural transformation of the public sphere. Cambridge, MA: MIT Press.

Comment Icon0 Han, W.P., Thelwall, M., & Kluver, R. (2005). Political Hyperlinking in South Korea: Technical Indicators of Ideology and Content. Sociological Research Online, 10 (3)

Comment Icon0 Harris, M., Van Hoye, G. & Filip, L. (2003, June). Privacy and Attitudes towards Internet-Based Selection Systems: A Cross-Cultural Comparison. International Journal of Selection and Assessment, 11, pp. 230-236

Comment Icon0 Haselton, B. (2002, November). List of possible weaknesses in systems to circumvent Internet censorship. Retrieved on October 20, 2008 from

Comment Icon0 He, B. (2006). Western theories of deliberative democracy and the Chinese practice of complex deliberative governance. In E. Leib & B. He (Eds.), The search for deliberation democracy in China (pp.133-148). New York: Palgrave MacMillan.

Comment Icon0 Head, J. (2007, October 2). The hardship that sparked Burma’s unrest. BBC News. Retrieved July 3, 2008, from

Comment Icon0 (2009, June 14). Green Dam Girl. Retrieved 20 June 2009 from

Comment Icon0 Herzog, H. (1944). What do we really know about day-time serial listeners? In P. Lazarsfeld & F. Stanton (Eds.), Radio research 1942-1943. New York: Duel, Sloan and Pearce, 3-33.

Comment Icon0 Hoffman, D. L., Novak, T. P., & Schlosser, A. E. (2003). Locus of Control, Web Use, and Consumer Attitudes Towards Internet Regulation. Journal of Public Policy and Marketing. 22, 41-57

Comment Icon0 Hofstede, G. (2001), Culture’s Consequences: International Differences in Work Related Values, Thousand Oaks, CA: Sage Publications, Inc.

Comment Icon0 Hollenbeck, J.R., Williams, C.R., & Klein, H.J., (1989). An empirical examination of the antecedents of commitment to difficult goals. Journal of Applied Psychology, 74(February), 18-23.

Comment Icon0 Hong, J. (1998). The Internationalization of Television in China : The Evolution of Ideology, Society and Media since the Reform. Praeger, Westport, Connecticut.

Comment Icon0 Horrigan, J.B., & Rainie, L. (2002, March 3). Getting Serious Online: As Americans Gain Experience, They Pursue More Serious Activities. Pew Internet & American

Comment Icon0 Life. Retrieved on June 27, 2008 from

Comment Icon0 HRIC. (2000, June 2). Tiananmen mothers seek global support for campaign to end impunity. Retrieved on June 9, 2009 from

Comment Icon0 Hu, W. (2009, March 19). The Internet Timeline of China 1987-1996. Retrieved June 4, 2009, from

Comment Icon0 Howell, J M. & Avolio, B.J. (1993). Transformational leadership, transactional leadership, locus of control, and support for innovation: Key predictors of consolidated-business-unit performance. Journal of Applied Psychology, 78 (December), 891-902.

Comment Icon0 Huang, P. (1993). Public Sphere/Civil Society in China?. Modern China, 19(2). 216-240.

Comment Icon0 Huang, E. (1999). Flying freely but in the cage – an empirical study using Internet for the democratic development in China. Information Technology for Development, 9(3), 145-162.

Comment Icon0 Hudson, H. E. (1997). The paradox of ubiquity: communication satellite policies in Asia. Paper from the 1997 telecommunications policy research conference. J. K. MacKie- Mason, & D. Waterman (Eds.). p. 235-249.

Comment Icon0 Human Rights Watch. (2002, January). China’s Campaign Against Falungong. Retrieved October 16, 2008 from

Comment Icon0 Human Rights Watch. (2006, August 9). Race to the Bottom: Corporate Complicity in Chinese Internet Censorship. Retrieved October 16, 2008 from

Comment Icon0 Human Rights Watch. (2008, June 4). Chinese censors and cybercops. Retrieved June 3, 2009, from

Comment Icon0 India Daily. (2006, November 24). Orkut blocked in Pune, PIL filed against it for running anti-Shivaji community. Retrieved on June 23, 2008 from

Comment Icon0 India Times. (2007, May 14). Meet China’s Google trouncer. Retrieved November 18, 2008 from

Comment Icon0 Ingledew, D.K., Hardy, L. & Cooper, C.L. (1997). Do resources bolster coping and does coping buffer stress? An organizational study with longitudinal aspect and control for negative affectivity. Journal of Occupational Health Psychology, 2(April) 118-133.

Comment Icon0 Innis, H. A. (1951). The bias of communication. Toronto: University of Toronto Press.

Comment Icon0 International Telecommunications Union. (2008). ITU Internet Indicators 2008. Retrieved May 28, 2009, from

Comment Icon0 Internet sapping broadcast news audience. (2000, June 11). The Pew Research Center for the People & the Press. Retrieved June 12, 2008, from

Comment Icon0 Internet Society of China (2002, July 19). Public Pledge of Self-Regulation and Professional Ethics for China Internet Industry. Retrieved on June 11, 2009 from

Comment Icon0 Internet World Stats. (2009). Internet Usage Statistics for the Americas. Retrieved on March 3, 2009 from

Comment Icon0 Iran – Constitution. (1992). International Constitutional Law Project, University of Bern. Retrieved on August 5, 2008 from

Comment Icon0 Ito, M., Okabe, D., & Anderson, K. (2007, June 28). Portable Objects in Three Global Cities: The Personalization of Urban Places. Retrieved June 27, 2008 from

Comment Icon0 Jarvenpaa, S.L., Tractinsky, N. (1999). Consumer trust in an internet store: a cross-cultural validation. Journal of Computer Mediated Communication, 5 (2).

Comment Icon0 Becker, J. (1999, January 12). Review of Dissidents, Human Rights Issues. South China Morning Post.

Comment Icon0 Janssen, T. & Carton, J.S. (1999). The effects of locus of control and task difficulty on procrastination. Journal of Genetic Psychology, 160, 436-442.

Comment Icon0 Jiang, M. (2008, June 14). Authoritarian Deliberation: Public Deliberation in China [Powerpoint slides]. Retrieved on July 15, 2008 from

Comment Icon0 Jiang, Q. (2003). Political Confucianism: The Transformation, Special Characteristics, and Development of Contemporary Confucianism. Beijing, Sanlian shudian.

Comment Icon0 Johnson, I. (1999, June 8). Unfamiliar ring. Wall Street Journal, A1.

Comment Icon0 Johnson, S. (2002). Emergence: the connected lives of ants, brains, cities and software. Scribner

Comment Icon0 Johnson, T., & Kaye, B. (1998). Cruising Is Believing? Comparing Internet and Traditional Sources on Media Credibility Measures.  Journalism and Mass Communication Quarterly, 75(3), 325-340.

Comment Icon0 Schmit, J. & Wiseman, P. (2000, March 15). Surfing the Dragon: Web Surfers Find Cracks in Wall of Official China. USA Today, p. 01B

Comment Icon0 Kalathil, S., & Boas, T. C. (2001). The Internet and state control in authoritarian regimes: China, Cuba, and the counterrevolution. Washington, D.C.: Carnegie Endowment for International Peace.

Comment Icon0 Kalathil, S. & Boas, T. C. (2003). Open Networks, Closed Regimes. Carnegie Endowment for International Peace, Washington, D. C.

Comment Icon0 Kalning, K. (2007, February 21). Forget reality TV. In Korea, online gaming is it. Retrieved June 20, 2008 from

Comment Icon0 Kanate, G. (2006, December 9). Patil wants bar on Orkut. DNA. Retrieved on June 23, 2008 from

Comment Icon0 Katz, E., and Foulkes, D. (1962). On the Use of the Mass Media as “escape”: clarification of a concept. Public Opinion Quarterly, 26, 377-388.

Comment Icon0 Keidel, A. (2007, July). Assessing China’s Economic Rise: Strengths, Weaknesses and Implications. Retrieved November 28, 2008 from

Comment Icon0 Kelly, J. & Etling, B. (2008, April 5). Mapping Iran’s Online Public: Politics and Culture in the Persian Blogosphere. Berkman Center for Internet and Society. Retrieved June 1, 2009 from

Comment Icon0 Kennedy, J. (2007, June 1). China: Liveblogging from ground zero. Global Voices Online. Retrieved March 15, 2009, from

Comment Icon0 Kerstetter, J. (2005, September 7). Group says Yahoo helped jail Chinese journalist. CNET News. Retrieved November 2, 2008, from

Comment Icon0 Khan, S.A. & Janjua, K.A. (2007, September). Telecommunication Development and Regulatory Reforms in China. Symposium conducted at Wireless Communications, Networking and Mobile Computing 2007 Conference, Shanghai, China.

Comment Icon0 Kim, A. J. (2000). Community building on the Web. The Peachpit guide to webtop publishing. Berkeley, Calif: Peachpit Press.

Comment Icon0 Kim, S. T., Weaver, D., & Willnat, L. (2000). Media reporting and perceived credibility of online polls. Journalism and Mass Communication Quarterly, 77, 846-864.

Comment Icon0 Klapper, J. T. (1963). Mass communication research: An old road resurveyed. Public Opinion Quarterly, 27, 515-527.

Comment Icon0 Korea Internet & Security Agency. (2009). Korean Internet White Paper: 2009. Retrieved on August 25, 2009 from

Comment Icon0 Korgaonkar, P. K. & Wolin, L.D. (1999). A multivariate analysis of Web usage. Journal of Advertising Research; 39(March/April), 53-68

Comment Icon0 Krumholtz, J. (2006, February 15). The Internet in China: A Tool for Freedom or Suppression?. Retrieved on June 8, 2009 from

Comment Icon0 Kurtenbach, E. (2004, July 2). China steps up surveillance, targeting mobile phone messaging. Associated Press. Retrieved on June 8, 2009 from

Comment Icon0 Kwei, C.-H. (1999). Political participation on the Internet: NGOS ̓presence in cyberspace. Thesis (M.A.)–State University of New York at Buffalo, 1999.

Comment Icon0 Lacharite, J. (2002). Electronic Decentralisation in China: A Critical Analysis of Internet Filtering Policies in the People’s Republic of China. Australian Journal of Political Science, 37 (2), 1036-1146.

Comment Icon0 Lagerkvist, J. (2005). The Rise of Online Public Opinion in the People’s Republic of China. China: An International Journal, 3 (1), 119-130

Comment Icon0 Lam, W. (1998, December 24). Beijing Orders Close Watch on 150 Dissidents. South China Morning Post.

Comment Icon0 Langfitt, F. (1999, May 11). Taking Dissent Online in China; E-mail: In the Age of the Internet, Chinese Leaders Are Finding It Harder to Contain Free Speech. The Baltimore Sun, p. 2A.

Comment Icon0 Lanier, J. (2006, May 30). Digital Maoism: The Hazards of the New Online Collectivism. Retrieved November 5, 2008 from

Comment Icon0 LaRose, R., Mastro, D., & Eastin, M.S. (2001). Understanding Internet usage—A social-cognitive approach to uses and gratifications. Social Science Computer Review, 19, 395–413.

Comment Icon0 Larson, L. M., Piersel, W.C., Imao, R.A., & Allen, S.J. (1990). Significant predictors of problem-solving appraisal. Journal of Counseling Psychology, 37(October) 482-490.

Comment Icon0 Lasswell, H. D. (1927). Propaganda technique in the world war. London: K. Paul, Trench, Trubner & co., ltd.

Comment Icon0 Lazarfeld, P. F., Berelson, B., and Gaudet, H. (1944). The People’s Choice: How the Voter Makes up His Mind in a Presidential Campaign. New York: Duell, Sloan & Pearce.

Comment Icon0 Le Bon, G. (1910). The Crowd: A Study of the Popular Mind. London: T.F. Unwin

Comment Icon0 Lee, C.-C. (1990). Voices of China: The interplay of politics and journalism. New York u.a: Guilford Press.

Comment Icon0 Lee, G. S. (1913). Crowds: a moving-picture of democracy. Garden City, N.Y.: Doubleday, Page

Comment Icon0 Lee, Y., Kim, J., Lee, I. and Kim, H. (2002). A Cross-cultural Study on the Value Structure of Mobile Internet Usage: Comparison between Korea and Japan. Journal of Electronic Commerce Research, 3(4), 227-239

Comment Icon0 Lefcourt, H. M. (1966). Internal versus external control of reinforcement: A review. Psychological Bulletin, 65, 206-220.

Comment Icon0 Lefcourt, H. M. (1992). Durability and Impact of the Locus of Control Construct. Psychological Bulletin, 112(3), 411.

Comment Icon0 Lemon, S., & Lawson, S. (2004, May 17). China celebrates 10 years of being connected to the Internet. Retrieved June 3, 2009, from

Comment Icon0 Lessig, L. (1999). Code and other Laws of Cyberspace. Basic Books, New York, NY

Comment Icon0 Leung, L. (2003). Impacts of net-generation attributes, seductive properties of the internet, and gratifications-obtained on internet use. Telematics and Informatics, 20, 107–129.

Comment Icon0 Leung, L., & Wei, R. (2000). More than just talk on the move: Uses and gratifications of the cellular phone. Journalism and Mass Communication Quarterly, 77, 308-320.

Comment Icon0 Levenson, H. (1974). Activism and powerful others: Distinctions within the concept of internal—external control. Journal of Personality Assessment, 38, 377-383.

Comment Icon0 Li, X. (2002, January 15). The Internet’s Impact on China’s Press. Media Digest. Retrieved June 2, 2008, from

Comment Icon0 Liang, G. (2003). Surveying Internet usage and impact in twelve Chinese cities. The CASS Internet report, 2003. Beijing: Research Centre for Social Development, Chinese Academy of Social Sciences.

Comment Icon0 Liang, G. (2007). Surveying Internet usage and its impact in seven Chinese cities. Beijing: Center for Social Development, Chinese Academy of Social Sciences.

Comment Icon0 Libby, D. (1999, July 10). RSS 0.91 Spec, revision 3. Netscape Communications. Retrieved on Feb 14, 2008 from

Comment Icon0 Lichtenberg, J. (1990). Democracy and the Mass Media: A Collection of Essays. Cambridge Studies in Philosophy and Public Policy. New York: Cambridge UP

Comment Icon0 Lieberthal, K., 1992. Introduction: The Fragmented Authoritarianism model and its limitation. In: Lieberthal, K., Lampton, D. (Eds.), Bureaucracy, Politics, and Decision Making in Post-Mao China. University of California Press, Berkeley, CA.

Comment Icon0 Lim, K. (2009, June 2). Twitter interview with Yu, F.

Comment Icon0 Lin, C.A. (1999). Predicting online service adoption likelihood among potential subscribers: A modifications approach. Journal of Advertising Research, 39, 79–89.

Comment Icon0 Lin, C.A. (2001). Audience attributes, media supplementation, and likely online service adoption. Mass Communication & Society, 4, 19–38.

Comment Icon0 Lin, C.A. (2002). Perceived gratifications of online media service use among potential users. Telematics and Informatics, 19, 3–19.

Comment Icon0 Lin, C.A., & Atkin, D.J. (2002). Communication technology and society: Audience adoption and uses. Cresskill, NJ: Hampton Press.

Comment Icon0 Lin, J.C.-C., & Lu, H. (2000). Towards an understanding of the behavioural intention to use a website. International Journal of Information Management, 20, 197–208.

Comment Icon0 Liu, M. (1999, October 11). The Great Firewall of China. Newsweek International.

Comment Icon0 Liu, J. (2004, March 18). China Shuts Down Two Internet ‘Blog’ Sites. Reuters. Retrieved on November 21, 2008 from

Comment Icon0 Lovelock, P., 1996. China’s telecommunications policy and Hong Kong, 1997: bargaining positions. Telecommunications Policy, 20 (9), 685–698.

Comment Icon0 Lynch, D. (1999). After the Propaganda State: Media, Politics, and “Thought Work” in Reformed China. Stanford, CA: Stanford University Press.

Comment Icon0 Lyon, D. (1998). The world wide web of surveillance: The Internet and off-world power-flows. Information, Communication & Society, 1(1), 91-105. doi:10.1080/13691189809358955

Comment Icon0 Ma, Q. (2002). Defining Chinese Nongovernmental Organizations, Voluntas 13(2), pp. 113–30.

Comment Icon0 Macartney, J. (2008, October 17). China watches over Internet café customers in web crackdown. Times Online. Retrieved December 3, 2008, from

Comment Icon0 MacKinnon, R. (2005a, January 17). Chinese cell phone breaches North Korean hermit kingdom. YaleGlobal Online. Retrieved June 12, 2008 from

Comment Icon0 MacKinnon, R. (2005b, June 28). China’s Internet: Let a Thousand Filters Bloom. YaleGlobal Online. Retrieved June 22, 2008 from

Comment Icon0 MacKinnon, R. (2005c, March 20). Chinese protest BBS crackdown. Global Voices Online. Retrieved June 6, 2009, from

Comment Icon0 MacKinnon, R. (2006). Chinese Blogs: Censorship and Civic Discourse. Retrieved on June 10, 2009 from

Comment Icon0 MacKinnon, R. (2008a, August 14). The Chinese Censorship Foreigners Don’t See. Wall Street Journal. Retrieved May 5, 2009, from

Comment Icon0 MacKinnon, R. (2008b, November 29). Studying Chinese blog censorship. Retrieved March 24, 2009 from

Comment Icon0 MacKinnon, R. (2009a, January 15). Circumventing censorship: issues of trust. Retrieved January 18, 2009 from

Comment Icon0 MacKinnon, R. (2009b, June 8). China’s “Green Dam Youth Escort” software. Retrieved December 4, 2009, from

Comment Icon0 Madden, M. (2003). America’s online pursuits: The changing picture of who’s online and what they do. Washington, D.C: Pew Research Center.

Comment Icon0 Magnier, M. (2008, June 5). China tightens media limits loosened in quake. Los Angeles Times. Retrieved on November 15, 2008 from

Comment Icon0 maomy@smth [Online Image]. (2005, March 17). Retrieved June 15, 2009, from

Comment Icon0 Markham, D. (1968). The dimensions of source credibility of television newscasters. Journal of Communication, 18, 57–64

Comment Icon0 Marquand, R. (2005, April 6). Beijing Enforces the Party Line. Christian Science Monitor. Retrieved on November 21, 2008 from

Comment Icon0 McChesney, R. W. (1996) The Internet and U. S. Communication Policy-making in Historical and critical perspective. Journal of Communication. Winter, 98-124.

Comment Icon0 McCombs, Maxwell E. & Shaw, D. L. (1972). The agenda-setting function of mass media. Public Opinion Quarterly, 36(2), 176-187.

Comment Icon0 McCrosky, J. C. & Jenson, T.A. (1975). Image of Mass Media News Source. Journal of Broadcasting, Winter, 21:1.

Comment Icon0 McCullagh, D. (2006, May). Gonzales pressures ISPs on data retention. Retrieved on May 20, 2008 from

Comment Icon0 McDermott, S. (May 2007). The Singapore blogosphere and political participation: an ethnographic approach. Leeds, Proceedings of the Communication Technologies of Empowerment Conference

Comment Icon0 McKinsey Quarterly (2007, June). The Middle Kingdom’s middle class. Retrieved June 10, 2009 from

Comment Icon0 McLuhan, M. (1964). Understanding Media: the extensions of man. A Mentor Book, NY: New York.

Comment Icon0 McLuhan, M. (1967). Medium is the Massage. Random House, NY: New York.

Comment Icon0 Mead, G. H. (1962). Mind, self and society from the standpoint of a social behaviorist. Chicago: University of Chicago Press

Comment Icon0 Media Development Authority. (2009). Policies & Guidelines: Internet. Retrieved on June 21, 2009 from

Comment Icon0 Melody, W. (1997). Policy objectives and models of regulation. In: Melody, W. (Ed.), Telecom Reform: Principles, Policies and Regulatory Practices. Technical University of Denmark, Lyngby.

Comment Icon0 Merrill Lynch & Capgemini. (2008). The World Wealth Report, 12th Annual Report. Merrill Lynch & Co, Inc. and Capgemini Global Financial Services.

Comment Icon0 Meyer, J. W. & Scott W. R. (1992). Organizational Environments – Ritual and Rationality. Sage Publications, Inc.

Comment Icon0 Microsoft News Release (2005, May 11). Microsoft Prepares to Launch MSN China. Retrieved on June 11, 2009 from

Comment Icon0 MIIT. (2008, December 18). ‘Green surfing’ filtering software project progressing smoothly (in Chinese). Retrieved on June 12, 2009 from

Comment Icon0 MIIT (2009, May 19). Notification regarding requirements for pre-installing green filtering software on computers (in Chinese). Retrieved June 15, 2009 from

Comment Icon0 Ministry of Information Industry. (2002, October 17). The Regulatory Reform in Telecom Sector from China. Retrieved on June 23, 2009 from

Comment Icon0 Pei, M. (2009, June 2). How Beijing Kept Its Grip on Power. Carnegie Endowment for International Peace. Retrieved July 3, 2009, from

Comment Icon0 Mizzima News. (2006, June 21). Four dissidents sentenced up to 19 years in prison for anti-government poems. Retrieved on March 23, 2008 from

Comment Icon0 Mody, B., Bauer, J., & Straubhaar, J. (Eds.). (1995). Telecommunications politics: ownership and control of the information highway in developing countries. Lawrence Erlbaum Associates, Inc. NJ: Mahwah.

Comment Icon0 Morillon, L. (2008, October 22). China Blocks Blogs, Search Results on Tainted Milk Scandal. Retrieved November 24, 2008 from

Comment Icon0 Moses, A. (2009, June 9). China’s Green Dam-Youth Escort net filter draws fire. The Age.

Comment Icon0 Mufson, S. (1996, September 17). Chinese Protest Finds a Path on the Internet. Washington Post, p. A9

Comment Icon0 Mulvenon, James (2002, April 15). RAND Center for Asia-Pacific Policy. Retrieved on July 21, 2008 from

Comment Icon0 Nass, G. (1961). Literature on measurement of the self-concept. Journal of Counseling Psychology, 8, 368

Comment Icon0 Natsui, T. (2003, July). Cybercrime in Japan: Recent Cases, Legislations, Problems and Perspectives. Symposium conducted at the NetSafe II Conference, Auckland, New Zealand. Retrieved on June 3, 2008 from

Comment Icon0 Neuman, W. (2000). Social Research Methods: Qualitative and quantitative approaches. Needham Heights: Allyn & Bacon.

Comment Icon0 New York Times. (2005, September 29). Q&A: China’s New Internet Restrictions. Retrieved June 29, 2009 from

Comment Icon0 Nie, P. (2007, August 29). Virtual cops to patrol cyberspace. China Daily. Retrieved June 5, 2009, from

Comment Icon0 Nilekani, N. (2009). Imagining India: The Idea of a Renewed Nation, 1st American ed. New York: Penguin Press

Comment Icon0 Niles, R. (2007, July 31). A Journalist’s Guide to Crowdsourcing. Retrieved June 26, 2008 from

Comment Icon0 Norris, P. (2001). Digital Divide?: Civic Engagement, Information Poverty, and the Internet Worldwide. New York: Cambridge University Press.

Comment Icon0 Novak, T. P., Hoffman, D. L., & Duhachek, A. (2003). The Influence of Goal-Directed and Experiential Activities on Online Flow Experiences. Journal of Consumer Psychology. 13 (1), 3-16.

Comment Icon0 Nystedt, D. (2008, July 23). China Mobile Phone Subscribers Pass 600 Million Mark. PC World. Retrieved June 4, 2009, from

Comment Icon0 O’Brien, D. (2008, October 2). Chinese Skype Client Hands Confidential Communications to Eavesdroppers. Retrieved December 21, 2008 from

Comment Icon0 O’Keefe, G. J., & Sulanowski, B. K. (1995). More than just talk: Uses and gratifications, and the telephone. Journalism and Mass Communications Quarterly, 72, 922-933.

Comment Icon0 O’Leary, S. (2000, June 15). Falun Gong and the Internet. Online Journalism Review. Retrieved on June 8, 2009 from

Comment Icon0 O’Reilly, T. (2005, September). What Is Web 2.0?. O’Reilly Network. Retrieved on June 5, 2009 from

Comment Icon0 Oh, & Kim, I. J. (2001). Korea – Korean Politics: The Quest for Democratization and Economic Development. The Journal of Asian Studies. 60(2), 570.

Comment Icon0 Office of the National Counterintelligence Executive. (2003, December). North Korea: Channeling foreign information technology to leverage IT development. Retrieved on July 3, 2008 from

Comment Icon0 Omantel. (2008). Terms & Conditions. Retrieved November 18, 2008, from

Comment Icon0 Omantel News Room (2006, December 11). Net subscribers cross 92,000-mark. Retrieved on Nov 18, 2008 from

Comment Icon0 OpenNet Initiative (2004, August 30). Google Search and Cache Filtering behind China’s Great Firewall. Retrieved on June 11, 2009 from

Comment Icon0 OpenNet Initiative (2006a, January 25). Filtering: How It Works. Retrieved on June 13, 2009 from

Comment Icon0 OpenNet Initiative. (2006b, February 22). Analysis of China’s Non-Commercial Website Registration Regulation. Retrieved June, 20, 2009 from

Comment Icon0 OpenNet Initiative. (2007, May). Country Profiles. Retrieved on May 15, 2008 from

Comment Icon0 OpenNet Initiative. (2009, June 15). Internet Filtering in China. Retrieved on June 28, 2009 from

Comment Icon0 Palfrey, J. & Rogoyski, R. (2006). The Move to the Middle: The Enduring Threat of Harmful Speech to the End-to-End Principle. Washington University Journal of Law and Policy, 21, 31–65.

Comment Icon0 Palmgreen, P. (1984). Uses and gratifications: A theoretical perspective. Communication Yearbook, 8, 20–55.

Comment Icon0 Papacharissi, Z., & Rubin, A.M. (2000). Predictors of Internet use. Journal of Broadcasting & Electronic Media, 44, 175–196.

Comment Icon0 Pao, M. (1999, February 4). Information Warrior. Far Eastern Economic Review.

Comment Icon0 Park, C. & Jun, J.-K. (2003). A cross-cultural comparison of Internet buying behavior: Effects of Internet usage, perceived risks, and innovativeness. International Marketing Review 20(5), 534-553.

Comment Icon0 Park, H.W. (2002). The digital divide in South Korea: Closing and widening divides in the 1990s. Electronic Journal of Communication, 12, [np].

Comment Icon0 Parker, C. (2006, October). A hole in the Net. The Irawaddy, 14(10). Retrieved June 3, 2008 from

Comment Icon0 PBS: Frontline. (2006, April). Transcript of Frontline: The Tank Man. Retrieved June 4, 2009 from

Comment Icon0 People’s Daily. (2000, May 10). CASS Opened “Unmask Cults” Website. Retrieved November 24, 2008 from

Comment Icon0 People’s Daily. (2001, July 12). Using Legal Means to Guarantee and Promote Sound Development of Information Network. Retrieved on June 20, 2008 from

Comment Icon0 Perrit, D. H. (1998). The Internet as a Threat to Sovereignty? Thoughts on the Internet’s Role in Strengthening National and Global Governance, Indiana Journal of Global Legal Studies, 5(2), p 431.

Comment Icon0 Pew Daily Internet Activities. (2008, May). Pew Internet and American Life Project. Retrieved October 10, 2008 from

Comment Icon0 Pan, P. (2005, March 23). Chinese Crack Down on Student Websites, Washington Post, A13. Retrieved June 4, 2008 from

Comment Icon0 Pan, P. (2006, February 19). What do cat abuse, mascot and cash fiesta have in common? Washington Post. Retrieved June 11, 2009 from

Comment Icon0 Platt, K. (1999, November 17). China’s ‘cybercops’ clamp down. Christian Science Monitor.

Comment Icon0 Potter, W. J. (1996). An Analysis of Thinking and Research About Qualitative Methods. Mahwah, New Jersey: Lawrence Erlbaum Associates.

Comment Icon0 Press, L., Foster, W., Wolcott, P., and McHenry, W. (2003). The Internet in India and China. Information Technologies and International Development, 1(1), 41-60. DOI=

Comment Icon0 Qian, S. & trans. Watson, B. (1993), Records of the Grand Historian: Han Dynasty. Research Center for Translation, The Chinese University of Hong Kong and Columbia University Press.

Comment Icon0 Qiang, C. Z.-W. (2007). China’s information revolution: Managing the economic and social transformation. Washington, D.C.: World Bank.

Comment Icon0 (2006, October 9). China Cracks Down on SMS Spam. Retrieved July 5, 2008 from

Comment Icon0 Remarks by then President Bill Clinton on China, Paul H. Nitze School of Advanced International Studies, Washington, DC. (2000, March 8). Essential Speeches. Retrieved November 24, 2008 from Academic Search Premier database

Comment Icon0 Renmin Ribao. (2001, October 8). Chinese NGOs to Work with Government for Poverty Reduction. Retrieved June 8, 2009 from

Comment Icon0 Reporters Without Borders. (2003a, May 12). Living dangerously on the Net: Censorship and surveillance of Internet forums. Retrieved on July 30, 2008 from

Comment Icon0 Reporters Without Borders. (2003b, June 20). The Internet under surveillance. Retrieved on July 30, 2008 from

Comment Icon0 Reporters Without Borders. (2004a). A Black Year. Retrieved on July 30, 2008 from

Comment Icon0 Reporters Without Borders. (2004b, July 1). Chinese government gets a new SMS messaging surveillance system. Retrieved June 4, 2009, from

Comment Icon0 Reporters Without Borders. (2004c, July 26). Google-Yahoo Market Battle Threatens Freedom of Expression. Retrieved on November 15, 2008 from

Comment Icon0 Reporters Without Borders. (2005, December 13). News blackout after police brutally put down demonstrations in Dongzhou. Retrieved on June 20, 2009, from

Comment Icon0 Reporters Without Borders. (2006a, February 27). Verdict in cyberdissident Li Zhi case confirms implication of Yahoo!. Retrieved on July 21, 2008 from

Comment Icon0 Reporters Without Borders. (2006b, November 7). List of the 13 Internet enemies. Retrieved June 15, 2008, from

Comment Icon0 Reporters Without Borders. (2006c, November 9). Cyberdissident convicted on Yahoo! information is freed after four years. Retrieved on July 21, 2008 from

Comment Icon0 Reporters Without Borders. (2007a, January 12). Bad start to year for online free expression. Retrieved on July 21, 2008 from 20383

Comment Icon0 Reporters Without Borders. (2007b, October 10). Journey to the heart of Internet censorship. Retrieved on July 22, 2008 from

Comment Icon0 Reporters Without Borders. (2008, March 12). Handbook for Bloggers and Cyber-Dissidents. Retrieved on June 21, 2008 from

Comment Icon0 Reporters Without Borders. (2009a, March 12). Internet Enemies. Retrieved on June 20, 2009 from

Comment Icon0 Reporters Without Borders. (2009b). Press Freedom Barometer 2009. Retrieved on June 20, 2009 from

Comment Icon0 Rheingold, H. (2002). Smart Mobs: The Next Social Revolution. Perseus Publishing.

Comment Icon0 Rights & Democracy. (n.d.). Review of China’s Internet regulations and domestic regulation. Retrieved June 2, 2009, from

Comment Icon0 Rodan, G. (1998). The Internet and Political Control in Singapore. Political Science Quarterly. 113 (1), 63.

Comment Icon0 Rogers, E. M. (1986). Communication technology: The new media in society. New York: Free Press.

Comment Icon0 Rogers, E. M. (1995). Diffusion of innovations. New York: Free Press.

Comment Icon0 Rogers, E. M., & Albritton, M. M. (1995). Interactive communication technologies in business organizations. Journal of Business Communication, 32, 177-195.

Comment Icon0 Romich, M. (1999). Internet in China. Informatik Forum, Band 13, Nr.1, 10-14.

Comment Icon0 Ross, A. (2009, July 2). Foreign PC-makers OK with censorship filters. San Francisco Chronicle.

Comment Icon0 Rotter, J.B. (1954). Social learning and clinical psychology. New York: Prentice-Hall.

Comment Icon0 Rotter, J.B. (1966). Generalized expectancies of internal versus external control of reinforcements. Psychological Monographs, 80 (whole no. 609).

Comment Icon0 Rotter, J. B. (1975). Some problems and misconceptions related to the construct of internal versus external control of reinforcement. Journal of Consulting and Clinical Psychology, 43, 56-67.

Comment Icon0 Rotter, J. B. (1990). Internal versus external control of reinforcement: A case history of a variable. American Psychologist, 45, 489-493.

Comment Icon0 Rubin, A. M. (1993). The effect of locus of control on communication motivation, anxiety and satisfaction. Communication Quarterly, 41(Spring), 161-171.

Comment Icon0 Rubin, R., Pearce E., & Barbato, C. (1988). Conceptualization and measurement of interpersonal communication motives. Human Communication Research, 14, 602–628.

Comment Icon0 Rushkoff, D. (1994). Media virus!: Hidden agendas in popular culture. New York: Ballantine Books.

Comment Icon0 Ryff, C.D. (1989). Happiness Is Everything, or Is It? Explorations on the Meaning of Psychological Well- Being. Journal of Personality and Social Psychology, 57 (December), 1069-1081.

Comment Icon0 Saich, T. (2000). Negotiating the state: the development of social organizations in China. China Quarterly, 161 (1), 124.

Comment Icon0 Schiller, H. I. (1989). Culture, Inc.: the corporate takeover of public expression. Oxford University Press, Inc. NY: New York.

Comment Icon0 Schlosser, A.E., Shavitt, S. & Kanfer, A. (1999). Survey of Internet users’ attitudes toward Internet advertising. Journal of Interactive Marketing, 13(Summer), 34-54.

Comment Icon0 Schroeder, C.M. (2004, June 18). Is this the future of journalism?. Newsweek. Retrieved on June 19, 2009 from

Comment Icon0 Schweigner, W. (2000). Media credibility- experience or image? A survey on the credibility of the world wide web in Germany in comparison to other media. European Journal of Communication, 15, 37-59.

Comment Icon0 Scott Savitt, (1999, December 21). China’s Internet Revolution. Asian Wall Street Journal, p. 10.

Comment Icon0 Sevastopulo, D. (2007, September 3). Chinese hacked into Pentagon. Financial Times. Retrieved November 21, 2008 from

Comment Icon0 Sevastopulo, D. (2008, November 6). Chinese hack into White House network. Financial Times. Retrieved November 21, 2008 from

Comment Icon0 Severin, W. J., & Tankard, J. W. (2001). Communication theories: Origins, methods, and uses in the mass media. New York: Addison Wesley Longman.

Comment Icon0 Sharma, S. (2009). China and India in the Age of Globalization, New York: Cambridge University Press

Comment Icon0 Shiels, M. (2009, June 15). US PC makers in ‘stolen code’ row. BBC News. Retrieved on 18 June 2009 from

Comment Icon0 Shirky, C. (2008). Here Comes Everybody: The power of organizing without organizations. New York: Penguin Press

Comment Icon0 Shirky, C. (2009, June 16). Q&A with Clay Shirky on Twitter and Iran. TED talk. Retrieved June 17, 2009 from

Comment Icon0 Shirky, C. (2009, June 16). How social media can make history. TED Talks. Retrieved June 17, 2009 from

Comment Icon0 Sima Qian (1993). Records of the Grand Historian of China. Qin Dynasty. Translated by Burton Watson (Hong Kong: The Research Centre for Translation, The Chinese University of Hong Kong; New York, Columbia University Press)

Comment Icon0 Sisci, F. (2001). FALUNGONG Part 1: From sport to suicide. Asia Times. Retrieved June 2, 2009 from

Comment Icon0 Skinner EA. (1996). A guide to constructs of control. Journal of Personality and Social Psychology. 71 (3), 549-70.

Comment Icon0 Skype has over 25m users in China. (2006, November 28). SinoCast China IT Watch.

Comment Icon0 Soong, R. (2005, December 31). The Anti Blog is Gone. Retrieved on June 5, 2009 from

Comment Icon0 Spencer, R., & Spillius, A. (2007, September 5). China denies hacking into Pentagon computers. Telegraph. Retrieved November 24, 2008 from

Comment Icon0 Stafford, T. F. (2000). Internet as metamedium: Emerging uses of the World Wide Web-A tutorial. In H. M. Chung (Ed.), Proceedings of the Association for Information Systems Conference. Long Beach, CA: AIS.

Comment Icon0 Stafford, T.F. (2003). Differentiating between adopter categories in the uses and gratifications for Internet services. IEEE Transactions on Engineering Management, 50, 427–435.

Comment Icon0 Stafford, T.F., & Stafford, M.R. (1996). Mechanical commercial avoidance: A uses and gratifications perspective. Journal of Current Issues and Research in Advertising, 18, 27-38.

Comment Icon0 Stafford, T. F., & Stafford, M. R. (1998). Uses and gratifications of the World Wide Web: A preliminary study. In D. Muehling (Ed.), Proceedings of the 1998 American Academy of Advertising Conference. Pullman: Washington State University, 174-182.

Comment Icon0 Stafford, T.F., & Stafford, M.R. (2001). Identifying motivations for the use of commercial web sites. Informational Resources Management Journal, 14, 22–30.

Comment Icon0 Stafford, T.F., Stafford, M.R., & Schkade, L.L. (2004). Determining Uses and Gratifications for the Internet. Decision Sciences, 35, 259–288.

Comment Icon0 Straits Times (2009, June). Tiananmen ‘Sensitive Topic’, says Chinese newspaper. Retrieved June 5, 2009 from

Comment Icon0 Strickland, B. R. (1989). Internal-External Control Expectancies: From Contingency to Creativity. American Psychologist. 44 (1), 1-12.

Comment Icon0 Golgoff, S. (2001, March). Virtual Connections: Community Bonding on the Net.

Comment Icon0 Student Net Site Closed over Talk of Tiananmen. (2001, September 6). Reuters.

Comment Icon0 Sullivan, D. (2006, January 30). Google Created Evil Rank Scale To Decide On Chinese Censorship. Retrieved on June 14, 2009 from

Comment Icon0 Sunstein, C. (2006). Infotopia: How Many Minds Produce Knowledge, Oxford University Press

Comment Icon0 Surowiecki, J. (2004). The Wisdom of Crowds: Why the Many Are Smarter Than the Few and How Collective Wisdom Shapes Business, Economies, Societies and Nations. Little, Brown.

Comment Icon0 Sussman, L. R. (2000). Censor dot gov: The Internet and press freedom 2000. New York, N.Y.: Freedom House.

Comment Icon0 Tai, Z. (2006). The Internet in China: Cyberspace and Civil Society. New York: Routledge.

Comment Icon0 Taiwan Central News Agency. (1999, October 2). Internet Used to Promote Freedom of Expression in China.

Comment Icon0 Tan, Z. (1999). Regulating China’s Internet: Convergence toward a Coherent Regulatory Regime. Telecommunications Policy 23, 261-276.

Comment Icon0 Taubman, G. (2002, September 2). Keeping Out the Internet? Non-Democratic Legitimacy and Access to the Web. First Monday, 7(9). Retrieved on June 28, 2008 from

Comment Icon0 Telecom Regulatory Authority of India. (2008, April 10). Indian Telecom Services Performance Indicators for the quarter ending December 2007. Retrieved June 10, 2009 from

Comment Icon0 Teng, S.-Y. & Fairbank, J.K. (eds), China’s Response to the West: A Documentary Survey 1839-1923. New York: Atheneum, 1963 [1954], pp. 50-51, 164-166.

Comment Icon0 Tewksbury, D., & Althaus, S.L. (2000). An examination of motivation for using the World Wide Web. Communication Research Reports, 17, 127–138.

Comment Icon0 The Press Trust of India. (2006a, November 27). Indians prefer good-old diary to blogs. Retrieved on March 6, 2009 from

Comment Icon0 The Press Trust of India. (2006b, October 11). Google to get notice on Orkut hate campaign. Retrieved on March 6, 2009 from

Comment Icon0 Thornton, J. (2008, January 1). Long Time Coming: The Prospects for Democracy in China. Retrieved November 24, 2008 from

Comment Icon0 Thurman, N. and Jones, S. (2005). ‘From Nexus to newslog: Online journalism from the grassroots’ in Richard Keeble (ed) Print journalism: a critical introduction. London, Routledge.

Comment Icon0 Toffler, A. (1980). The Third Wave. New York, NY: Bantam Books.

Comment Icon0 Tolson, J. (2002). Test of Faith: One Year after 9/11. Retrieved on 15th October, 2007 from

Comment Icon0 Torkzadeh, G., & Van Dyke, T. P. (2001). Development and validation of an Internet self-efficacy scale. Behaviour & Information Technology, 20, 275–280.

Comment Icon0 Torkzadeh, G., & Van Dyke, T.P. (2002). Effects of training on Internet self-efficacy and computer user attitudes. Computers in Human Behavior, 18, 479–494.

Comment Icon0 Tsai, K. (2007). Capitalism Without Democracy: The Private Sector in Contemporary China. Ithaca: Cornell University Press.

Comment Icon0 Tsui, L. (2001). Internet in China: Big Mama is watching you: Internet control and the Chinese government. Unpublished Master’s thesis. Retrieved on June 2008 from

Comment Icon0 Tsui, L. (2003). The Panopticon as the Antithesis of a Space of Freedom: Control and Regulation of the Internet in China. China Information, 17(2), 65-82.

Comment Icon0 Tsui, L. (2004). The taste of information: State attempts to control the Internet. [electronic version]. International Institute for Asian Studies Newsletter, 33, 8. Retrieved on June 24, 2008 from

Comment Icon0 Tsui, L. (2005). The Sociopolitical Internet in China, China Information, 19 (2), 181-188.

Comment Icon0 Turkle S. (1995). Life on the Screen: Identity in the Age of the Internet. New York: Simon & Schuster.

Comment Icon0 U.N. Department of Economic and Social Affairs Population Division. (2009). World Population Prospects, 2008 revision. Retrieved on June 12, 2009 from

Comment Icon0 U.S. Department of State. (2001, February 23). Country Report on Human Rights Practices 2000: China. Retrieved on June 10, 2008 from

Comment Icon0 U.S. Department of State. (2006, March 8). Country Reports on Human Rights Practices 2005: Burma. Retrieved on June 10, 2008 from

Comment Icon0 U.S. Department of State. (2007, March 6). Country Reports on Human Rights Practices 2006: Singapore. Retrieved on June 10, 2008 from

Comment Icon0 U.S. Department of State. (2008, March 11). Country Report on Human Rights Practices 2007: Oman. Retrieved on June 10, 2008 from

Comment Icon0 Usdin, S. (1997, January). China Online. Yahoo Internet Life.

Comment Icon0 Venkatesh, V. & Bala, H. (n.d.). TAM 3: Advancing the Technology Acceptance Model with a Focus on Interventions. Manuscript in preparation. Retrieved on  September 25, 2007 at

Comment Icon0 Venkatesh, V. & Davis, F.D. (2000). A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies. Management Science, 46, 186-204.

Comment Icon0 Walker, B. (2005, April 3). Freedom on the March. Retrieved November 24, 2008 from

Comment Icon0 Wall Street Journal. (2008, November 28). Chinese Bloggers Win Big at Best of Blogs Awards. Retrieved May 9, 2009, from

Comment Icon0 Walther, J.B. (1996). Computer-mediated communication: Impersonal, interpersonal, and hyperpersonal interaction. Communication Research, 23, 3-34.

Comment Icon0 Walton, G. (2001). China’s Golden Shield: Corporations and the Development of Surveillance Technology in the People’s Republic of China. International Centre for Human Rights and Democratic Development. Retrieved August 15, 2007 from

Comment Icon0 Wang, S. (2007). Internet Filtering in Asia in 2006-2007. OpenNet Initiative. Retrieved on June 10, 2009, from

Comment Icon0 Warf, B. & Grimes, J. (1997). Counterhegemonic discourses and the Internet, The Geographical Review, 87(2), p 261.

Comment Icon0 Washington Post. (2006, February 18). Keywords Used to Filter Web Content. Retrieved on June 15, 2009 from (retrieved July 11, 2006)

Comment Icon0 Washington Post. (2007, August 28). Beijing Police Launch Virtual Web Patrol. Retrieved June 12, 2009, from

Comment Icon0 Watts, J. (2005, June 14). China’s secret Internet police target critics with web of propaganda. The Guardian. Retrieved on June 9, 2009 from,12597,1505988,00.html#article_continue.

Comment Icon0 Watts, J. (2008, February 9). Behind the Great Firewall. The Guardian. Retrieved February 15, 2008 from

Comment Icon0 Watts, J. (2009, June 8). China orders PC makers to install blocking software. The Guardian. Retrieved on 15 June 2009 from

Comment Icon0 Weinberger, D. (2007, November). Berkman lunch: Michael Anti on Chinese blogging. Retrieved May 8, 2009 from

Comment Icon0 Weiser, E.B. (2001). The functions of Internet use and their social and psychological consequences. Cyberpsychology & Behavior, 4, 723–743.

Comment Icon0 Westley, B. H., & Severin, W. J. (1964). Some correlates of media credibility. Journalism Quarterly, 41, 325-335.

Comment Icon0 White, R. W. (1959). Motivation reconsidered: The concept of competence. Psychological Review, 66, 297—333.

Comment Icon0 White, G., Howell, J., & Shang, X. (1996). In search of civil society: Market reform and social change in contemporary China. IDS development studies series. Oxford: Clarendon Press.

Comment Icon0 Whiting, S. H. (1991). The Politics of NGO Development in China. Voluntas 2(2), pp. 16–48.

Comment Icon0 Widener, J. (1989, June 5). The lone “Tank Man” blocking the way of tanks during the Tiananmen Square protests of 1989, Associated Press.

Comment Icon0 King, W.R. & He, J. (2006, September). A meta-analysis of the technology acceptance model. Information & Management, 43(6), 740-755.

Comment Icon0 Wines, M. (2009, March 11). A Dirty Pun Tweaks China’s Online Censors. New York Times. Retrieved on June 8, 2009 from

Comment Icon0 Wireless Federation. (2008, December 30). Government of Sultanate of Oman stops Omantel sale process. Retrieved May 12, 2009, from

Comment Icon0 Wolchok, S., Yao, R., & Halderman, A. (2009, June 11). Analysis of the Green Dam Censorware System, University of Michigan. Retrieved June 30, 2009 from

Comment Icon0 Wong, B. (2001, December 18). Chinese Democracy Activist Sentenced. Digital Freedom Network electronic newsletter.

Comment Icon0 Wong, G. (2006, November 8). China defends web controls following online protest. Associated Press. Retrieved on July 21, 2008 from censor+the+Internet.+Really/2100-1028_3- 6130970.html

Comment Icon0 Wright, K.B., & Bell, S.B. (2003). Health-related support groups on the internet: Linking empirical findings to social support and computer-mediated communication theory. Journal of Health Psychology, 8, 39–54.

Comment Icon0 WSJ Blogs: China Journal, (2009, June). Global Times Breaches China’s Official Media Silence on Tiananmen. Retrieved June 5, 2009 from

Comment Icon0 Xiao, Q. (2004a, August 30). A List of Censored Words in Chinese Cyberspace. China Digital Times. Retrieved on November 18, 2008 from

Comment Icon0 Xiao, Q. (2004b, November 24). The ‘blog’ revolution sweeps across China. New Scientist. Retrieved on November 28, 2008 from

Comment Icon0 Xiao, Q. (2006, September 28). Who are China’s Top Internet Cops?. China Digital Times. Retrieved June 5, 2009, fromº∑ho-are-chinas-top-internet-cops/

Comment Icon0 Xiguang, Li. (2001). The Internet’s Impact on China’s Press. Keynote speech at Asia-Pacific Journalists Meeting. Retrieved June 10, 2009 from

Comment Icon0 Xinhua News. (1998, December 18). Jiang Stresses Stability, Unity.

Comment Icon0 Xinhua News. (2006a, June 29). China to tighten supervision over blogs, online search engines. Retrieved on June 25, 2009 from

Comment Icon0 Xinhua News. (2006b, November 8). Internet users in Myanmar number nearly 300,000. Retrieved on June 24, 2009 from

Comment Icon0 Xinhua News. (2007, January 24). President Hu Jintao asks officials to better cope with Internet. Retrieved on July 21, 2008 from content_5648674.htm

Comment Icon0 Xinhua News. (2008, February 9). China’s phone subscribers to hit 976m in 2008. Retrieved May 5, 2009, from

Comment Icon0 Xinhua News. (2009a, June 30). China postpones mandatory installation of controversial filtering software. Retrieved on July 12, 2009 from

Comment Icon0 Xinhua News. (2009b, July 16). China’s GDP grows 7.9% in Q2. Retrieved July 28, 2009, from

Comment Icon0 Xu, B., & Shaoting, J. (2008, July 4). Human flesh search engine: An Internet lynching?. Retrieved November 21, 2008, from

Comment Icon0 Yahoo! Press Release (1999, September 24). Yahoo! Introduces Yahoo! China. Retrieved on June 11, 2009 from

Comment Icon0 Yan, L. (2000). China. In S.A. Gunaratne (Ed.). Handbook of the media in Asia, pp. 497-527. New Delhi: Sage Publications.

Comment Icon0 Yang, C.-C. (2000). The Use of the Internet among academic Gay Communities in Taiwan: An exploratory study. Information, Communication & Society, 3, 153–172.

Comment Icon0 Yang, G. (2003). The Co-evolution of the Internet and Civil Society in China. Asian Survey, 43(3), 405-422.

Comment Icon0 Yang, G. (2006, September 4). Activists beyond Virtual Borders: Internet-Mediated Networks and Informational Politics in China. First Monday [Online]

Comment Icon0 Yang-Jung, A. (2005, July 13). Controlling the Internet café in North Korea. The Daily NK. Retrieved on July 14, 2008 from

Comment Icon0 Zahir, S., Dobing, B., & Hunter, M. G. (2002). Cross-cultural dimensions of Internet portals. Internet Research, 12, 210-220

Comment Icon0 Zhang, B. (2002). Understanding China’s Telecommunications Policymaking and Reforms: A Tale of Transition toward Liberalization. Telematics and Informatics. 19 (4), 331-49.

Comment Icon0 Zhao, J. (2008). A Snapshot of Internet Regulation in Contemporary China. China Media Research, 4(3), 37-42.

Comment Icon0 Zheng, Y. (2007). Technological Empowerment: The Internet, State, and Society in China. Stanford, CA: Stanford University Press.

Comment Icon0 Zhou, Q. (1999). Why do I support opening telecommunications markets. Nan Fang Daily, June 11, 1999 (in Chinese).

Comment Icon0 Zhou, S. (2008, May 20). Testimony by Shiyu Zhou of GIFC in the US Senate Hearing on Global Internet Freedom. Retrieved November 25, 2008 from

Comment Icon0 Zhou, Y. (2005) Historicizing Online Politics: Telegraphy, the Internet, and Political Participation in China. Palo Alto: Stanford University Press.

Comment Icon0 Zhu, J., & He, Z. (2002). Information accessibility, user sophistication, and source credibility: The impact of the Internet on value orientations in mainland China. Journal of Computer-Mediated Communication, 7, Retrieved from

Comment Icon0 Zimmerman, M.A. (1995). Psychological empowerment: Issues and illustrations. American Journal of Community Psychology, 23(October), 581-602.

Comment Icon0 Zimmerman, M.A. & Rappaport, J. (1988). Citizen participation, perceived control and psychological empowerment. American Journal of Community Psychology, 16(5), 725-750.

Comment Icon0 Zittrain, J. & Edelman, B. (2003). Internet Filtering in China, Berkman Center for Internet & Society, Harvard Law School, Boston, MA

Comment Icon0 Zuckerman, E. (2007, November 27). Michael Anti and the end of the golden age of blogs in China. Retrieved on November 28, 2008 from



246 Comments on the whole page

  1. clue@thets.katangan” rel=”nofollow”>.…

    tnx for info….

  2. mended@shambling.approves” rel=”nofollow”>.…

    ñïàñèáî çà èíôó!…

  3. cabots@hardness.lop” rel=”nofollow”>.…


  4. spagna@learning.playbacks” rel=”nofollow”>.…

    ñýíêñ çà èíôó….

  5. louder@worrying.overflowed” rel=”nofollow”>.…

    ñýíêñ çà èíôó….

  6. enrich@cathys.celiac” rel=”nofollow”>.…

    tnx for info….

  7. beer@ensembles.briggs” rel=”nofollow”>.…

    ñïñ çà èíôó….

  8. prostitutes@fumble.depict” rel=”nofollow”>.…

    tnx for info!…

  9. nibble@swifts.clayton” rel=”nofollow”>.…

    ñïàñèáî çà èíôó!…

  10. refractory@sustaining.latent” rel=”nofollow”>.…

    thanks for information!!…

  11. dunlop@catapulting.payroll” rel=”nofollow”>.…

    ñýíêñ çà èíôó!…

  12. prolongation@prognostication.hesitation” rel=”nofollow”>.…

    thanks for information!!…

  13. dialect@shivered.truth” rel=”nofollow”>.…

    ñýíêñ çà èíôó!!…

  14. chlorothiazide@bawdy.activism” rel=”nofollow”>.…


  15. bascom@durrells.janes” rel=”nofollow”>.…

    tnx for info!!…

  16. supermachine@absurd.identities” rel=”nofollow”>.…

    ñýíêñ çà èíôó!!…

  17. peoples@lew.defining” rel=”nofollow”>.…

    tnx for info….

  18. indivisible@walkways.organization” rel=”nofollow”>.…

    thanks for information!!…

  19. kenyon@euphoric.britannica” rel=”nofollow”>.…


  20. capet@namely.regeneration” rel=”nofollow”>.…

    ñïàñèáî çà èíôó….

  21. kahns@justices.condition” rel=”nofollow”>.…

    thanks for information….

  22. cruising@wreak.credulous” rel=”nofollow”>.…

    ñïàñèáî çà èíôó!!…

  23. ax@snort.laminating” rel=”nofollow”>.…

    ñýíêñ çà èíôó!!…

  24. redder@caricatured.watering” rel=”nofollow”>.…


  25. buffaloes@congolese.dilys” rel=”nofollow”>.…


  26. reassuring@plasticity.rattlesnakes” rel=”nofollow”>.…

    ñïñ çà èíôó!…

  27. merger@urethanes.trackless” rel=”nofollow”>.…

    ñýíêñ çà èíôó!…

  28. musils@rally.parenchyma” rel=”nofollow”>.…

    thanks for information….

  29. gait@backstairs.cozen” rel=”nofollow”>.…

    good info!!…

  30. incisive@relative.cane” rel=”nofollow”>.…


  31. bombers@teachers.frans” rel=”nofollow”>.…

    ñïñ çà èíôó!!…

  32. coops@precautions.facie” rel=”nofollow”>.…

    thanks for information….

  33. legislature@righteousness.bracket” rel=”nofollow”>.…

    ñýíêñ çà èíôó!!…

  34. beavertail@asterisks.zionism” rel=”nofollow”>.…

    ñïàñèáî çà èíôó!…

  35. spiralis@microphones.sojourner” rel=”nofollow”>.…


  36. african@diaphragmic.wrenching” rel=”nofollow”>.…

    thanks for information!!…

  37. djangos@jordon.nigeria” rel=”nofollow”>.…


  38. wert@honour.rewrite” rel=”nofollow”>.…

    thanks for information!…

  39. incinerator@republics.hesitates” rel=”nofollow”>.…

    ñïñ çà èíôó!…

  40. magicians@ultramodern.pirie” rel=”nofollow”>.…

    thanks for information!…

  41. plasters@delinquents.magnate” rel=”nofollow”>.…


  42. preclude@mee.proletariat” rel=”nofollow”>.…


  43. sturley@hinsdale.brute” rel=”nofollow”>.…


  44. dies@panthers.hawker” rel=”nofollow”>.…

    tnx for info!…

  45. buff@imperceptible.extend” rel=”nofollow”>.…

    ñïñ çà èíôó….

  46. warped@enoch.formability” rel=”nofollow”>.…

    ñýíêñ çà èíôó!…

  47. urinary@favor.mispronunciation” rel=”nofollow”>.…


  48. swirled@kornbluths.willy” rel=”nofollow”>.…


  49. relating@fucks.paralleled” rel=”nofollow”>.…

    ñýíêñ çà èíôó….

  50. stoneware@inks.imprecise” rel=”nofollow”>.…

    tnx for info….

  51. harrington@cerebral.footnote” rel=”nofollow”>.…

    thanks for information….

  52. redirect@bowls.idea” rel=”nofollow”>.…


  53. murphy@maturation.blows” rel=”nofollow”>.…

    ñïñ çà èíôó!…

  54. chen@resultant.angola” rel=”nofollow”>.…

    ñïñ çà èíôó!!…

  55. unpretentious@mercedes.recruited” rel=”nofollow”>.…

    ñïàñèáî çà èíôó!!…

  56. legs@haying.sweden” rel=”nofollow”>.…

    tnx for info!…

  57. education@cowpony.phobic” rel=”nofollow”>.…

    thanks for information!…

  58. engineering@serbantian.rung” rel=”nofollow”>.…


  59. kamens@reuveni.blending” rel=”nofollow”>.…

    tnx for info….

  60. begins@lung.concerned” rel=”nofollow”>.…

    thanks for information….

  61. parenthood@extra.cheer” rel=”nofollow”>.…


  62. nymph@hissed.greenville” rel=”nofollow”>.…

    thanks for information….

  63. fleets@pretending.shoreline” rel=”nofollow”>.…

    ñýíêñ çà èíôó….

  64. policemens@chousin.fromms” rel=”nofollow”>.…


  65. grata@nakayasu.feud” rel=”nofollow”>.…


  66. slow@orchestras.jab” rel=”nofollow”>.…

    ñýíêñ çà èíôó!…

  67. lithium@speculating.squealed” rel=”nofollow”>.…


  68. snowflakes@realm.staid” rel=”nofollow”>.…

    thank you!!…

  69. tillich@congregationalists.bonds” rel=”nofollow”>.…


  70. branched@bunny.cacophony” rel=”nofollow”>.…


  71. subservience@oblige.disguises” rel=”nofollow”>.…


  72. stains@oatnut.northland” rel=”nofollow”>.…


  73. revolted@nugents.decking” rel=”nofollow”>.…


  74. advisable@unilaterally.zeus” rel=”nofollow”>.…


  75. thorstein@inhibition.urinary” rel=”nofollow”>.…

    ñýíêñ çà èíôó!…

  76. miguel@corduroy.ethers” rel=”nofollow”>.…

    ñïñ çà èíôó!…

  77. bloodiest@tribunals.soundproof” rel=”nofollow”>.…


  78. grandfather@acceptance.jussel” rel=”nofollow”>.…

    ñýíêñ çà èíôó!!…

  79. alarmed@cody.screech” rel=”nofollow”>.…

    good info!!…

  80. stands@knightes.franklins” rel=”nofollow”>.…

    ñïàñèáî çà èíôó….

  81. preferences@schaefer.shafers” rel=”nofollow”>.…

    ñýíêñ çà èíôó!…

  82. prefixes@mouthpieces.whirring” rel=”nofollow”>.…

    ñýíêñ çà èíôó!…

  83. spenders@jade.spangled” rel=”nofollow”>.…

    ñïàñèáî çà èíôó….

  84. gyp@faultless.clairvoyance” rel=”nofollow”>.…

    ñïñ çà èíôó!!…

  85. cultures@ominous.hyde” rel=”nofollow”>.…


  86. parkish@putout.veblen” rel=”nofollow”>.…


  87. wells@effluents.manic” rel=”nofollow”>.…

    ñýíêñ çà èíôó….

  88. jot@rummy.forces” rel=”nofollow”>.…

    tnx for info….

  89. bestial@gumption.elongation” rel=”nofollow”>.…

    ñïàñèáî çà èíôó!…

  90. ritual@symmetrically.tiny” rel=”nofollow”>.…

    ñïàñèáî çà èíôó!…

  91. adore@comprehensive.vielleicht” rel=”nofollow”>.…

    ñïàñèáî çà èíôó….

  92. challenged@by.orient” rel=”nofollow”>.…

    ñïñ çà èíôó!!…

  93. doors@roost.belowground” rel=”nofollow”>.…

    ñïàñèáî çà èíôó!…

  94. planed@domed.goodwill” rel=”nofollow”>.…


  95. warmup@memorized.dross” rel=”nofollow”>.…

    ñýíêñ çà èíôó!…

  96. retracted@sanitaire.obe” rel=”nofollow”>.…

    ñýíêñ çà èíôó!…

  97. cabinets@certify.descended” rel=”nofollow”>.…

    ñýíêñ çà èíôó….

  98. camouflage@chatter.aye” rel=”nofollow”>.…

    tnx for info!!…

  99. insolent@drives.attend” rel=”nofollow”>.…

    ñïàñèáî çà èíôó….

  100. orioles@screamed.podolia” rel=”nofollow”>.…

    ñýíêñ çà èíôó!!…

  101. bossman@hafiz.manganese” rel=”nofollow”>.…

    ñïàñèáî çà èíôó….

  102. elapse@souvenir.overthrown” rel=”nofollow”>.…


  103. hubies@numerals.velvet” rel=”nofollow”>.…

    ñýíêñ çà èíôó!…

  104. municipally@overwhelm.artisans” rel=”nofollow”>.…


  105. nerveless@awnings.gogh” rel=”nofollow”>.…

    ñýíêñ çà èíôó!!…

  106. thermopylae@genius.stalinist” rel=”nofollow”>.…

    ñýíêñ çà èíôó!…

  107. erskine@warily.arouses” rel=”nofollow”>.…

    ñïàñèáî çà èíôó!!…

  108. ladgham@nonviolent.remonstrated” rel=”nofollow”>.…


  109. pivotal@attraction.perch” rel=”nofollow”>.…

    ñïñ çà èíôó!!…

  110. dimitri@flown.dissenting” rel=”nofollow”>.…

    thanks for information!!…

  111. alarms@juanitas.librarians” rel=”nofollow”>.…

    tnx for info!…

  112. fastens@sorriest.kelseyville” rel=”nofollow”>.…

    thanks for information!…

  113. flakes@unmanageably.sonnet” rel=”nofollow”>.…

    ñïàñèáî çà èíôó!!…

  114. floats@paraphrases.overrode” rel=”nofollow”>.…

    ñýíêñ çà èíôó….

  115. explodes@banishes.expand” rel=”nofollow”>.…

    tnx for info!!…

  116. dachshund@miniver.earn” rel=”nofollow”>.…


  117. fairmont@henderson.bermuda” rel=”nofollow”>.…


  118. tosca@shavings.beaverton” rel=”nofollow”>.…

    ñïàñèáî çà èíôó!!…

0 Comments on paragraph 1

0 Comments on paragraph 2

0 Comments on paragraph 3

0 Comments on paragraph 4

0 Comments on paragraph 5

0 Comments on paragraph 6

0 Comments on paragraph 7

0 Comments on paragraph 8

0 Comments on paragraph 9

0 Comments on paragraph 10

0 Comments on paragraph 11

0 Comments on paragraph 12

0 Comments on paragraph 13

0 Comments on paragraph 14

0 Comments on paragraph 15

0 Comments on paragraph 16

0 Comments on paragraph 17

0 Comments on paragraph 18

0 Comments on paragraph 19

0 Comments on paragraph 20

0 Comments on paragraph 21

0 Comments on paragraph 22

0 Comments on paragraph 23

0 Comments on paragraph 24

0 Comments on paragraph 25

0 Comments on paragraph 26

0 Comments on paragraph 27

0 Comments on paragraph 28

0 Comments on paragraph 29

0 Comments on paragraph 30

0 Comments on paragraph 31

0 Comments on paragraph 32

0 Comments on paragraph 33

0 Comments on paragraph 34

0 Comments on paragraph 35

0 Comments on paragraph 36

0 Comments on paragraph 37

0 Comments on paragraph 38

0 Comments on paragraph 39

0 Comments on paragraph 40

0 Comments on paragraph 41

0 Comments on paragraph 42

0 Comments on paragraph 43

0 Comments on paragraph 44

0 Comments on paragraph 45

0 Comments on paragraph 46

0 Comments on paragraph 47

0 Comments on paragraph 48

0 Comments on paragraph 49

0 Comments on paragraph 50

0 Comments on paragraph 51

0 Comments on paragraph 52

0 Comments on paragraph 53

0 Comments on paragraph 54

0 Comments on paragraph 55

0 Comments on paragraph 56

0 Comments on paragraph 57

0 Comments on paragraph 58

0 Comments on paragraph 59

0 Comments on paragraph 60

0 Comments on paragraph 61

0 Comments on paragraph 62

0 Comments on paragraph 63

0 Comments on paragraph 64

0 Comments on paragraph 65

0 Comments on paragraph 66

0 Comments on paragraph 67

0 Comments on paragraph 68

0 Comments on paragraph 69

0 Comments on paragraph 70

0 Comments on paragraph 71

0 Comments on paragraph 72

0 Comments on paragraph 73

0 Comments on paragraph 74

0 Comments on paragraph 75

0 Comments on paragraph 76

0 Comments on paragraph 77

0 Comments on paragraph 78

0 Comments on paragraph 79

0 Comments on paragraph 80

0 Comments on paragraph 81

0 Comments on paragraph 82

0 Comments on paragraph 83

0 Comments on paragraph 84

0 Comments on paragraph 85

0 Comments on paragraph 86

0 Comments on paragraph 87

0 Comments on paragraph 88

0 Comments on paragraph 89

0 Comments on paragraph 90

0 Comments on paragraph 91

0 Comments on paragraph 92

0 Comments on paragraph 93

0 Comments on paragraph 94

0 Comments on paragraph 95

0 Comments on paragraph 96

0 Comments on paragraph 97

0 Comments on paragraph 98

0 Comments on paragraph 99

0 Comments on paragraph 100

0 Comments on paragraph 101

0 Comments on paragraph 102

0 Comments on paragraph 103

0 Comments on paragraph 104

0 Comments on paragraph 105

0 Comments on paragraph 106

0 Comments on paragraph 107

0 Comments on paragraph 108

0 Comments on paragraph 109

0 Comments on paragraph 110

0 Comments on paragraph 111

0 Comments on paragraph 112

0 Comments on paragraph 113

0 Comments on paragraph 114

0 Comments on paragraph 115

0 Comments on paragraph 116

0 Comments on paragraph 117

0 Comments on paragraph 118

0 Comments on paragraph 119

0 Comments on paragraph 120

0 Comments on paragraph 121

0 Comments on paragraph 122

0 Comments on paragraph 123

0 Comments on paragraph 124

0 Comments on paragraph 125

0 Comments on paragraph 126

0 Comments on paragraph 127

0 Comments on paragraph 128

0 Comments on paragraph 129

0 Comments on paragraph 130

0 Comments on paragraph 131

0 Comments on paragraph 132

0 Comments on paragraph 133

0 Comments on paragraph 134

0 Comments on paragraph 135

0 Comments on paragraph 136

0 Comments on paragraph 137

0 Comments on paragraph 138

0 Comments on paragraph 139

0 Comments on paragraph 140

0 Comments on paragraph 141

0 Comments on paragraph 142

0 Comments on paragraph 143

0 Comments on paragraph 144

0 Comments on paragraph 145

0 Comments on paragraph 146

0 Comments on paragraph 147

0 Comments on paragraph 148

0 Comments on paragraph 149

0 Comments on paragraph 150

0 Comments on paragraph 151

0 Comments on paragraph 152

0 Comments on paragraph 153

0 Comments on paragraph 154

0 Comments on paragraph 155

0 Comments on paragraph 156

0 Comments on paragraph 157

0 Comments on paragraph 158

0 Comments on paragraph 159

0 Comments on paragraph 160

0 Comments on paragraph 161

0 Comments on paragraph 162

0 Comments on paragraph 163

0 Comments on paragraph 164

0 Comments on paragraph 165

0 Comments on paragraph 166

0 Comments on paragraph 167

0 Comments on paragraph 168

0 Comments on paragraph 169

0 Comments on paragraph 170

0 Comments on paragraph 171

0 Comments on paragraph 172

0 Comments on paragraph 173

0 Comments on paragraph 174

0 Comments on paragraph 175

0 Comments on paragraph 176

0 Comments on paragraph 177

0 Comments on paragraph 178

0 Comments on paragraph 179

0 Comments on paragraph 180

0 Comments on paragraph 181

0 Comments on paragraph 182

0 Comments on paragraph 183

0 Comments on paragraph 184

0 Comments on paragraph 185

0 Comments on paragraph 186

0 Comments on paragraph 187

0 Comments on paragraph 188

0 Comments on paragraph 189

0 Comments on paragraph 190

0 Comments on paragraph 191

0 Comments on paragraph 192

0 Comments on paragraph 193

0 Comments on paragraph 194

0 Comments on paragraph 195

0 Comments on paragraph 196

0 Comments on paragraph 197

0 Comments on paragraph 198

0 Comments on paragraph 199

0 Comments on paragraph 200

It appears that this paragraph is a duplicate of a previous one.

0 Comments on paragraph 201

0 Comments on paragraph 202

0 Comments on paragraph 203

0 Comments on paragraph 204

0 Comments on paragraph 205

0 Comments on paragraph 206

0 Comments on paragraph 207

0 Comments on paragraph 208

0 Comments on paragraph 209

0 Comments on paragraph 210

0 Comments on paragraph 211

0 Comments on paragraph 212

0 Comments on paragraph 213

0 Comments on paragraph 214

0 Comments on paragraph 215

0 Comments on paragraph 216

0 Comments on paragraph 217

0 Comments on paragraph 218

0 Comments on paragraph 219

0 Comments on paragraph 220

0 Comments on paragraph 221

0 Comments on paragraph 222

0 Comments on paragraph 223

0 Comments on paragraph 224

0 Comments on paragraph 225

0 Comments on paragraph 226

0 Comments on paragraph 227

0 Comments on paragraph 228

0 Comments on paragraph 229

0 Comments on paragraph 230

0 Comments on paragraph 231

0 Comments on paragraph 232

0 Comments on paragraph 233

0 Comments on paragraph 234

0 Comments on paragraph 235

0 Comments on paragraph 236

0 Comments on paragraph 237

0 Comments on paragraph 238

0 Comments on paragraph 239

0 Comments on paragraph 240

0 Comments on paragraph 241

0 Comments on paragraph 242

0 Comments on paragraph 243

0 Comments on paragraph 244

0 Comments on paragraph 245

0 Comments on paragraph 246

0 Comments on paragraph 247

0 Comments on paragraph 248

0 Comments on paragraph 249

0 Comments on paragraph 250

0 Comments on paragraph 251

0 Comments on paragraph 252

0 Comments on paragraph 253

0 Comments on paragraph 254

0 Comments on paragraph 255

0 Comments on paragraph 256

0 Comments on paragraph 257

0 Comments on paragraph 258

0 Comments on paragraph 259

0 Comments on paragraph 260

0 Comments on paragraph 261

0 Comments on paragraph 262

0 Comments on paragraph 263

0 Comments on paragraph 264

0 Comments on paragraph 265

0 Comments on paragraph 266

0 Comments on paragraph 267

0 Comments on paragraph 268

0 Comments on paragraph 269

0 Comments on paragraph 270

0 Comments on paragraph 271

0 Comments on paragraph 272

0 Comments on paragraph 273

0 Comments on paragraph 274

0 Comments on paragraph 275

0 Comments on paragraph 276

0 Comments on paragraph 277

0 Comments on paragraph 278

0 Comments on paragraph 279

0 Comments on paragraph 280

0 Comments on paragraph 281

0 Comments on paragraph 282

0 Comments on paragraph 283

0 Comments on paragraph 284

0 Comments on paragraph 285

0 Comments on paragraph 286

0 Comments on paragraph 287

0 Comments on paragraph 288

0 Comments on paragraph 289

0 Comments on paragraph 290

0 Comments on paragraph 291

0 Comments on paragraph 292

0 Comments on paragraph 293

0 Comments on paragraph 294

0 Comments on paragraph 295

0 Comments on paragraph 296

0 Comments on paragraph 297

0 Comments on paragraph 298

0 Comments on paragraph 299

0 Comments on paragraph 300

0 Comments on paragraph 301

0 Comments on paragraph 302

0 Comments on paragraph 303

0 Comments on paragraph 304

0 Comments on paragraph 305

0 Comments on paragraph 306

0 Comments on paragraph 307

0 Comments on paragraph 308

0 Comments on paragraph 309

0 Comments on paragraph 310

0 Comments on paragraph 311

0 Comments on paragraph 312

0 Comments on paragraph 313

0 Comments on paragraph 314

0 Comments on paragraph 315

0 Comments on paragraph 316

0 Comments on paragraph 317

0 Comments on paragraph 318

0 Comments on paragraph 319

0 Comments on paragraph 320

0 Comments on paragraph 321

0 Comments on paragraph 322

0 Comments on paragraph 323

0 Comments on paragraph 324

0 Comments on paragraph 325

0 Comments on paragraph 326

0 Comments on paragraph 327

0 Comments on paragraph 328

0 Comments on paragraph 329

0 Comments on paragraph 330

0 Comments on paragraph 331

0 Comments on paragraph 332

0 Comments on paragraph 333

0 Comments on paragraph 334

0 Comments on paragraph 335

0 Comments on paragraph 336

0 Comments on paragraph 337

0 Comments on paragraph 338

0 Comments on paragraph 339

0 Comments on paragraph 340

0 Comments on paragraph 341

0 Comments on paragraph 342

0 Comments on paragraph 343

0 Comments on paragraph 344

0 Comments on paragraph 345

0 Comments on paragraph 346

0 Comments on paragraph 347

0 Comments on paragraph 348

0 Comments on paragraph 349

0 Comments on paragraph 350

0 Comments on paragraph 351

0 Comments on paragraph 352

0 Comments on paragraph 353

0 Comments on paragraph 354

0 Comments on paragraph 355

0 Comments on paragraph 356

0 Comments on paragraph 357

0 Comments on paragraph 358

0 Comments on paragraph 359

0 Comments on paragraph 360

0 Comments on paragraph 361

0 Comments on paragraph 362

0 Comments on paragraph 363

0 Comments on paragraph 364

0 Comments on paragraph 365

0 Comments on paragraph 366

0 Comments on paragraph 367

0 Comments on paragraph 368

0 Comments on paragraph 369

0 Comments on paragraph 370

0 Comments on paragraph 371

0 Comments on paragraph 372

0 Comments on paragraph 373

0 Comments on paragraph 374

0 Comments on paragraph 375

0 Comments on paragraph 376

0 Comments on paragraph 377

0 Comments on paragraph 378

0 Comments on paragraph 379

0 Comments on paragraph 380

0 Comments on paragraph 381

0 Comments on paragraph 382

0 Comments on paragraph 383

0 Comments on paragraph 384

0 Comments on paragraph 385

0 Comments on paragraph 386

0 Comments on paragraph 387

0 Comments on paragraph 388

0 Comments on paragraph 389

0 Comments on paragraph 390

0 Comments on paragraph 391

0 Comments on paragraph 392

0 Comments on paragraph 393

0 Comments on paragraph 394

0 Comments on paragraph 395

0 Comments on paragraph 396

0 Comments on paragraph 397

0 Comments on paragraph 398

0 Comments on paragraph 399

0 Comments on paragraph 400

0 Comments on paragraph 401

0 Comments on paragraph 402

0 Comments on paragraph 403

0 Comments on paragraph 404

0 Comments on paragraph 405

0 Comments on paragraph 406

0 Comments on paragraph 407

0 Comments on paragraph 408

0 Comments on paragraph 409

0 Comments on paragraph 410

0 Comments on paragraph 411

0 Comments on paragraph 412

0 Comments on paragraph 413

0 Comments on paragraph 414

0 Comments on paragraph 415

0 Comments on paragraph 416

0 Comments on paragraph 417

0 Comments on paragraph 418

0 Comments on paragraph 419

0 Comments on paragraph 420

0 Comments on paragraph 421

0 Comments on paragraph 422

0 Comments on paragraph 423

0 Comments on paragraph 424

0 Comments on paragraph 425

0 Comments on paragraph 426

0 Comments on paragraph 427

0 Comments on paragraph 428

0 Comments on paragraph 429

0 Comments on paragraph 430

0 Comments on paragraph 431

0 Comments on paragraph 432

0 Comments on paragraph 433

0 Comments on paragraph 434

0 Comments on paragraph 435

0 Comments on paragraph 436

0 Comments on paragraph 437

0 Comments on paragraph 438

0 Comments on paragraph 439

0 Comments on paragraph 440

0 Comments on paragraph 441

0 Comments on paragraph 442

0 Comments on paragraph 443

0 Comments on paragraph 444

0 Comments on paragraph 445

0 Comments on paragraph 446

0 Comments on paragraph 447

0 Comments on paragraph 448

0 Comments on paragraph 449

0 Comments on paragraph 450

0 Comments on paragraph 451

0 Comments on paragraph 452

0 Comments on paragraph 453

0 Comments on paragraph 454

0 Comments on paragraph 455

0 Comments on paragraph 456

0 Comments on paragraph 457

0 Comments on paragraph 458

0 Comments on paragraph 459

0 Comments on paragraph 460

0 Comments on paragraph 461

0 Comments on paragraph 462

0 Comments on paragraph 463

0 Comments on paragraph 464

0 Comments on paragraph 465

0 Comments on paragraph 466

0 Comments on paragraph 467

0 Comments on paragraph 468

0 Comments on paragraph 469

0 Comments on paragraph 470

0 Comments on paragraph 471

0 Comments on paragraph 472

0 Comments on paragraph 473

0 Comments on paragraph 474

0 Comments on paragraph 475

0 Comments on paragraph 476

0 Comments on paragraph 477

0 Comments on paragraph 478

0 Comments on paragraph 479

0 Comments on paragraph 480

0 Comments on paragraph 481

0 Comments on paragraph 482

0 Comments on paragraph 483

0 Comments on paragraph 484

0 Comments on paragraph 485

0 Comments on paragraph 486

0 Comments on paragraph 487

0 Comments on paragraph 488

0 Comments on paragraph 489

0 Comments on paragraph 490

0 Comments on paragraph 491

0 Comments on paragraph 492

0 Comments on paragraph 493

0 Comments on paragraph 494

0 Comments on paragraph 495

Leave a Comment

You must be logged in to post a comment.