Визуальный Интернет-юмор, как фактор



Yüklə 0,57 Mb.
səhifə5/7
tarix05.03.2018
ölçüsü0,57 Mb.
#30224
növüДиссертация
1   2   3   4   5   6   7

Conclusions
This paper was focused on the role of the Internet-based visual humor in the development of a separate Internet-based public sphere in China. The author used postmodernist approach to the interpretation of images circulating on the Internet and considered the images to be non-linear texts which express the public opinion and give the viewer understanding of what is topical in the society. The fact that China pursue a policy, which does not give space for free discussion on political topics, and enforces Internet security regulations, allows the emergence of new ways for the spread of discussions and sharing opinions through unconventional types of communication such as through user-edited visual content.

The debates about the possibility of the emergence and development of a public sphere in China have been very topical since the 60’s; however, most of the popular interpretations of the concept of public sphere were based on its interpretation by Habermas. Habermas saw rational debate on the private issues that are significant for the whole society due to their relation to the whole social environment of a state as the key characteristic that defined public sphere, and the influence which the result of such a discussion has on the state’s policy would be the main criterion of the identification of the public sphere in a state. However, later the sociological understanding of the public sphere changed as the concept of Habermas started to be considered a normative one, while it was considered that there is a possibility of the development of a distinctive type of public sphere in any separate society. The distinctiveness of a public sphere would be determined by the political culture of a society and its historical background. The most recent interpretations, including the one by Nancy Fraser, imply the simultaneous existence of several public spheres that can be contradictory to each other and not always aiming at promoting changes in the actual policy of the state or at least influencing the government, on the contrary, Fraser thinks that for some public spheres the aim is its existence as a platform for discussion and sharing of opinions. This concept was adopted as a main theoretical basis for the current research, since the Chinese political tradition and the current state of Chinese legislation does not allow the constant direct influence of the people on the governmental decisions.

Under the conditions of restricted freedom of speech, the Chinese have found another platform for the discussion which, from Fraser’s point of view, facilitates the development of an independent public sphere. This platform is the Internet. Introduced to China in 1989, it only became widespread in the beginning of the new century; however, we still cannot say that the Internet is available to everybody in the country. However, those who do have the access have found it quite useful for the dissemination of ideas, discussion of popular issues and even criticism of the existing political situation and the government. The main breakthrough which made this development possible was the introduction of Web 2.0 architecture, which put the users’ participation in the formation of the cyberspace in the center and did not require the users to provide their personal information, thus making their participation anonymous. The Chinese government’s response in the form of censorship regulations, on the one hand, introduced as the necessity for the protection of personal information of users, but on the other hand, providing a legal basis for restricting certain types of politically sensitive information from being freely spread among the users, put an end to the illusive freedom of speech. However, the fact that only automatic textual analysis has been very well developed by now and other types of content place greater obstacles for the programmers, the Internet users resorted to a more elaborate form of communication – visual. Although image recognition is one of the rapidly developing spheres of IT at the moment, the amount of this type of content posted on the Internet every hour and the peculiarities of visual type of information do not allow automatic programs to recognize and delete the necessary information from the web immediately, which gives the information time to spread.

The analysis of the statistical data indicated the current state of the Internet development and coverage in China. A typical user of the Internet in China is an urban resident, 20-29 years old, most likely a student, who uses Internet both from the PC and from the mobile phone with a camera, and therefore can update information as soon as any changes happen. The statistics also indicated that the most popular type of content is images, and therefore the speed of their spread among the users is the highest. The most popular way of sharing any type of content is currently microblogging services and instant messaging applications. While for the registration in these types of services it is, according to the latest updating of the NPC Standing Committee Decision concerning Strengthening Network Information Protection, obligatory to provide personal information, and therefore all the information posted by the users through the service can be traced back to the initiator, as the services have terms of use based upon the Internet regulation laws. However, this still allows the users some time before their posts might get deleted, and therefore images are getting more and more popular as the alternative to verbal way of communication and discussion.

Images are conventionally used as illustrative material for verbal knowledge, however, according to the postmodernist philosophy; an image can be considered a text with several layers of meaning. For the understanding how this works in case of alternative communication in social networks and microblogging websites, the author conducted analysis of visual content published in Weibo microblogging service during 2013-2014, with part of the sample being uncensored, and another part being deleted from the network due to censorship scrutiny, and uncovered through the independent services monitoring the process of posts deletion in Weibo. The analysis was conducted according to three dimensions: semiotic, structural and discursive. The results of the analysis revealed the most popular tools which are used by the users editing visual content for further distribution, and showed the difference in the tools choice for the uncensored and censored images. The tools include the use of icons, indices and symbols, with symbols use being more frequent in the group of uncensored images, while indices are the most popular tool for meaning expression in both groups. The use of punctum is much higher in the group of uncensored images, which suggests that the punctum can be used as a distracter of attention from the details which constitute the whole meaning.

Content analysis revealed that the uncensored pictures are more society-oriented, while deleted pictures are more politics and person-oriented, which explains the reason for their deletion. Both groups express criticism towards officials; however, they do it in different forms, with the deleted ones being more person-oriented and offensive.

The tasks that were stated in the beginning of the research were completed. All in all, the introduction of visual humor into the cyberspace and the development of users’ editing allowed the broader-scale spread of ideas among the most socially active groups of population. Although the images cannot represent the opinions of rural residents, they can be interpreted as representations of a public opinion, and their distribution among the users indicates the users’ agreement with the opinions expressed, and therefore visual humorous content should be considered a factor of a separate Internet-based public opinion development, which proves the hypothesis stated in the beginning.

The analysis conducted in the current research has one significant drawback: lack of technical support for the creation of its own sample. Due to inability to track the deleted and popular posts with images online, the author turned to the analysis of already existing compilations, which could not be considered fully representative, as they were gathered by the Western companies.



However, the future development of the topic will allow further research of verbally non-revealed public opinion and to form the patterns and conditions for the deletion, and therefore understand the Chinese system of censorship better.
Primary and Secondary Sources
Primary Sources

  1. Central People’s Government of the People’s Republic of China. National People’s Congress Standing Committee Decision concerning Strengthening Network Information Protection (in Chinese). http://www.gov.cn/jrzg/2012-12/28/content_2301231.htm (accessed May 5, 2014).

  2. China Digital Times (CDT) portal’s Drawing the News section. http://chinadigitaltimes.net/china/drawing-the-news/ (accessed May 29, 2014).

  3. China Internet Network Information Center (CNNIC). The 27th Statistical Report on Internet Development in China, January 2011. http://www1.cnnic.cn/IDR/ReportDownloads/201209/P020120904420388544497.pdf (accessed April 15, 2014).

  4. China Internet Network Information Center (CNNIC). The 28th Statistical Report on Internet Development in China, July 2011. http://www1.cnnic.cn/IDR/ReportDownloads/201209/P020120904421102801754.pdf (accessed April 15, 2014).

  5. China Internet Network Information Center (CNNIC). The 29th Statistical Report on Internet Development in China, January 2012. http://www1.cnnic.cn/IDR/ReportDownloads/201209/P020120904421720687608.pdf (accessed April 15, 2014).

  6. China Internet Network Information Center (CNNIC). The 31st Statistical Report on Internet Development in China, January 2013. http://www1.cnnic.cn/IDR/ReportDownloads/201302/P020130312536825920279.pdf (accessed April 15, 2014).

  7. China Internet Network Information Center (CNNIC). The 32nd Statistical Report on Internet Development in China, July 2013. http://www1.cnnic.cn/IDR/ReportDownloads/201310/P020131029430558704972.pdf (accessed April 15, 2014).

  8. China Internet Network Information Center (CNNIC). The 33d Statistical Report on Internet Development in China, January 2014. http://www1.cnnic.cn/IDR/ReportDownloads/201404/U020140417607531610855.pdf (accessed April 15, 2014).

  9. Ministry of Public Security of the People’s Republic of China. Decree of the State Council of the People's Republic of China (No. 292) (in Chinese), September 2000. http://www.mps.gov.cn/n16/n1282/n3493/n3778/n492863/493177.html (accessed May 1, 2014).

  10. Information Office of the State Council of the People's Republic of China. The Internet in China, White Paper, June 2010. http://www.china.org.cn/government/whitepaper/node_7093508.htm (accessed April 21, 2014)

  11. National Bureau of Statistics of China. National Data. http://data.stats.gov.cn/ (accessed April 20, 2014).

  12. ProPublica Newsroom Home Page. http://www.propublica.org/ (accessed May 29, 2014).

  13. Weibo Corporation. List of Violations, Microblogging Community Management Regulations (Trial) (in Chinese). http://service.account.weibo.com/roles/guiding (accessed April 29, 2014).

  14. WeiboScope Social Media Data Collection and Visualization Project Home Page. http://weiboscope.jmsc.hku.hk/ (accessed May 29, 2014).


Secondary Sources

  1. Chong Woei Lian. China's Great Proletarian Cultural Revolution: Master Narratives and Post-Mao Counternarratives (Asia/Pacific/Perspectives). New York: Rowman & Littlefield Publishers, 2002. 432 p.

  2. Collins M. China’s Confucius and Western Democracy // Contemporary Review, 2008. – Vol. 290. – P. 161-172.

  3. Downey J., Mihelj S. Comparing Public Spheres: Normative Models and Empirical Measurements // European Journal of Communication, 2012. – Vol. 27 (4) – P. 337-353.

  4. Favero P. Learning to Look Beyond the Frame: Reflections on the Changing Meaning of Images In the Age of Digital Media Practices // Visual studies, 2014. – Vol. 29, No. 2. – P. 166-179.

  5. Fraser N. Rethinking the Public Sphere: A Contribution to the Critique of Actually Existing Democracy // Social Text. – No. 25/26, 1990. – P. 56-80.

  6. Gong Haomin, Yang Xin. Digitized parody: The politics of egao in contemporary China // China Information, 2010. – Vol. 24 (1). P. 3-26.

  7. Hall E. Foreword // Visual Anthropology. Photography as a Research Method. – Albuquerque: The University of New Mexico Press, 1986. – P. xiii-xvii.

  8. Keane J. Structural Transformation of the Public Sphere // Digital Democracy: Issues of theory and practice. – London: SAGE Publications, 2000. – P. 70-89.

  9. Kellner D. Habermas, the Public Sphere, and Democracy: A Critical Intervention // Perspectives on Habermas. – Chicago: Open Court, 2000. – P. 259-287.

  10. Liu Qing, McCormick B. The Media and the Public Sphere in Contemporary China // Boundary 2, 2011. – Vol. 38, No. 1. – P. 101-134.

  11. Madsen R. The Public Sphere, Civil Society and Moral Community: A Research Agenda for Contemporary China Studies // Modern China, 1993. – Vol. 19, No. 2 – P. 183-198.

  12. Neuendorf K.A., Skalski P.D. Atkin D., Jeffres L.W. Public Opinion, Media Use, and the Senses of Humor. Paper presented to the Mass Communication Division of the International Communication Association. – Boston, MA, 2011. – 39 p.

  13. Sparks C. Introduction:  The Panic over Tabloid News // Sparks, C., Tulloch, J. (eds.). Tabloid Tales:  Global Debates over Media Standards.  – Lanham, Maryland:  Rowman and Littlefield, 2000. – P. 1-40.

  14. Sztompka P. Visual Sociology: Photography as a Method of Research. M: Logos, 2007. 168 p.

  15. Taylor C. Modern Social Imaginaries. – Durham: Duke University Press Books, 2003. – 232 p.

  16. West M.D. Is the Internet an Emergent Public Sphere? // Journal of Mass Media Etics, 2013. – Vol. 28. – P. 155-159.

  17. Yarskaya-Smirnova E. R., Romanov P. Views and Images: Methodology, Analysis, Practice. // Visual Anthropology. – M.: Variant, 2009. – P. 7-16.

  18. Zha Jianying. China Pop: How Soap Operas, Tabloids and Bestsellers Are Transforming a Culture. – New York: New Press, 1996. – 224 p.

  19. Zhan Meina. Philosophy on the Problem of “Work hard and get rich” // Journal of North China Institute of Water Conservancy and Hydropower, October 2010. – Vol. 26, No. 5.


Internet-based Secondary Sources

  1. Boeder P. Habermas’ Heritage: The Future of the Public Sphere in the Network Society // First Monday, 2005. – Vol. 10, No. 9. http://firstmonday.org/ojs/index.php/fm/article/view/1280/1200 (accessed March 2, 2014).

  2. Buckley C. Some of China’s Prominent Internet Voices // The New York Times, September, 2013. http://www.nytimes.com/2013/09/11/world/asia/some-of-chinas-prominent-internet-voices.html?emc=edit_tnt_20130910&tntemail0=y&_r=2& (accessed May 20, 2014).

  3. China Internet Network Information Center (CNNIC). The Internet Timeline of China 1986~2003. http://www1.cnnic.cn/IDR/hlwfzdsj/201306/t20130628_40563.htm (accessed April 2, 2014).

  4. China Internet Network Information Center (CNNIC). The Internet Timeline of China 2008. http://www1.cnnic.cn/IDR/hlwfzdsj/201306/t20130628_40563.htm (accessed April 2, 2014).

  5. Davison N. Rivers of Blood: the Dead Pigs Rotting in China's Water Supply // The Guardian, March 2013. http://www.theguardian.com/world/2013/mar/29/dead-pigs-china-water-supply (accessed May 12, 2014).

  6. Gu Pengbo. Investigation Started After Hunan Watermelon Incident // SINA News Center, July 2013. http://news.sina.com.cn/c/2013-07-18/023927698247.shtml (accessed May 20, 2014).

  7. Jiang Min. Authoritarian Informationalism: China’s Approach to Internet Sovereignty // SAIS Review, 2010. – Vol. XXX, No. 2. – P. 71-89.

  8. Koçan G. Models of Public Sphere in Political Philosophy // Eurosphere Working Paper. – No. 02, 2008. http://eurosphere.uib.np/knowledgebase/workingpapers.htm (accessed March 10, 2014).

  9. Li Dan. The Day of National Civil Service Examinations. 1,52 Million People Trying to Get 19 Thousand of Jobs // Tianyuanwang, November 2013. http://www.ncnews.com.cn/xwzx/xwzx/t20131124_1093794.htm (accessed May 12, 2014).

  10. Sina Weibo. Business Overview. http://ir.weibo.com/phoenix.zhtml?c=253076&p=irol-homeprofile (accessed May 2, 2014).

  11. Wendlandt A., Denis P. Hermes says not affected by China's corruption crackdown // Reuters, UK Edition, February 2013. http://uk.reuters.com/article/2014/02/13/uk-hermes-sales-ceo-idUKBREA1C0EP20140213 (accessed May 12, 2014).

  12. Yang Deshan. Three Represents (in Chinese). News of the Communist Party of China. http://cpc.people.com.cn/GB/64162/64171/4527680.html (accessed May 12, 2014).

  13. 预计数月后恢复目前暂停上传. "两高"司法解释:网络名人更需遵守网络秩序 潘石屹表态. Video published in September 2013. http://www.youtube.com/watch?v=f_fwk662_6E (accessed May 20, 2014).

  14. Zhai Yafei. Editorial: Xi’s 21-yuan Lunch: Why People Are So Fond of It? (in Chinese) //Opinion.huanqiu.com, December 2013. http://opinion.huanqiu.com/editorial/2013-12/4706371.html (accessed May 20, 2014).


Appendix 1. Decision of the Standing Committee of the National People's Congress on Strengthening Information Protection on Networks

Source: www.npc.gov.cn

Date of publication: 2012-12-29
全国人民代表大会常务委员会关于加强网络信息保护的决定

(2012年12月28日第十一届全国人民代表大会常务委员会第三十次会议通过)

为了保护网络信息安全,保障公民、法人和其他组织的合法权益,维护国家安全和社会公共利益,特作如下决定:

一、国家保护能够识别公民个人身份和涉及公民个人隐私的电子信息。

任何组织和个人不得窃取或者以其他非法方式获取公民个人电子信息,不得出售或者非法向他人提供公民个人电子信息。

二、网络服务提供者和其他企业事业单位在业务活动中收集、使用公民个人电子信息,应当遵循合法、正当、必要的原则,明示收集、使用信息的目的、方式和范围,并经被收集者同意,不得违反法律、法规的规定和双方的约定收集、使用信息。

网络服务提供者和其他企业事业单位收集、使用公民个人电子信息,应当公开其收集、使用规则。

三、网络服务提供者和其他企业事业单位及其工作人员对在业务活动中收集的公民个人电子信息必须严格保密,不得泄露、篡改、毁损,不得出售或者非法向他人提供。

四、网络服务提供者和其他企业事业单位应当采取技术措施和其他必要措施,确保信息安全,防止在业务活动中收集的公民个人电子信息泄露、毁损、丢失。在发生或者可能发生信息泄露、毁损、丢失的情况时,应当立即采取补救措施。

五、网络服务提供者应当加强对其用户发布的信息的管理,发现法律、法规禁止发布或者传输的信息的,应当立即停止传输该信息,采取消除等处置措施,保存有关记录,并向有关主管部门报告。

六、网络服务提供者为用户办理网站接入服务,办理固定电话、移动电话等入网手续,或者为用户提供信息发布服务,应当在与用户签订协议或者确认提供服务时,要求用户提供真实身份信息。

七、任何组织和个人未经电子信息接收者同意或者请求,或者电子信息接收者明确表示拒绝的,不得向其固定电话、移动电话或者个人电子邮箱发送商业性电子信息。

八、公民发现泄露个人身份、散布个人隐私等侵害其合法权益的网络信息,或者受到商业性电子信息侵扰的,有权要求网络服务提供者删除有关信息或者采取其他必要措施予以制止。

九、任何组织和个人对窃取或者以其他非法方式获取、出售或者非法向他人提供公民个人电子信息的违法犯罪行为以及其他网络信息违法犯罪行为,有权向有关主管部门举报、控告;接到举报、控告的部门应当依法及时处理。被侵权人可以依法提起诉讼。

十、有关主管部门应当在各自职权范围内依法履行职责,采取技术措施和其他必要措施,防范、制止和查处窃取或者以其他非法方式获取、出售或者非法向他人提供公民个人电子信息的违法犯罪行为以及其他网络信息违法犯罪行为。有关主管部门依法履行职责时,网络服务提供者应当予以配合,提供技术支持。

国家机关及其工作人员对在履行职责中知悉的公民个人电子信息应当予以保密,不得泄露、篡改、毁损,不得出售或者非法向他人提供。

十一、对有违反本决定行为的,依法给予警告、罚款、没收违法所得、吊销许可证或者取消备案、关闭网站、禁止有关责任人员从事网络服务业务等处罚,记入社会信用档案并予以公布;构成违反治安管理行为的,依法给予治安管理处罚。构成犯罪的,依法追究刑事责任。侵害他人民事权益的,依法承担民事责任。

十二、本决定自公布之日起施行。



Appendix 2. People's Republic of China State Council Order No. 292

Source: http://www.mps.gov.cn/n16/n1282/n3493/n3778/n492863/493177.html

互联网信息服务管理办法

中华人民共和国国务院令第292号

《互联网信息服务管理办法》已经2000年9月20日国务院第31次常务会议通过,现予公布施行。

第一条 为了规范互联网信息服务活动,促进互联网信息服务健康有序发展,制定本办法。

第二条 在中华人民共和国境内从事互联网信息服务活动,必须遵守本办法。

本办法所称互联网信息服务,是指通过互联网向上网用户提供信息的服务活动。

第三条 互联网信息服务分为经营性和非经营性两类。

经营性互联网信息服务,是指通过互联网向上网用户有偿提供信息或者网页制作等服务活动。

非经营性互联网信息服务,是指通过互联网向上网用户无偿提供具有公开性、共享性信息的服务活动。

第四条 国家对经营性互联网信息服务实行许可制度;对非经营性互联网信息服务实行备案制度。

未取得许可或者未履行备案手续的,不得从事互联网信息服务。

第五条 从事新闻、出版、教育、医疗保健、药品和医疗器械等互联网信息服务,依照法律、行政法规以及国家有关规定须经有关主管部门审核同意,在申请经营许可或者履行备案手续前,应当依法经有关主管部门审核同意。

第六条 从事经营性互联网信息服务,除应当符合《中华人民共和国电信条例》规定的要求外,还应当具备下列条件:

(一)有业务发展计划及相关技术方案;

(二)有健全的网络与信息安全保障措施,包括网站安全保障措施、信息安全保密管理制度、用户信息安全管理制度;

(三)服务项目属于本办法第五条规定范围的,已取得有关主管部门同意的文件。

第七条 从事经营性互联网信息服务,应当向省、自治区、直辖市电信管理机构或者国务院信息产业主管部门申请办理互联网信息服务增值电信业务经营许可证(以下简称经营许可证)。

省、自治区、直辖市电信管理机构或者国务院信息产业主管部门应当自收到申请之日起60日内审查完毕,作出批准或者不予批准的决定。予以批准的,颁发经营许可证;不予批准的,应当书面通知申请人并说明理由。

申请人取得经营许可证后,应当持经营许可证向企业登记机关办理登记手续。

第八条 从事非经营性互联网信息服务,应当向省、自治区、直辖市电信管理机构或者国务院信息产业主管部门办理备案手续。办理备案时,应当提交下列材料:

(一)主办单位和网站负责人的基本情况;

(二)网站网址和服务项目;

(三)服务项目属于本办法第五条规定范围的,已取得有关主管部门的同意文件。

省、自治区、直辖市电信管理机构对备案材料齐全的,应当予以备案并编号。

第九条 从事互联网信息服务,拟开办电子公告服务的,应当在申请经营性互联网信息服务许可或者办理非经营性互联网信息服务备案时,按照国家有关规定提出专项申请或者专项备案

第十条 省、自治区、直辖市电信管理机构和国务院信息产业主管部门应当公布取得经营许可证或者已履行备案手续的互联网信息服务提供者名单。

第十一条 互联网信息服务提供者应当按照经许可或者备案的项目提供服务,不得超出经许可或者备案的项目提供服务。

非经营性互联网信息服务提供者不得从事有偿服务。

互联网信息服务提供者变更服务项目、网站网址等事项的,应当提前30日向原审核、发证或者备案机关办理变更手续。

第十二条 互联网信息服务提供者应当在其网站主页的显著位置标明其经营许可证编号或者备案编号。

第十三条 互联网信息服务提供者应当向上网用户提供良好的服务,并保证所提供的信息内容合法。

第十四条 从事新闻、出版以及电子公告等服务项目的互联网信息服务提供者,应当记录提供的信息内容及其发布时间、互联网地址或者域名;互联网接入服务提供者应当记录上网用户的上网时间、用户帐号、互联网地址或者域名、主叫电话号码等信息。

互联网信息服务提供者和互联网接入服务提供者的记录备份应当保存60日,并在国家有关机关依法查询时,予以提供。

第十五条 互联网信息服务提供者不得制作、复制、发布、传播含有下列内容的信息:

(一)反对宪法所确定的基本原则的;

(二)危害国家安全,泄露国家秘密,颠覆国家政权,破坏国家统一的;

(三)损害国家荣誉和利益的;

  (四)煽动民族仇恨、民族歧视,破坏民族团结的;

(五)破坏国家宗教政策,宣扬邪教和封建迷信的;

(六)散布谣言,扰乱社会秩序,破坏社会稳定的;

(七)散布淫秽、色情、赌博、暴力、凶杀、恐怖或者教唆犯罪的;

(八)侮辱或者诽谤他人,侵害他人合法权益的;

(九)含有法律、行政法规禁止的其他内容的。

第十六条 互联网信息服务提供者发现其网站传输的信息明显属于本办法第十五条所列内容之一的,应当立即停止传输,保存有关记录,并向国家有关机关报告。

第十七条 经营性互联网信息服务提供者申请在境内境外上市或者同外商合资、合作,应当事先经国务院信息产业主管部门审查同意;其中,外商投资的比例应当符合有关法律、行政法规的规定。

第十八条 国务院信息产业主管部门和省、自治区、直辖市电信管理机构,依法对互联网信息服务实施监督管理。

新闻、出版、教育、卫生、药品监督管理、工商行政管理和公安、国家安全等有关主管部门,在各自职责范围内依法对互联网信息内容实施监督管理。

第十九条 违反本办法的规定,未取得经营许可证,擅自从事经营性互联网信息服务,或者超出许可的项目提供服务的,由省、自治区、直辖市电信管理机构责令限期改正,有违法所得的,没收违法所得,处违法所得3倍以上5倍以下的罚款;没有违法所得或者违法所得不足5万元的,处10万元以上100万元以下的罚款;情节严重的,责令关闭网站。

违反本办法的规定,未履行备案手续,擅自从事非经营性互联网信息服务,或者超出备案的项目提供服务的,由省、自治区、直辖市电信管理机构责令限期改正;拒不改正的,责令关闭网站。

第二十条 制作、复制、发布、传播本办法第十五条所列内容之一的信息,构成犯罪的,依法追究刑事责任;尚不构成犯罪的,由公安机关、国家安全机关依照《中华人民共和国治安管理处罚条例》、《计算机信息网络国际联网安全保护管理办法》等有关法律、行政法规的规定予以处罚;对经营性互联网信息服务提供者,并由发证机关责令停业整顿直至吊销经营许可证,通知企业登记机关;对非经营性互联网信息服务提供者,并由备案机关责令暂时关闭网站直至关闭网站。

第二十一条 未履行本办法第十四条规定的义务的,由省、自治区、直辖市电信管理机构责令改正;情节严重的,责令停业整顿或者暂时关闭网站。

第二十二条 违反本办法的规定,未在其网站主页上标明其经营许可证编号或者备案编号的,由省、自治区、直辖市电信管理机构责令改正,处5000元以上5万元以下的罚款。

第二十三条 违反本办法第十六条规定的义务的,由省、自治区、直辖市电信管理机构责令改正;情节严重的,对经营性互联网信息服务提供者,并由发证机关吊销经营许可证,对非经营性互联网信息服务提供者,并由备案机关责令关闭网站。

第二十四条 互联网信息服务提供者在其业务活动中,违反其他法律、法规的,由新闻、出版、教育、卫生、药品监督管理和工商行政管理等有关主管部门依照有关法律、法规的规定处罚。

第二十五条 电信管理机构和其他有关主管部门及其工作人员,玩忽职守、滥用职权、徇私舞弊,疏于对互联网信息服务的监督管理,造成严重后果,构成犯罪的,依法追究刑事责任;尚不构成犯罪的,对直接负责的主管人员和其他直接责任人员依法给予降级、撤职直至开除的行政处分。

第二十六条 在本办法公布前从事互联网信息服务的,应当自本办法公布之日起60日内依照本办法的有关规定补办有关手续。

第二十七条 本办法自公布之日起施行。

Appendix 3. List of Violations, Microblogging Community Management Regulations (Trial), Article 4.

Source: http://service.account.weibo.com/roles/guiding

微博社区管理规定(试行)



第四章违规行为界

第十四

发布危害信息。危害信息主要包括:

(一) 根据现行法律法规,危害国家及社会安全的信息(简称“敏感信息”),主要表现为:
1. 反对宪法确定的基本原则;
2. 危害国家统一、主权和领土完整;
3. 泄露国家秘密、危害国家安全或者损害国家荣誉和利益;
4. 煽动民族仇恨、民族歧视,破坏民族团结,或者侵害民族风俗、习惯;
5. 破坏国家宗教政策,宣扬邪教、迷信;
6. 散布谣言,扰乱社会秩序,破坏社会稳定;
7. 宣扬赌博、暴力、凶杀、恐怖或者教唆犯罪;
8. 煽动非法集会、结社、游行、示威、聚众扰乱社会秩序;
9. 含有法律、行政法规和国家规定禁止的其他内容。

(二) 不安全信息,包括可能对用户财产安全或信息安全造成损失的内容,主要表现为:


1.含钓鱼网站链接的相关内容;
2.含木马、病毒网站链接及相关内容;
3.含潜在危险、窃取用户隐私等相关内容;
4.影响用户体验或被大量用户举报的未经审核的外链、二维码及其他多媒体等内容;

(三) 垃圾营销信息,是指以营利为目的,在与用户建立或维持关系的过程中,所产生的影响用户体验,扰乱微博社区秩序的信息和行为,其中包括垃圾信息、恶意行为和骚扰用户的营销信息,主要表现为:


1. 从事买卖粉丝及相关业务;
2. 从事刷评论、刷转发、刷双井号话题词、刷搜索、刷投票、刷有奖活动业务;
3. 通过机器或软件等非人力手段对他人页面大量发送广告信息;
4. 虚假中奖信息;
5. 机器抓取发送的无意义内容、重复内容;
6. 利用系统漏洞干扰微博正常秩序的行为。如:盗用他人账号、强制他人关注等;
7. 影响用户体验或被大量用户举报的,其性质属于推销宣传推广的营销信息。

(四) 淫秽色情信息,主要表现为:


1. 淫秽:具体描绘性行为或露骨宣扬色情的诲淫性信息。
2. 色情:露三点的图片、视频,带有色情意味、暗示、挑逗和引起他人类似感受的音频、文字。

Yüklə 0,57 Mb.

Dostları ilə paylaş:
1   2   3   4   5   6   7




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©genderi.org 2024
rəhbərliyinə müraciət

    Ana səhifə