[1] Bandurski, D. (2008). China’s guerrilla war for the web, far eastern economic review. URL (last checked 16 November 2012). http://www.feer.com/essays/2008/august/chinas-guerrilla-war-for-the-web
[2] Barboza, D., & Zeller, T. (2006), Microsoft shuts blog’s site after complaints in Beijing. NY Times. http://www.nytimes.com/2006/01/06/technology/06blog.html?_r=1&oref=slogin
[3] Chao, L. (2009). China squeezes PC makers. Wall Street Journal. http://online.wsj.com/article/SB124440211524192081.html
[4] Chen, J. (2009). Officials punished over land scandal. Shanghai Daily, 29 April 2009.
[5] China Human Rights Defenders (2009). Tug of war over China’s cyberspace: A sequel to journey to the heart of censorship. URL (last checked 9 March 2012). http://crdnet.org/Article/Class9/Class11/200903/20090319000543_14370.html
[6] CINIC (China Internet Network Information Center) (2009). Twenty third statistical survey report on the internet development in China. 23 March 2009.
[7] Hermida, A. (2002). Behind China’s internet red firewall URL (last checked 15 November 2012). http://news.bbc.co.uk/1/hi/technology/2234154.stm
[8] Human Rights in China Press Release (2008). Family visits still denied to Sichuan school teacher punished after quake-zone visit. URL (last checked 29 July 2008). http://www.hrichina.org/public/contents/press?revision_Id=66556&item_Id=6652
[9] Kerstetter, J. (2005). Group says Yahoo helped jail Chinese journalist. CNET NEWS.COM, 6 September 2005.
[10] Li, C. (2004). Internet content control in China. International Journal of Communications Law and Policy, 1, 5
[11] Newbold, J. R. (2003). Aiding the enemy: Imposing liability on US corporations for selling China internet tools to restrict human rights. University of Illinois Journal of Law, Technology & Policy.
[12] Official Google Blog (2010). A new approach to China. URL (last checked 16 November 2012). http://googleblog.blogspot.com/2010/01/new-approach-to-china.html
[13] ONI (2005). Internet filtering in China in 2004-2005: A country study. URL (last checked 15 November 2012). http://opennet.net/sites/opennet.net/files/ONI_China_Country_Study.pdf
[14] Qiang, X. (2006). Image of internet police: Jingjing and Chacha Online-Hong Yan. URL (last checked 17 November 2012). http://www.chinadigitaltimes.net/2006/01/image_of_internet_police_ jingjing_and_chacha_online_hon.php
[15] Reporters without Borders (2006). List of the 13 internet enemies. URL (last checked 16 November 2012). http://www.rsf.org/List-of-the-13-Internet-enemies.html
[16] Reporters without Borders (2009). 2009 Annual report: China. URL (last checked 16 November 2012). http://www.rsf.org/enrapport57-China.html
[17] State Council of China (2000). Measures for managing internet information services. URL (last checked 15 November 2012). http://www.lehmanlaw.com/resource-centre/laws-and-regulations/information-technology/measures-for-managing-internet-information-ser vices-2000.html.
[18] Tang, X. (2007). Why delete my blog articles? Chongqing Fazhi Ribao, 29 October 2007. URL (last checked 15 November 2012). http://blog.sina.com.cn/s/blog_3eba51c501000b7l.html
[19] Wu, V. (2009). Popular blog service provider shut down. South China Morning Post, 10 January 2009.
[20] Xinhua News Agency (2006). Cyber police in Shenzhen to curb on-line crimes. 15 May 2006. URL (last checked 15 November 2012). http://news.xinhuanet.com/english/2006-05/15/content_4547731.htm
[21] Zhao, Z. G. (2008). Development and administration of internet in China. URL (last checked 15 November 2012). http://www.china.org.cn/china/internetForum/2008-11/06/content_16719106.htm
[22] Zittrain, J., & Edelman, B. (2003). Empirical analysis of internet filtering in China. URL (last checked 15 November 2012). http://cyber.law.harvard.edu/filtering/china/