Follow
Masashi Crete-Nishihata
Masashi Crete-Nishihata
Verified email at utoronto.ca
Title
Cited by
Cited by
Year
Global governance and the spread of cyberspace controls
RJ Deibert, M Crete-Nishihata
Global Governance 18, 339, 2012
1812012
Cyclones in cyberspace: Information shaping and denial in the 2008 Russia–Georgia war
RJ Deibert, R Rohozinski, M Crete-Nishihata
Security Dialogue 43 (1), 3-24, 2012
1662012
Reconstructing the past: personal memory technologies are not just personal and not just for memory
M Crete-Nishihata, RM Baecker, M Massimi, D Ptak, R Campigotto, ...
Human–Computer Interaction 27 (1-2), 92-123, 2012
1292012
The psychosocial impacts of multimedia biographies on persons with cognitive impairments
T Damianakis, M Crete-Nishihata, KL Smith, RM Baecker, E Marziali
The Gerontologist 50 (1), 23-35, 2009
1152009
Targeted Threat Index: Characterizing and Quantifying Politically-Motivated Targeted Malware
S Hardy, M Crete-Nishihata, K Kleemola, A Senft, B Sonne, G Wiseman, ...
USENIX Security, 2014
772014
One app, two systems: How wechat uses one censorship policy in china and another internationally
L Ruan, J Knockel, JQ Ng, M Crete-Nishihata
Citizen Lab, University of Toronto 29, 2017, 2016
652016
Multimedia biographies: A reminiscence and social stimulus tool for persons with cognitive impairment
KL Smith, M Crete-Nishihata, T Damianakis, RM Baecker, E Marziali
Journal of Technology in Human Services 27 (4), 287-306, 2009
642009
Censored contagion: how information on the coronavirus is managed on chinese social media
L Ruan, J Knockel, M Crete-Nishihata
632020
Characterizing web censorship worldwide: Another look at the opennet initiative data
P Gill, M Crete-Nishihata, J Dalek, S Goldberg, A Senft, G Wiseman
ACM Transactions on the Web (TWEB) 9 (1), 1-29, 2015
632015
A method for identifying and confirming the use of URL filtering products for censorship
J Dalek, B Haselton, H Noman, A Senft, M Crete-Nishihata, P Gill, ...
Proceedings of the 2013 conference on Internet measurement conference, 23-30, 2013
612013
Every Rose Has Its Thorn: Censorship and Surveillance on Social Video Platforms in China
J Knockel, M Crete-Nishihata, J Ng, A Senft, J Crandall
5th USENIX Workshop on Free and Open Communications on the Internet (FOCI 15), 2015
552015
How Great is the Great Firewall? Measuring China's DNS Censorship
NP Hoang, AA Niaki, J Dalek, J Knockel, P Lin, B Marczak, ...
arXiv preprint arXiv:2106.02167, 2021
522021
Chat Program Censorship and Surveillance in China: Tracking TOM-Skype and Sina UC
J Crandall, M Crete-Nishihata, J Knockel, S McKune, A Senft, D Tseng, ...
First Monday 18 (7), 2013
472013
Measuring Decentralization of Chinese Keyword Censorship via Mobile Games
J Knockel, L Ruan, M Crete-Nishihata
USENIX Free and Open Communications on the Internet, 2017
262017
Reckless Exploit: Mexican Journalists, Lawyers, and a Child Targeted with NSO Spyware
J Scott-Railton, B Marczak, BA Razzak, M Crete-Nishihata, R Deibert
Citizen Lab, University of Toronto 19, 2017
262017
Not By Technical Means Alone: The Multidisciplinary Challenge of Studying Information Controls
M Crete-Nishihata, R Deibert, A Senft
IEEE Internet Computing, 2013
242013
Planet blue coat: Mapping global censorship and surveillance tools
M Marquis-Boire, J Dalek, S McKune, M Carrieri, M Crete-Nishihata, ...
222013
Information control by public punishment: The logic of signalling repression in China
L Ruan, J Knockel, M Crete-Nishihata
China Information 35 (2), 133-157, 2021
182021
Forgive Us our SYNs: Technical and Ethical Considerations for Measuring Internet Filtering
J Crandall, M Crete-Nishihata, J Knockel
NS Ethics 2015, 2015
182015
The Information Security Cultures of Journalism
M Crete-Nishihata, J Oliver, C Parsons, D Walker, L Tsui, R Deibert
Digital Journalism 8 (8), 1068-1091, 2020
172020
The system can't perform the operation now. Try again later.
Articles 1–20