References

  • Asal, V., Mauslein, J., Murdie, A., Young, J., Cousins, K., & Bronk, C. (2016). Repression, Education, and Politically Motivated Cyberattacks. Journal of Global Security Studies, 1(3), 235–247. doi:10.1093/jogss/ogw006
  • Bagozzi, B. E., Berliner, D., & Welch, R. M. (2021). The Diversity of Repression: Measuring State Repressive Repertoires with Events Data. Journal of Peace Research, 58(5), 1126–1136. doi:10.1177/0022343320983424
  • Barlow, J. P. 1996. “A Declaration of the Independence of Cyberspace.”. Available at https://www.eff.org/de/cyberspace-independence.
  • Boschee, E., Lautenschlager, J., O‘Brien, S. Sean., Shellman, S., Starz, James, J., & Ward, M. (2015). “ICEWS Coded Event Data.”
  • CAIDA, UC San Diego. 2019. “Historical and Near-Real-Time UCSD Network Telescope Traffic Dataset.” Online resource, available at https://www.caida.org/data/passive/telescope-near-real-time_dataset.xml
  • Clark, D., & Regan, P. (2021). “Mass Mobilization Protest Data.” Online resource, Available at 10.7910/DVN/HTTWYL.
  • Coppedge, M., Gerring, J., Knutsen, C. H., Lindberg, S. I., Teorell, J., Altman, D., Bernhard, M., Fish, M. S., Glynn, A., & Hicken, A. (2020). V-Dem [Country-Year/Country-Date] Dataset V10. Gothenburg: Varieties of Democracy (V-Dem) Project.
  • Curtice, T. B., & Behlendorf, B. (2021). Street-level Repression: Protest, Policing, and Dissent in Uganda. Journal of Conflict Resolution, 65(1), 166–194. doi:10.1177/0022002720939304
  • Dainotti, A., Squarcella, C., Aben, E, Claffy, K. C., Chiesa, M., Russo, M., & Pescape, A. (2014). Analysis of Country-Wide Internet Outages Caused by Censorship. IEEE/ACM Transactions on Networking (TON), 22(6), 1964–1977. doi:10.1109/TNET.2013.2291244
  • Deibert, R., Palfrey, J., Rohozinski, R., & Zittrain, J. (2008). Access Denied: The Practice and Policy of Global Internet Filtering. Cambridge: MIT Press.
  • Diamond, L. (2010). Liberation Technology. Journal of Democracy, 21(3), 69–83. doi:10.1353/jod.0.0190
  • El-Baradei, M. 2011. “Wael Ghonim – Spokesman for a Revolution.” TIME Magazine April 21, 2011. Available at http://content.time.com/time/specials/packages/article/0,28804,2066367_2066369_2066437,00.html.
  • Filastò, A., & Appelbaum, J. (2012). OONI: Open Observatory of Network Interference 2nd USENIX Workshop on Free and Open Communications on the Internet (FOCI 12) . Bellevue, WA: USENIX Association https://www.usenix.org/conference/foci12/workshop-program/presentation/Filastò.
  • Friedrich, C. J., & Brzezinski, Z. K. (1965). Totalitarian Dictatorship. Cambridge, MA: Harvard UP.
  • Geddes, B., Wright, J. G., & Frantz, E. (2018). How Dictatorships Work: Power, Personalization, and Collapse. United Kingdom: Cambridge University Press.
  • Gohdes, A. R. (2015). Pulling the Plug: Network Disruptions and Violence in Civil Conflict. Journal of Peace Research, 52(3), 352–367. doi:10.1177/0022343314551398
  • Hardy, S., Crete-Nishihata, M., Kleemola, K., Senft, A., Sonne, B., Wiseman, G., Gill, P., & Deibert, R. J. 2014. Targeted Threat Index: Characterizing and Quantifying Politically-Motivated Targeted Malware. In 23rd USENIXSecurity Symposium (USENIX Security 14), San Diego, CA. pp. 527–541.
  • Hassanpour, N. (2014). Media Disruption and Revolutionary Unrest: Evidence From Mubarak’s Quasi-Experiment. Political Communication, 31(1), 1–24. doi:10.1080/10584609.2012.737439
  • Hellmeier, S. (2016). The Dictator’s Digital Toolkit: Explaining Variation in Internet Filtering in Authoritarian Regimes. Politics & Policy, 44(6), 1158–1191. doi:10.1111/polp.12189
  • Hobbs, W. R., & Roberts, M. E. (2018). How Sudden Censorship Can Increase Access to Information. American Political Science Review, 112(3), 621–636. doi:10.1017/S0003055418000084
  • Jagannathan, M. 2012. “DDoS Attacks Disable Independent News Sites during Russian Protests.” Available at https://blogs.harvard.edu/herdict/2012/06/14/ddos-attacks-disable-independent-news-sites-during-russian-protests/.
  • Kelly, S., Truong, M., Shahbaz, A., Earp, M., & White, J. (2017). “Freedom on the Net 2017 - Manipulating Social Media to Undermine Democracy.” Madeline Earp Jessica WhiteFreedom House.
  • Keremoğlu, E., Hellmeier, S. & Weidmann, N. B. (2022). Thin-skinned Leaders: Regime Legitimation, Protest Issues, and Repression in Autocracies. Political Science Research and Methods, 10(1), 136–152.
  • Keremoğlu, E., & Weidmann, N. B. (2020). How Dictators Control the Internet: A Review Essay. Comparative Political Studies, 53(10–11), 1690–1703. doi:10.1177/0010414020912278
  • Khrennikov, I., & Kudrytski, A. S. (2020). Tech Workers Flee Belarus As IT Haven Takes Authoritarian Turn. Bloomberg.com. Accessed 17 09 2020. https://www.bloomberg.com/news/articles/2020-09-05/belarus-protests-tech-workers-flee-as-country-takes-authoritarian-turn.
  • Lessig, L. 1997. “Tyranny in the Infrastructure.” Wired. Available at https://www.wired.com/1997/07/cyber-rights-8/.
  • Lutscher, P. M., Weidmann, N. B., Roberts, M. E., Jonker, M., Alistair King, A., & Dainotti, A. (2020). At Home and Abroad: The Use of Denial-of-Service Attacks during Elections in Nondemocratic Regimes. Journal of Conflict Resolution, 64(2–3), 373–401. doi:10.1177/0022002719861676
  • Marshall, M. G., & Ted Robert, G. K. J. 2019. “Polity IV Project: Political Regime Characteristics and Transitions, 1800-2018.” Online resource, Center for Systemic Peace.
  • Merkel, W. (2004). Embedded and Defective Democracies. Democratization, 11(5), 33–58. doi:10.1080/13510340412331304598
  • Moore, D., Shannon, C., Brown, D. J., Voelker, G. M., & Savage, S. (2006). Inferring Internet Denial-of-Service Activity. ACM Transactions on Computer Systems (TOCS), 24(2), 115–139. doi:10.1145/1132026.1132027
  • Morozov, E. (2011). The Net Delusion: The Dark Side of Internet Freedom. New York: PublicAffairs.
  • Nazario, J. (2009). Politically Motivated Denial of Service Attacks. In C. Czosseck & K., Geers (Eds.), The Virtual Battlefield: Perspectives on Cyber Warfare (pp. 163–181). Amsterdam: IOS Press.
  • Okunoye, B., Xynou, M., Evdokimov, L., Alabi, S., & Okoli, C. (2018). “Measuring Internet Censorship in Nigeria.” IEEE Internet Policy Newsletter. Available at https://internetinitiative.ieee.org/newsletter/december-2018/measuring-internet-censorship-in-nigeria.
  • OONI, Open Observatory of Network Interference. 2020a. “The Test List Methodology.”. Available at https://ooni.org/get-involved/contribute-test-lists/.
  • OONI, Open Observatory of Network Interference. 2020b. “Web Connectivity Test.”. Available at https://ooni.org/nettest/web-connectivity/.
  • Pop-Eleches, G., & Way, L. A. (2021). Censorship and the Impact of Repression on Dissent. American Journal of Political Science. EarlyView. Available at doi: 10.1111/ajps.12633.
  • Roberts, M. E. (2018). Censored: Distraction and Diversion Inside China’s Great Firewall. Princeton: Princeton University Press.
  • Roberts, M. E. (2020). Resilience to online censorship. Annual Review of Political Science, 23(1), 401–419. doi:10.1146/annurev-polisci-050718-032837
  • Siegel, D. A. (2011). When Does Repression Work? Collective Action and Social Networks. Journal of Politics 73(4).
  • Sundara Raman, R., Shenoy, P., Kohls, K., & Ensafi, R. (2020). Censored Planet: An Internet-Wide, Longitudinal Censorship Observatory. In Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security. CCS ’20 New York, NY, USA: Association for Computing Machinery pp. 49–66.
  • Svolik, M. W. (2012). The Politics of Authoritarian Rule. New York: Cambridge University Press.
  • Weidmann, N. B., Benitez-Baleato, S., Hunziker, P., Glatz, E., & Dimitropoulos, X. (2016). Digital Discrimination: Political Bias in Internet Service Provision Across Ethnic Groups. Science, 353(6304), 1151–1155. doi:10.1126/science.aaf5062
  • Wintrobe, R. (2000). The Political Economy of Dictatorship. Cambridge: Cambridge University Press.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.