Hostname: page-component-8448b6f56d-wq2xx Total loading time: 0 Render date: 2024-04-18T04:04:09.870Z Has data issue: false hasContentIssue false

Authoritarianism Online: What Can We Learn from Internet Data in Nondemocracies?

Published online by Cambridge University Press:  28 March 2013

Sheena Chestnut Greitens*
Affiliation:
Harvard University

Extract

What kind of Internet data is generated in authoritarian political environments? And how can political scientists use that data to better understand the dynamics of nondemocratic regimes?

Type
Symposium: Technology, Data, and Politics
Copyright
Copyright © American Political Science Association 2013

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

REFERENCES

Aday, Sean, Farrell, Henry, Lynch, Marc, Sides, John, and Freelon, Deen. 2012. Blogs and Bullets II: New Media and Conflict after the Arab Spring. Washington, DC: United States Institute of Peace.Google Scholar
Aday, Sean, Farrell, Henry, Lynch, Marc, Sides, John, Kelly, John, and Zuckerman, Ethan. 2010. Blogs and Bullets: New Media in Contentious Politics. Washington, DC: United States Institute of Peace.Google Scholar
Allnut, Luke. 2011. “Forget the Nexus 7, Meet the Samjiyon, North Korea's Tablet.” Radio Free Europe, June 28.Google Scholar
Bamman, David, O'Connor, Brendan, and Smith, Noah A.. 2012. “Censorship and Deletion Practices in Chinese Social Media.” FirstMonday 17 (3). http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/viewArticle/3943/3169.Google Scholar
Barmé, Geremie, and Ye, Sang. 1997. “The Great Firewall of China.” Wired, June. http://www.wired.com/wired/archive/5.06/china.html.Google Scholar
Barnes, Julian E., Gorman, Siobhan, and Page, Jeremy. 2013. “U.S., China Ties Tested in Cyberspace.” Wall Street Journal, February 19.Google Scholar
Bellin, Eva. 2012. “Reconsidering the Robustness of Authoritarianism in the Middle East: Lessons from the Arab Spring.” Comparative Politics 44 (2): 127–49.CrossRefGoogle Scholar
Bruce, Scott. 2012a. “The Information Age: N. Korean Style.” The Diplomat, November 11.Google Scholar
Bruce, Scott Thomas. 2012b. “A Double-Edged Sword: Information Technology in North Korea.” Analysis from the East-West Center 105(October).Google Scholar
Bueno de Mesquita, Bruce, and Smith, Alastair. 2007. “Dimensions of Governance: A Selectorate Pilot Study.” http://alexanderhamilton.as.nyu.edu/page/pilotstudyGoogle Scholar
Cellphones No Signal of Reforms.” 2012. Radio Free Asia, January 19.Google Scholar
Chen, Cheng, Ko, Kyungmin, and Lee, Ji-Yong. 2010. “North Korea's Internet Strategy and its Political Implications.” The Pacific Review 23 (5): 649–70.CrossRefGoogle Scholar
Chen, Xiaoyan, and Ang, Peng Hwa. 2011. “Internet Police in China: Regulation, Scope and Myths.” In Online Society in China: Creating, Celebrating, and Instrumentalising the Online Carnival. ed. D. Herold and P. Marolt. New York: Routledge.Google Scholar
Chestnut, Sheena. 2007. “Illicit Activity and Proliferation.” International Security 32 (1): 80111.CrossRefGoogle Scholar
Choe, Sang-hun. 2012. “South Korean Law Casts Wide Net, Snaring Satirists in the Hunt for Spies.” New York Times, January 7.Google Scholar
Chung, Jongpil. 2008. “Comparing Online Activities in China and South Korea: The Internet and the Political Regime.” Asian Survey 48 (5): 727–51.CrossRefGoogle Scholar
Chung, Jongpil. 2011. “Weibo and ‘Iron Curtain 2.0’ in China: Who Is Winning the Cat-and-Mouse Game?” EAI Issue Briefing No. MASI 2011-07. December.Google Scholar
Clinton, Hillary Rodham. 2010. “Remarks on Internet Freedom.” Newseum, Washington, DC. January 21. http://www.state.gov/secretary/rm/2010/01/135519.html.Google Scholar
Collins, Robert. 2012. Marked for Life: Songbun, North Korea's Social Classification System. Committee on Human Rights in North Korea.Google Scholar
Dale, Helle C., and Zuckerman, Jessica. 2011. “U.S. Must Improve Internet Freedom Outreach Effort.” Washington, DC: Heritage Foundation, January 28.Google Scholar
Deibert, Ronald, Palfrey, John, Rohozinski, Rafal, and Zittrain, Jonathan. 2010. Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace. Cambridge, MA: MIT Press.CrossRefGoogle Scholar
Deibert, Ronald, Palfrey, John, Rohozinsky, Rafal, and Zittrain, Jonathan. 2008. Access Denied: The Practice and Policy of Global Internet Filtering. Cambridge, MA: MIT Press.CrossRefGoogle Scholar
Diamond, Larry. 2010. “Liberation Technology.” Journal of Democracy 21 (3): 6983.CrossRefGoogle Scholar
Drezner, Daniel W. 2010. “Weighing the Scales: The Internet's Effect on State-Society Relations.” Brown Journal of International Affairs 16 (2): 3144.Google Scholar
Edmond, Chris. 2012. “Information Manipulation, Coordination, and Regime Change.” Unpublished manuscript, July. http://www.chrisedmond.net/Edmond%20Information%20Manipulation%202012.pdf.CrossRefGoogle Scholar
Egorov, Georgy, Guriev, Sergei, and Sonin, Konstantin. 2009. “Why Resource-poor Dictators Allow Freer Media: A Theory and Evidence from Panel Data.” American Political Science Review 103 (4): 645–68.CrossRefGoogle Scholar
Esfandiari, Golnaz. 2010. “Misreading Tehran: The Twitter Devolution.” Foreign Policy, June 7.Google Scholar
Exclusive: Foreigners Now Permitted to Carry Mobile Phones in North Korea.” 2013. NK News, January 19.Google Scholar
Faris, David. 2008. “Revolutions Without Revolutionaries? Network Theory, Facebook, and the Egyptian Blogosphere.” Arab Media and Society 6.Google Scholar
Farrell, Tad. 2012. “Cell Phones in North Korea: Understanding the Boom,” NKNews, 16 November.Google Scholar
Fish, Isaac Stone, and Cathcart, Adam. 2012. “The Slick PR Stylings of Kim Jong Un.” Foreign Policy, July 11.Google Scholar
Fontaine, Richard, and Rogers, Will. 2011. Internet Freedom: A Foreign Policy Imperative in a Digital Age. Center for a New American Security. Washington, DC: Center for a New American Security.Google Scholar
Foreigners Visiting North Korea to Be Allowed to Bring Cellphones.” 2013. Xinhua/Global Times, January 21.Google Scholar
Freelon, Dan. 2011. “The MENA Protests on Twitter: Some Empirical Data.” http://dfreelon.org/2011/05/19/the-mena-protests-on-twitter-some-empirical-data/.Google Scholar
Fuller, Thomas, and Drew, Kevin. 2012. “Thai Message Board Manager is Given Suspended Prison Sentence.” New York Times, May 30.Google Scholar
Gause, Ken. 2012. Coercion, Control, Surveillance, and Punishment: An Examination of the North Korean Police State. Washington: Committee on Human Rights in North Korea.Google Scholar
Gladwell, Malcolm. 2010. “Small Change: Why the Revolution Won't be Tweeted.” New Yorker, October 4. http://www.newyorker.com/reporting/2010/10/04/101004fa_fact_gladwell.Google Scholar
Glionna, John M. 2012. “South Korea Security Law is Used to Silence Dissent, Critics Say.” Los Angeles Times, February 5.Google Scholar
Haggard, Stephan, Lee, Jennifer, and Noland, Marcus. 2012. “Integration in the Absence of Institutions: China-North Korea Cross-Border Exchange.” Journal of Asian Economies 23 (2): 130–45.CrossRefGoogle Scholar
Haggard, Stephan, and Noland, Marcus. 2008. “North Korea's Foreign Economic Relations.” International Relations of the Asia-Pacific 8: 219–46.CrossRefGoogle Scholar
Harwit, Eric, and Clark, Duncan. 2001. “Shaping the Internet in China: Evolution of Political Control over Network Infrastructure and Content.” Asian Survey 41 (3).CrossRefGoogle Scholar
Hassanpour, Navid. 2011. “Media Disruption Exacerbates Revolutionary Unrest: Evidence from Mubarak's Natural Experiment.” Paper prepared for the American Political Science Association Annual Meeting, Seattle, WA.Google Scholar
Heilmann, Sebastian, and Perry, Elizabeth J.. 2011. Mao's Invisible Hand: The Political Foundations of Adaptive Governance in China. Cambridge, MA: Harvard University Press.CrossRefGoogle Scholar
Herold, David Kurt, and Marolt, Peter. 2011. Online Society in China: Creating, Celebrating, and Instrumentalising the Online Carnival. New York: Routledge.CrossRefGoogle Scholar
Hounshell, Blake. 2011. “The Revolution Will Be Tweeted.” Foreign Policy, July/August.Google Scholar
How Widespread is Mobile Phone Use in North Korea?2012. Chosun Ilbo, April 23.Google Scholar
Howard, Phillip. 2010. The Digital Origins of Dictatorship and Democracy. Oxford: Oxford University Press.CrossRefGoogle Scholar
Howard, Philip N., and Hussain, Muzammil M.. 2011. “The Upheavals in Egypt and Tunisia: The Role of Digital Media.” Journal of Democracy 22 (3): 3548.CrossRefGoogle Scholar
Howard, Philip N., Duffy, Aiden, Freelon, Deen, Hussain, Muzammil, Mari, Will, and Mazaid, Marwa. 2011. “Opening Closed Regimes: What Was the Role of Social Media during the Arab Spring?” Seattle, WA: Project on Information Technology and Political Islam.CrossRefGoogle Scholar
Internet Freedom in Vietnam: An Odd Online Relationship.” 2012. The Economist, August 9.Google Scholar
Kalathil, Shanthi. 2010. Internet Freedom: A Background Paper. Aspen Institute International Digital Economy Accords Project. http://www.aspeninstitute.org/policy-work/communications-society/programs-topic/global-projects/idea/blog/internet-freedom-backgro.Google Scholar
Kalathil, Shanthi, and Boas, Taylor C.. 2003. Open Networks, Closed Regimes: The Impact of the Internet on Authoritarian Rule. Washington, DC: Carnegie Endowment for International Peace.Google Scholar
Kedzie, Christopher. 1997. Communication and Democracy: Coincident Revolution and the Emergent Dictator's Dilemma. Santa Monica, CA: RAND.Google Scholar
Kelly, Sanja, and Cook, Sarah. 2011. Freedom on the Net 2011: A Global Assessment of Internet and Digital Media. New York: Freedom House. www.freedomhouse.org/sites/default/files/FOTN2011.pdf.Google Scholar
Kern, Holger Lutz, and Hainmueller, Jens. 2009. “Opium for the Masses: How Foreign Media Can Stabilize Authoritarian Regimes.” Political Analysis 17: 377–99.CrossRefGoogle Scholar
Kim, Jong Un. 2012. “Speech on Land Management.” April.Google Scholar
Kim, Kwang-Jin. 2011. “The Defector's Tale: Inside North Korea's Secret Economy.” World Affairs Journal 174 (3): 3546.Google Scholar
Kim, Tae Hong. 2012. “No State Secrets on Koryolink!.” DailyNK, February 12.Google Scholar
Kim, Young-jin. 2012. “North Korean Students Get Rare Access to the Internet.” Korea Times, March 11.Google Scholar
King, Gary, Pan, Jennifer, and Roberts, Molly. 2012. “How Censorship in China Allows Government Criticism but Silences Collective Expression.” Paper prepared for the American Political Science Association Annual Meeting. New Orleans, LA: August.CrossRefGoogle Scholar
Kretchum, Nat, and Kim, Jane. 2012. A Quiet Opening: North Koreans in a Changing Media Environment. Washington, DC: Intermedia.Google Scholar
Lee, Dave. 2012. “North Korea: On the Net in the World's Most Secretive Nation,” BBC News, December 16.Google Scholar
Lee, Jean H. 2012. “Kim Blazes a Brand New Trail with His Rule.” Associated Press, July 18.Google Scholar
Levitsky, Steven, and Way, Lucan. 2010. Competitive Authoritarianism: Hybrid Regimes After the Cold War. Cambridge, MA: Cambridge University Press.CrossRefGoogle Scholar
Lynch, Marc. 2011. “After Egypt: The Limits and Promise of Online Challenges to the Authoritarian Arab State.” Perspectives on Politics 9 (2): 301–10.CrossRefGoogle Scholar
MacKinnon, Rebecca. 2009. “China's Censorship 2.0: How Companies Censor Bloggers.” First Monday 14 (2).Google Scholar
MacKinnon, Rebecca. 2011. “China's ‘Networked Authoritarianism.’Journal of Democracy 22 (2): 3246.CrossRefGoogle Scholar
MacKinnon, Rebecca. 2012. Consent of the Networked. New York: Basic Books.Google Scholar
Martin, Alexander. 2012. “Mobile Phones Proliferate in North Korea.” Wall Street Journal, July 28.Google Scholar
Meier, Patrick. 2011. “Do ‘Liberation Technologies’ Change the Balance of Power Between Repressive States and Civil Society?” PhD diss, Tufts University.Google Scholar
Mobile Phones in North Korea: Also Available to Earthlings.” 2012. The Economist, February 12.Google Scholar
Mozorov, Evgeny. 2011. The Net Delusion: The Dark Side of Internet Freedom. New York: Public Affairs.Google Scholar
Mozorov, Evgeny, and Howard, Philip N.. 2011. “Critical Dialogue.” Perspectives on Politics 9 (4): 895900.Google Scholar
Mozur, Paul. 2012. “China's Baidu Strikes Back against Web-Search Upstart.” Wall Street Journal, August 30.Google Scholar
News Summary: North Korea to Allow Mobile Internet for Foreigners; Citizens Won't Have Access.” 2013. Associated Press, 22 February.Google Scholar
Norris, Pippa. 2001. Digital Divide: Civic Engagement, Information Poverty, and the Internet Worldwide. New York: Cambridge University Press.CrossRefGoogle Scholar
One IP Address for All of PUST.” 2012. North Korea Tech, August 24. http://www.northkoreatech.org/2012/08/20/one-ip-address-for-all-of-pust/.Google Scholar
Palatino, Mong. 2012. “Malaysia's New Internet Law.” The Diplomat, August 30.Google Scholar
Park, Ju-Min. 2012. “University Brings Capitalism to Reclusive North Korea.” Reuters, August 4.Google Scholar
Park, Jun Hyeong, and Lee, Seok Young. 2011. “Phone Handset Prices Fall as Users Rise.” DailyNK, May 20.Google Scholar
Perry, Elizabeth J., and Goldman, Merle. 2007. Grassroots Political Reform in Contemporary China. Cambridge, MA: Harvard University Press.CrossRefGoogle Scholar
Qiang, Xiao. 2011. “The Battle for the Chinese Internet.” Journal of Democracy 22 (1): 4761.Google Scholar
Rahimi, Babak. 2011. “The Agonistic Social Media: Cyberspace in the Formation of Dissent and Consolidation of State Power in Postelection Iran.” The Communication Review 14 (3): 158–78.CrossRefGoogle Scholar
Ramstad, Evan. 2012. “Heads Up Android Fans: Here Comes North Korea.” Wall Street Journal, September 27. http://blogs.wsj.com/korearealtime/2012/09/27/heads-up-android-fans-here-comes-north-korea/.Google Scholar
Rogin, Josh. 2012. “Eric Schmidt: The Great Firewall of China Will Fall.” Foreign Policy, July 9.Google Scholar
Sanger, David E., Barboza, David, and Perlroth, Nicole. 2013. “Chinese Army Unit Is Seen as Tied to Hacking Against U.S.” New York Times, February 18.Google Scholar
Schmidt, Eric, and Cohen, Jared. 2010. “The Digital Disruption: Connectivity and the Diffusion of Power.” Foreign Affairs 89 (6): 7585.Google Scholar
Shen, Simon, and Breslin, Shaun. 2010. Online Chinese Nationalism and China's Bilateral Relations. Lanham, MD: Lexington Books.Google Scholar
South Korea.” 2012. OpenNet Initiative, August 6.Google Scholar
Sullivan, Andrew. 2009. “The Revolution Will Be Twittered.” The Atlantic, June 13.Google Scholar
Sullivan, Tim. 2012. “North Korea Cracks Down on Knowledge Smugglers,” ABC News, December 31.Google Scholar
Untitled.” 2012. Yonhap News Report, July 28.Google Scholar
Timmons, Heather. 2011. “India Asks Google, Facebook to Screen User Content.” New York Times, December 5. http://india.blogs.nytimes.com/2011/12/05/india-asks-google-facebook-others-to-screen-user-content/.Google Scholar
Weird but Wired.” 2007. The Economist, February 1.Google Scholar
Williams, Martyn. 2011. “Koryolink Hits a Million Subscribers.” North Korea Tech, February 3.Google Scholar
Williams, Martyn. 2012. “Orascom CEO Back in Pyongyang.” North Korea Tech, October 6.Google Scholar
Wilson, Christopher, and Dunn, Alexandra. 2011. “Digital Media in the Egyptian Revolution: Descriptive Analysis from the Tahrir Data Sets.” International Journal of Communication 5: 1248–72.Google Scholar
Wu, Guoguang. 2009. “In the Name of Good Governance: E-Government, Internet Pornography, and Political Censorship in China.” In China's Information and Communications Technology Revolution: Social Changes and State Responses, eds. Zhang, Xiaolong and Zheng, Yongnian, 6885. New York: Routledge.Google Scholar
Yang, Guobin. 2003. “The Internet and Civil Society in China: A Preliminary Assessment.” Journal of Contemporary China 12 (36): 453–75.CrossRefGoogle Scholar
Yang, Guobin. 2009. The Power of the Internet in China: Citizen Activism Online. New York: Columbia University Press.Google Scholar
Zhang, Xiaoling, and Zheng, Yongnian. 2009. China's Information and Communications Technology Revolution: Social Changes and State Responses. New York: Routledge.CrossRefGoogle Scholar
Zheng, Yongnian. 2008. Technological Empowerment: The Internet, State and Society in China. Stanford, CA: Stanford University Press.Google Scholar
Zheng, Yongnian. 2009. “The Political Cost of Information Control in China: The Nation-State and Governance.” In China's Information and Communications Technology Revolution: Social Changes and State Responses, eds. Zhang, Xiaolong and Zheng, Yongnian, 136–55. New York: Routledge.CrossRefGoogle Scholar
Zheng, Yongnian, and Fewsmith, Joseph. 2008. China's Open Society: The Non-State Sector and Governance. New York: Routledge.Google Scholar
Zhou, Yongming. 2005. “Living on the Cyber Border: ‘Minjian’ Political Writers in Chinese Cyberspace.” Current Anthropology 46 (5): 779803.Google Scholar
Zhou, Yongming. 2006. Historicizing Online Politics: Telegraphy, the Internet, and Political Participation in China. Palo Alto, CA: Stanford University Press.Google Scholar