SlideShare a Scribd company logo
Introduction Model Analysis Empirics Summary Appendix
Information and Communication Technologies,
Protests, and Censorship
Maxim Ananyev
University of Melbourne
Maria Petrova
University Pompeu Fabra and New Economic School
Dimitrios Xefteris
University of Cyprus
Galina Zudenkova
TU Dortmund University
Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
Introduction Model Analysis Empirics Summary Appendix Motivation Literature
Motivation
New communication technologies (Internet, online social
networks) can reduce the costs of collective action and pose a
threat to the stability of authoritarian regimes.
If new technologies indeed facilitate protests and revolutions,
can the regimes counteract it?
Do innovations in state censorship follow the innovations in
communication technologies?
Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
Introduction Model Analysis Empirics Summary Appendix Motivation Literature
Motivation
Advances in ICT (such as social media) played an important role
in protest movements in Egypt, Russia, China, and all over the
world.
Enikolopov et al. 2016; Acemoglu et al. 2018; Qin et al. 2017;
Steinert-Threlkeld et al. 2015; Aday et al. 2010; Frye et al. 2014.
However, improvements in communication technologies do not
necessarily lead to political changes.
E.g., no large-scale protests in Iran or Saudi Arabia despite the
fast growth of Internet and a quick increase of social media
penetration.
Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
Introduction Model Analysis Empirics Summary Appendix Motivation Literature
Motivation
Authoritarian regimes can counteract and use censorship techniques
(Morozov 2010, Esfandiari 2010, Guriev and Treisman 2015).
Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
Introduction Model Analysis Empirics Summary Appendix Motivation Literature
This paper
We develop a theoretical model of censorship where
new communication technologies might be used to organize
protests and revolutions;
these technologies allow for both spread of information and
coordination;
two types of censorship could be used by the government to
counteract:
content censorship (obfuscating news);
coordination censorship (temporary shutting down the channels
for coordination);
censorship costs can depend on its externalities on the production
sector of the economy (ICT intensity of the economy).
Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
Introduction Model Analysis Empirics Summary Appendix Motivation Literature
Our theory predicts that
New technologies hurt the chance of survival of authoritarian
governments, but less so in the economies with low ICT
intensity.
Less competent regimes are more likely to use coordination
censorship.
This effect is stronger in economies with low ICT intensity.
Intermediate-type regimes are more likely to use content
censorship.
Higher costs of staging protests lead to less censorship.
Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
Introduction Model Analysis Empirics Summary Appendix Motivation Literature
Empirically
We test the model predictions using high-frequency data.
We find that the within-country patterns of
DDoS attacks (our proxy for coordination censorship) and
VPN usage (our proxy for content censorship)
are consistent with the model predictions.
Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
Introduction Model Analysis Empirics Summary Appendix Motivation Literature
Literature
Models of state censorship under the threat of regime change
(Edmond 2013, Shadmehr and Bernhardt 2015, Redlicki 2016).
Neither of these papers considers coordination mechanism and
the possibility of coordination censorship.
Little (2015) considers coordination mechanism but no state
censorship (only partial equilibrium).
Empirical studies of state censorship are rare (King et al. 2013,
2014; Qin et al. 2016; Knight and Tribin 2016).
Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
Introduction Model Analysis Empirics Summary Appendix Outline Citizens Regime Censorship Timing
Model Outline
Consider an authoritarian regime and two representative citizens.
The regime wants to stay in power.
Each citizen decides independently and simultaneously
whether or not to participate in an upcoming uprising against the
regime,
and if so what tactic to use, tactic A or tactic B.
Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
Introduction Model Analysis Empirics Summary Appendix Outline Citizens Regime Censorship Timing
Model Outline
Tactic – any logistical details of the protest such as date, place,
strategy, maneuver, concessions, etc.
Neither the regime nor the citizens know what tactic is
successful, tactic A or tactic B.
They share a common prior that tactic A is successful with
probability p ∈ (0, 1).
Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
Introduction Model Analysis Empirics Summary Appendix Outline Citizens Regime Censorship Timing
Model Outline
The uprising succeeds and so the regime is overthrown if and
only if both citizens revolt using the successful tactic.
Otherwise, the protest fails and the regime stays in power.
It punishes the protestors severely (puts them in jail) if both
citizens take part in the uprising but fail to coordinate on the
successful tactic.
If only one citizen revolts then the regime introduces a less
severe punishment (Magaloni and Wallace 2008).
Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
Introduction Model Analysis Empirics Summary Appendix Outline Citizens Regime Censorship Timing
Citizens
The strategy space of each citizen: {PA, PB, NP}
(protest using tactic A, protest using tactic B, not protest).
γ > 0 – citizen’s cost of protesting.
Each citizen derives expected utility ∈ R in case of the regime
change,
and utility θ ∈ R in case of the regime survival.
θ – the regime’s competence.
If both citizens take part in the unsuccessful revolution, each
protestor incurs a large penalty cost κ ≥ κ > 0.
No penalty cost if only one citizen protests.
Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
Introduction Model Analysis Empirics Summary Appendix Outline Citizens Regime Censorship Timing
Citizens
Citizens’ payoffs:
PA PB NP
PA p + (1 − p) (θ − κ) −γ, θ − κ − γ, θ − γ,
p + (1 − p) (θ − κ) −γ θ − κ − γ θ
PB θ − κ − γ, p (θ − κ) + (1 − p) − γ, θ − γ,
θ − κ − γ p (θ − κ) + (1 − p) − γ θ
NP θ, θ, θ,
θ − γ θ − γ θ
The citizens share common priors about regime type θ ∼ f (·) and the
successful tactic, Pr (A is successful) = p.
Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
Introduction Model Analysis Empirics Summary Appendix Outline Citizens Regime Censorship Timing
Regime
The regime wants to survive and so maximizes the probability
that the protest fails.
It can use content and/or coordination censorship to strengthen
its chances of staying in power.
The regime knows its type θ.
It has a prior about the citizens’ expected utility from a new
government ∼ g (·).
Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
Introduction Model Analysis Empirics Summary Appendix Outline Citizens Regime Censorship Timing
Censorship
With probability 1 − q, mass media has no information about
regime type θ.
With probability q ∈ (0, 1), mass media has information about
regime type θ.
But the regime might censor, which leads to obfuscation.
Content censorship – the regime’s hidden action to prevent the
citizens from learning θ from the mass media.
c ≥ 0 – the regime’s cost of content censorship.
Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
Introduction Model Analysis Empirics Summary Appendix Outline Citizens Regime Censorship Timing
Censorship
The citizens obtain information about θ from the mass media if
the mass media has it and
the regime applies no content censorship.
Otherwise the citizens obtain no information about θ from the mass
media. Then
with probability r ∈ (0, 1), the citizens have no information
about θ,
but with probability 1 − r, the citizens still learn θ (e.g., from
international media).
Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
Introduction Model Analysis Empirics Summary Appendix Outline Citizens Regime Censorship Timing
Censorship
Information about successful tactic (A or B) is transmitted via
social media.
But the regime might censor social media.
Coordination censorship – the regime’s action to shut down the
social media and so prevent the citizens from learning the
successful tactic.
The citizens observe the regime’s choice of coordination
censorship.
d ≥ 0 – the regime’s cost of coordination censorship.
Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
Introduction Model Analysis Empirics Summary Appendix Outline Citizens Regime Censorship Timing
Timing
Nature randomly draws the regime type θ, citizens’ expected
utility from a new government and successful tactic of the
uprising (A or B) from the corresponding distributions.
The regime decides whether to apply content and/or coordination
censorship.
The citizens decide independently and simultaneously whether
or not to participate in the revolt, and if so what tactic to use.
The regime is either overthrown or not, and the citizens get their
corresponding payoffs.
Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
Introduction Model Analysis Empirics Summary Appendix Outline Citizens Regime Censorship Timing
Equilibrium Concept
Perfect Bayesian equilibrium:
the citizens’ beliefs about the regime type,
their protest participation decisions and tactic choices,
the regime’s censorship actions.
Equilibrium selection:
risk dominance criterion (see Harsanyi and Selten 1988).
WLG, assume that the successful tactic is A.
Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
Introduction Model Analysis Empirics Summary Appendix Citizens Regime Equilibrium Comparative Statics
Citizens’ Problem
If the regime uses coordination censorship then the citizens
do not protest.
Intuition.
They realize that without learning the tactic, they might fail to
coordinate during the uprising.
The regime would survive and punish them severely, which
implies low expected payoffs from protesting.
Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
Introduction Model Analysis Empirics Summary Appendix Citizens Regime Equilibrium Comparative Statics
Citizens’ Problem
If the regime does not apply coordination censorship then the
citizens’ decision about protesting is determined by the regime
competence (or the expectation of it).
If the citizens observe or expect that the regime is competent
enough then they do not protest.
Otherwise, they protest using the successful tactic learnt via
social media.
Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
Introduction Model Analysis Empirics Summary Appendix Citizens Regime Equilibrium Comparative Statics
Citizens’ Problem
Lemma
1 Suppose that the regime applies no coordination censorship and
the citizens observe θ.
They do not protest if θ ≥ − 2γ, and protest using tactic A
otherwise.
2 Suppose that the regime applies no coordination censorship and
the citizens do not observe θ.
They do not protest if E [θ|b] ≥ − 2γ, and protest using tactic A
otherwise;
b – the citizens’ beliefs about θ in this information set.
3 Suppose that the regime uses coordination censorship.
Then the citizens do not protest.
Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
Introduction Model Analysis Empirics Summary Appendix Citizens Regime Equilibrium Comparative Statics
Regime’s Problem
If the mass media has no information about regime type θ then:
No content censorship.
The regime decides whether or not to use coordination
censorship.
The regime’s expected utility:



1 − d if coordination censorship,
rG (E [θ|b] + 2γ) + (1 − r) G (θ + 2γ) otherwise,
G (·) – CDF of the regime’s prior about the citizens’ expected
utility from a new government .
Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
Introduction Model Analysis Empirics Summary Appendix Citizens Regime Equilibrium Comparative Statics
Regime’s Problem
If the mass media has information about regime type θ then:
The regime decides whether or not to use content and/or
coordination censorship.
The regime will not use both types of censorship simultaneously.
The regime’s expected utility:



1 − d if coordination censorship,
rG (E [θ|b] + 2γ) + (1 − r) G (θ + 2γ) − c if content censor.,
G (θ + 2γ) otherwise.
Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
Introduction Model Analysis Empirics Summary Appendix Citizens Regime Equilibrium Comparative Statics
Regime’s Problem
Theorem
For any parameter configuration, every equilibrium is characterized
by an ordered pair (θ , θ ) ∈ (R ∪ {−∞, +∞})2 with θ ≤ θ such
that
1. a regime of type θ ≤ θ opts for coordination censorship,
2. a regime of type θ < θ < θ uses content censorship,
3. and a regime of type θ ≥ θ applies no censorship.
This result specifies a unique order of censorship choices as a
function of θ.
Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
Introduction Model Analysis Empirics Summary Appendix Citizens Regime Equilibrium Comparative Statics
Equilibrium Characterization
We prove equilibrium existence and uniqueness for all
admissible parameters of the model.
While the order of censorship choices cannot be reversed in
equilibrium, it is possible that a particular type of censorship
does not occur in equilibrium.
Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
Introduction Model Analysis Empirics Summary Appendix Citizens Regime Equilibrium Comparative Statics
Equilibrium
The regime’s content obfuscation is effective in equilibrium.
The citizens cannot perfectly infer θ in the absence of a media
report.
The citizens play a coordination game.
This intensifies the effectiveness of censorship since the citizens’
actions are strategic complements.
Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
Introduction Model Analysis Empirics Summary Appendix Citizens Regime Equilibrium Comparative Statics
Comparative Statics
Assumption: regimes with higher ICT intensity face higher costs of
coord. censorship (Ackermann 2017).
Theorem
1. Less competent regimes are more likely to use coordination
censorship.
This effect is stronger in economies with low ICT intensity.
2. Intermediate-type regimes are more likely to use content
censorship.
3. Higher costs of staging protests lead to less overall censorship and,
in particular, less coordination censorship.
Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
Introduction Model Analysis Empirics Summary Appendix Strategy Data Empirical Results
Empirical Strategy
We test the model predictions using within-country data.
A conceptually novel approach.
Idea: relevant policy questions change often, even within a
country headed by the same government.
Assumption: each period, the government decides about
censorship and the citizens decide about protests ignoring
information on the government’s prior behavior because of
quickly changing environment.
It allows us to test the model predictions using high-frequency
within-country data on censorship.
Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
Introduction Model Analysis Empirics Summary Appendix Strategy Data Empirical Results
Data: Sovereign Bond Yields
We measure the quality of a regime by the sovereign bond yields
(daily data).
Those yields measure the financial market’s estimates of the
probability that a government will default on its obligations.
A useful operationalization of the concept of “regime quality”
from the model.
64 autocratic countries, Investing.com.
For most of the countries, we use yields of 10-year bonds (daily
data).
Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
Introduction Model Analysis Empirics Summary Appendix Strategy Data Empirical Results
Data: DDoS attacks
We use the data on Distributed Denial-of-Service attacks (DDoS
attacks) to measure coordination censorship (daily data).
DDoS attacks happen when a certain website is flooded by the
automated requests that exceed the website’s capacity, and the
website temporarily goes down.
Daily data on attacks that happened between June 1, 2013 (when
the website was launched) until Feb 28, 2015.
We control for other reasons (apart from coordination
censorship) that make DDoS attacks more likely: level of GDP
per capita, a share of people having access to Internet and Polity
2 score.
Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
Introduction Model Analysis Empirics Summary Appendix Strategy Data Empirical Results
Data: DDoS attacks
Website Digital Attack Map – a collaboration between Google Ideas
and a software security firm Arbor Networks.
Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
Introduction Model Analysis Empirics Summary Appendix Strategy Data Empirical Results
Data: DDoS attacks
Adjusted for the regime type, level of economic development and
Internet penetration, Freedom of the Net scores are positively
correlated with the number of DDoS attacks.
Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
Introduction Model Analysis Empirics Summary Appendix Strategy Data Empirical Results
Data: DDoS attacks
After the adjustment for GDP, Internet penetration and regime type,
higher number of DDoS attacks is associated with higher levels of
political filtering.
Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
Introduction Model Analysis Empirics Summary Appendix Strategy Data Empirical Results
Data: VPN services
We employ data on the usage of VPN services as a proxy of
content censorship (quarterly data).
People use VPN services to access prohibited content.
globalwebindex.net
VPN quality is unstable and VPNs slow down already imperfect
speed of the Internet
⇒ it allows the citizens to eventually get access to censored
information, but does not allow its users to smoothly and quickly
coordinate their collective action.
Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
Introduction Model Analysis Empirics Summary Appendix Strategy Data Empirical Results
Data: Snow and ICT
We use the indicator for snow as a proxy for cost of protest (daily
data).
wunderground.com.
We use data on ICT intensity of the economy.
Country-level ICT intensity is calculated from the employment
data from UNIDO, and industry-level ICT intensity of the US
industries from the Wall Street Journal.
Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
Introduction Model Analysis Empirics Summary Appendix Strategy Data Empirical Results
Coordination Censorship and Regime Competence
Sovereign Bond Yield and DDoS Attacks: Daily Data.
One percent increase in sovereign yield is associated with 2
percentage point increase in the daily risk of a DDoS attack.
Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
Introduction Model Analysis Empirics Summary Appendix Strategy Data Empirical Results
Coordination Censorship and Regime Competence
Competence-censorship effect is stronger in economies with low ICT
intensity.
Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
Introduction Model Analysis Empirics Summary Appendix Strategy Data Empirical Results
Coordination Censorship and Costs of Protest
Snow and DDoS Attacks: Daily Data.
An instance of snow is associated with the decrease of the probability
of a DDoS attack by 4-6 percentage points.
Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
Introduction Model Analysis Empirics Summary Appendix Strategy Data Empirical Results
Content Censorship and Regime Competence
Sovereign Bond Yield and VPN Usage: Quarterly Data.
The signs are consistent with the theory but the results are noisy.
Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
Introduction Model Analysis Empirics Summary Appendix Strategy Data Empirical Results
Content Censorship and Cost of Protests
Snow and VPN Usage: Quarterly Data.
Results are not driven by northern countries like Russia, but rather by
the incidence of snow in southern countries like Turkey, Iran, Mexico.
Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
Introduction Model Analysis Empirics Summary Appendix
Summary
We contribute to the literature on regime change by
differentiating between two types of state censorship:
coordination censorship (which prevents people from
coordinating an anti-regime collective action),
and content censorship (which prevents people from learning
about the regime quality).
We develop a model that explicitly considers the regime’s choice
of censorship type.
The model generates predictions that relate the choice of
censorship to the costs of protests and the regime quality.
Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
Introduction Model Analysis Empirics Summary Appendix
Summary
We test the model predictions and find that they are corroborated by
the data:
coordination censorship is used by less competent governments;
this effect is stronger in countries with low ICT intensity;
content censorship is used by intermediate-type governments;
higher costs of protests are associated with less censorship.
Clear prediction for future political dynamics of authoritarian
regimes:
As ICT intensity of the economy increases, the regime might find it
more costly to use censorship to suppress coordination.
Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
Introduction Model Analysis Empirics Summary Appendix Literature Equilibrium
Literature
Informational cascades:
Bikhchandani, Hirshleifer and Welch (1992),
Lohmann (1994, 2000).
Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
Introduction Model Analysis Empirics Summary Appendix Literature Equilibrium
Equilibrium Characterization
For the sake of tractability, we focus on a simpler case c = 0.
We prove equilibrium existence and uniqueness for all
admissible parameters of the model.
θ1 ∈ R – a regime type indifferent between coord. and no
censorship when the mass media has no info about θ, and
between coord. and content censorship when the mass media has
info about θ:
1 − d = rG (E [θ|b] + 2γ) + (1 − r) G (θ1 + 2γ) .
θ2 ∈ R – a regime type indifferent between content and no
censorship when the mass media has info about θ:
θ2 = E [θ|b] .
Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
Introduction Model Analysis Empirics Summary Appendix Literature Equilibrium
Belief Updating
E [θ|b]?
The citizens do not observe θ but know that the regime doesn’t
use coord. censorship.
They realize that either
1 the media has no info about θ and the regime doesn’t censor ⇒
the regime is of type θ > θ1, or
2 the media has info about θ and the regime censors content ⇒ the
regime is of type θ1 < θ < θ2.
The media has info about θ with probability q ⇒
E [θ|b] =
(1−q) +∞
θ1
zf(z)dz+q
θ2
θ1
zf(z)dz
(1−q)(1−F(θ1))+q(F(θ2)−F(θ1)).
Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship

More Related Content

Similar to Information and Communication Technologies, Protests, and Censorship

Changing the pattern of unrest: Social media and social networks in the UK riots
Changing the pattern of unrest: Social media and social networks in the UK riotsChanging the pattern of unrest: Social media and social networks in the UK riots
Changing the pattern of unrest: Social media and social networks in the UK riots
Bodyspacesociety Blog
 
Social Media Construction in Egypt Uprising
Social Media Construction in Egypt UprisingSocial Media Construction in Egypt Uprising
Social Media Construction in Egypt UprisingMantas Aleksiejevas
 
04 e genderresponsiveearlywarning
04 e genderresponsiveearlywarning04 e genderresponsiveearlywarning
04 e genderresponsiveearlywarningDr Lendy Spires
 
Techno-government networks: Actor-Network Theory in electronic government res...
Techno-government networks: Actor-Network Theory in electronic government res...Techno-government networks: Actor-Network Theory in electronic government res...
Techno-government networks: Actor-Network Theory in electronic government res...
FGV Brazil
 
Framework Design for Operational Scenario-based Emergency Response System
Framework Design for Operational Scenario-based Emergency Response SystemFramework Design for Operational Scenario-based Emergency Response System
Framework Design for Operational Scenario-based Emergency Response System
streamspotter
 
Assignment 1 LASA 2 Monitoring Our Home PlanetThe Internet i.docx
Assignment 1 LASA 2 Monitoring Our Home PlanetThe Internet i.docxAssignment 1 LASA 2 Monitoring Our Home PlanetThe Internet i.docx
Assignment 1 LASA 2 Monitoring Our Home PlanetThe Internet i.docx
daniatrappit
 
The Internet is a powerful tool that provides the ability to monit.docx
The Internet is a powerful tool that provides the ability to monit.docxThe Internet is a powerful tool that provides the ability to monit.docx
The Internet is a powerful tool that provides the ability to monit.docx
mallisonshavon
 
The Internet is a powerful tool that provides the ability to monitor.docx
The Internet is a powerful tool that provides the ability to monitor.docxThe Internet is a powerful tool that provides the ability to monitor.docx
The Internet is a powerful tool that provides the ability to monitor.docx
jmindy
 
Digital Authoritarianism: Implications, Ethics, and Safegaurds
Digital Authoritarianism: Implications, Ethics, and SafegaurdsDigital Authoritarianism: Implications, Ethics, and Safegaurds
Digital Authoritarianism: Implications, Ethics, and Safegaurds
Andy Aukerman
 
A governance perspective on user acceptance of autonomous systems in Singapore
A governance perspective on user acceptance of autonomous systems in SingaporeA governance perspective on user acceptance of autonomous systems in Singapore
A governance perspective on user acceptance of autonomous systems in Singapore
Araz Taeihagh
 
The Internet is a powerful tool that provides the ability to monitor.docx
The Internet is a powerful tool that provides the ability to monitor.docxThe Internet is a powerful tool that provides the ability to monitor.docx
The Internet is a powerful tool that provides the ability to monitor.docx
mallisonshavon
 
Accident Analysis Models And Methods Guidance For Safety Professionals
Accident Analysis Models And Methods  Guidance For Safety ProfessionalsAccident Analysis Models And Methods  Guidance For Safety Professionals
Accident Analysis Models And Methods Guidance For Safety Professionals
Leslie Schulte
 
Politics and technology presentation
Politics and technology presentationPolitics and technology presentation
Politics and technology presentation
Mario Rance
 
Running head USING IT TO MODEL BEHAVIOR FOR POLICY MAKING .docx
Running head USING IT TO MODEL BEHAVIOR FOR POLICY MAKING        .docxRunning head USING IT TO MODEL BEHAVIOR FOR POLICY MAKING        .docx
Running head USING IT TO MODEL BEHAVIOR FOR POLICY MAKING .docx
jenkinsmandie
 
The Internet is a powerful tool that provides the ability to monitor.docx
The Internet is a powerful tool that provides the ability to monitor.docxThe Internet is a powerful tool that provides the ability to monitor.docx
The Internet is a powerful tool that provides the ability to monitor.docx
armitageclaire49
 
Internet use in Social Activism in Taiwan, 2014 ISA Congress, Yokohama
Internet use in Social Activism in Taiwan,  2014 ISA Congress, YokohamaInternet use in Social Activism in Taiwan,  2014 ISA Congress, Yokohama
Internet use in Social Activism in Taiwan, 2014 ISA Congress, Yokohama
Albert Tzeng
 
The Internet is a powerful tool that provides the ability to mon.docx
The Internet is a powerful tool that provides the ability to mon.docxThe Internet is a powerful tool that provides the ability to mon.docx
The Internet is a powerful tool that provides the ability to mon.docx
laurieellan
 
“Un modelo basado en agentes para el estudio de la actividad en redes sociale...
“Un modelo basado en agentes para el estudio de la actividad en redes sociale...“Un modelo basado en agentes para el estudio de la actividad en redes sociale...
“Un modelo basado en agentes para el estudio de la actividad en redes sociale...
Complejidady Economía
 
The Internet is a powerful tool that provides the ability to monitor.docx
The Internet is a powerful tool that provides the ability to monitor.docxThe Internet is a powerful tool that provides the ability to monitor.docx
The Internet is a powerful tool that provides the ability to monitor.docx
laurieellan
 
Social Media and Forced Displacement: Big Data Analytics and Machine Learning...
Social Media and Forced Displacement: Big Data Analytics and Machine Learning...Social Media and Forced Displacement: Big Data Analytics and Machine Learning...
Social Media and Forced Displacement: Big Data Analytics and Machine Learning...
UN Global Pulse
 

Similar to Information and Communication Technologies, Protests, and Censorship (20)

Changing the pattern of unrest: Social media and social networks in the UK riots
Changing the pattern of unrest: Social media and social networks in the UK riotsChanging the pattern of unrest: Social media and social networks in the UK riots
Changing the pattern of unrest: Social media and social networks in the UK riots
 
Social Media Construction in Egypt Uprising
Social Media Construction in Egypt UprisingSocial Media Construction in Egypt Uprising
Social Media Construction in Egypt Uprising
 
04 e genderresponsiveearlywarning
04 e genderresponsiveearlywarning04 e genderresponsiveearlywarning
04 e genderresponsiveearlywarning
 
Techno-government networks: Actor-Network Theory in electronic government res...
Techno-government networks: Actor-Network Theory in electronic government res...Techno-government networks: Actor-Network Theory in electronic government res...
Techno-government networks: Actor-Network Theory in electronic government res...
 
Framework Design for Operational Scenario-based Emergency Response System
Framework Design for Operational Scenario-based Emergency Response SystemFramework Design for Operational Scenario-based Emergency Response System
Framework Design for Operational Scenario-based Emergency Response System
 
Assignment 1 LASA 2 Monitoring Our Home PlanetThe Internet i.docx
Assignment 1 LASA 2 Monitoring Our Home PlanetThe Internet i.docxAssignment 1 LASA 2 Monitoring Our Home PlanetThe Internet i.docx
Assignment 1 LASA 2 Monitoring Our Home PlanetThe Internet i.docx
 
The Internet is a powerful tool that provides the ability to monit.docx
The Internet is a powerful tool that provides the ability to monit.docxThe Internet is a powerful tool that provides the ability to monit.docx
The Internet is a powerful tool that provides the ability to monit.docx
 
The Internet is a powerful tool that provides the ability to monitor.docx
The Internet is a powerful tool that provides the ability to monitor.docxThe Internet is a powerful tool that provides the ability to monitor.docx
The Internet is a powerful tool that provides the ability to monitor.docx
 
Digital Authoritarianism: Implications, Ethics, and Safegaurds
Digital Authoritarianism: Implications, Ethics, and SafegaurdsDigital Authoritarianism: Implications, Ethics, and Safegaurds
Digital Authoritarianism: Implications, Ethics, and Safegaurds
 
A governance perspective on user acceptance of autonomous systems in Singapore
A governance perspective on user acceptance of autonomous systems in SingaporeA governance perspective on user acceptance of autonomous systems in Singapore
A governance perspective on user acceptance of autonomous systems in Singapore
 
The Internet is a powerful tool that provides the ability to monitor.docx
The Internet is a powerful tool that provides the ability to monitor.docxThe Internet is a powerful tool that provides the ability to monitor.docx
The Internet is a powerful tool that provides the ability to monitor.docx
 
Accident Analysis Models And Methods Guidance For Safety Professionals
Accident Analysis Models And Methods  Guidance For Safety ProfessionalsAccident Analysis Models And Methods  Guidance For Safety Professionals
Accident Analysis Models And Methods Guidance For Safety Professionals
 
Politics and technology presentation
Politics and technology presentationPolitics and technology presentation
Politics and technology presentation
 
Running head USING IT TO MODEL BEHAVIOR FOR POLICY MAKING .docx
Running head USING IT TO MODEL BEHAVIOR FOR POLICY MAKING        .docxRunning head USING IT TO MODEL BEHAVIOR FOR POLICY MAKING        .docx
Running head USING IT TO MODEL BEHAVIOR FOR POLICY MAKING .docx
 
The Internet is a powerful tool that provides the ability to monitor.docx
The Internet is a powerful tool that provides the ability to monitor.docxThe Internet is a powerful tool that provides the ability to monitor.docx
The Internet is a powerful tool that provides the ability to monitor.docx
 
Internet use in Social Activism in Taiwan, 2014 ISA Congress, Yokohama
Internet use in Social Activism in Taiwan,  2014 ISA Congress, YokohamaInternet use in Social Activism in Taiwan,  2014 ISA Congress, Yokohama
Internet use in Social Activism in Taiwan, 2014 ISA Congress, Yokohama
 
The Internet is a powerful tool that provides the ability to mon.docx
The Internet is a powerful tool that provides the ability to mon.docxThe Internet is a powerful tool that provides the ability to mon.docx
The Internet is a powerful tool that provides the ability to mon.docx
 
“Un modelo basado en agentes para el estudio de la actividad en redes sociale...
“Un modelo basado en agentes para el estudio de la actividad en redes sociale...“Un modelo basado en agentes para el estudio de la actividad en redes sociale...
“Un modelo basado en agentes para el estudio de la actividad en redes sociale...
 
The Internet is a powerful tool that provides the ability to monitor.docx
The Internet is a powerful tool that provides the ability to monitor.docxThe Internet is a powerful tool that provides the ability to monitor.docx
The Internet is a powerful tool that provides the ability to monitor.docx
 
Social Media and Forced Displacement: Big Data Analytics and Machine Learning...
Social Media and Forced Displacement: Big Data Analytics and Machine Learning...Social Media and Forced Displacement: Big Data Analytics and Machine Learning...
Social Media and Forced Displacement: Big Data Analytics and Machine Learning...
 

More from Stockholm Institute of Transition Economics

IT sector development fading | Belarus Conference in Stockholm
IT sector development fading | Belarus Conference in StockholmIT sector development fading | Belarus Conference in Stockholm
IT sector development fading | Belarus Conference in Stockholm
Stockholm Institute of Transition Economics
 
Corisk Sanctions of Russia | Belarus Conference in Stockholm
Corisk Sanctions of Russia | Belarus Conference in StockholmCorisk Sanctions of Russia | Belarus Conference in Stockholm
Corisk Sanctions of Russia | Belarus Conference in Stockholm
Stockholm Institute of Transition Economics
 
Selected Economic Effects of Sanctions | Belarus Conference in Stockholm
Selected Economic Effects of Sanctions | Belarus Conference in StockholmSelected Economic Effects of Sanctions | Belarus Conference in Stockholm
Selected Economic Effects of Sanctions | Belarus Conference in Stockholm
Stockholm Institute of Transition Economics
 
Belarusian Economy 2024 | Conference in Stockholm
Belarusian Economy 2024 | Conference in StockholmBelarusian Economy 2024 | Conference in Stockholm
Belarusian Economy 2024 | Conference in Stockholm
Stockholm Institute of Transition Economics
 
Tracking sanctions compliance | SITE 2023 Development Day conference
Tracking sanctions compliance | SITE 2023 Development Day conferenceTracking sanctions compliance | SITE 2023 Development Day conference
Tracking sanctions compliance | SITE 2023 Development Day conference
Stockholm Institute of Transition Economics
 
War and Trade in Eurasia | SITE 2023 Development Day conference
War and Trade in Eurasia | SITE 2023 Development Day conferenceWar and Trade in Eurasia | SITE 2023 Development Day conference
War and Trade in Eurasia | SITE 2023 Development Day conference
Stockholm Institute of Transition Economics
 
Reducing the Russian Economic Capacity and support Ukraine
Reducing the Russian Economic Capacity and support UkraineReducing the Russian Economic Capacity and support Ukraine
Reducing the Russian Economic Capacity and support Ukraine
Stockholm Institute of Transition Economics
 
Energy sanctions - What else can be done?
Energy sanctions - What else can be done?Energy sanctions - What else can be done?
Energy sanctions - What else can be done?
Stockholm Institute of Transition Economics
 
How should policy be designed during energy-economic warfare?
How should policy be designed during energy-economic warfare?How should policy be designed during energy-economic warfare?
How should policy be designed during energy-economic warfare?
Stockholm Institute of Transition Economics
 
The impact of the war on Russia’s fossil fuel earnings
The impact of the war on Russia’s fossil fuel earningsThe impact of the war on Russia’s fossil fuel earnings
The impact of the war on Russia’s fossil fuel earnings
Stockholm Institute of Transition Economics
 
The Russia sanctions as a human rights instrument: Violations of export contr...
The Russia sanctions as a human rights instrument: Violations of export contr...The Russia sanctions as a human rights instrument: Violations of export contr...
The Russia sanctions as a human rights instrument: Violations of export contr...
Stockholm Institute of Transition Economics
 
SITE 2022 Development Day conference program
SITE 2022 Development Day conference programSITE 2022 Development Day conference program
SITE 2022 Development Day conference program
Stockholm Institute of Transition Economics
 
SITE 2022 Development Day conference | Program
SITE 2022 Development Day conference | ProgramSITE 2022 Development Day conference | Program
SITE 2022 Development Day conference | Program
Stockholm Institute of Transition Economics
 
Program | SITE 2022 Development Day conference
Program | SITE 2022 Development Day conferenceProgram | SITE 2022 Development Day conference
Program | SITE 2022 Development Day conference
Stockholm Institute of Transition Economics
 
Ce^2 Conference 2022 Programme
Ce^2 Conference 2022 ProgrammeCe^2 Conference 2022 Programme
Ce^2 Conference 2022 Programme
Stockholm Institute of Transition Economics
 
Ce2 Worksop & Conference 2022 Program
Ce2 Worksop & Conference 2022 ProgramCe2 Worksop & Conference 2022 Program
Ce2 Worksop & Conference 2022 Program
Stockholm Institute of Transition Economics
 
Ce^2 Conference 2022 Program
Ce^2 Conference 2022 ProgramCe^2 Conference 2022 Program
Ce^2 Conference 2022 Program
Stockholm Institute of Transition Economics
 
(Ce)2 Workshop program (preliminary)
(Ce)2 Workshop program (preliminary)(Ce)2 Workshop program (preliminary)
(Ce)2 Workshop program (preliminary)
Stockholm Institute of Transition Economics
 
Unemployment and Intra-Household Dynamics: the Effect of Male Job Loss on Int...
Unemployment and Intra-Household Dynamics: the Effect of Male Job Loss on Int...Unemployment and Intra-Household Dynamics: the Effect of Male Job Loss on Int...
Unemployment and Intra-Household Dynamics: the Effect of Male Job Loss on Int...
Stockholm Institute of Transition Economics
 
Football, Alcohol and Domestic Abuse
Football, Alcohol and Domestic AbuseFootball, Alcohol and Domestic Abuse
Football, Alcohol and Domestic Abuse
Stockholm Institute of Transition Economics
 

More from Stockholm Institute of Transition Economics (20)

IT sector development fading | Belarus Conference in Stockholm
IT sector development fading | Belarus Conference in StockholmIT sector development fading | Belarus Conference in Stockholm
IT sector development fading | Belarus Conference in Stockholm
 
Corisk Sanctions of Russia | Belarus Conference in Stockholm
Corisk Sanctions of Russia | Belarus Conference in StockholmCorisk Sanctions of Russia | Belarus Conference in Stockholm
Corisk Sanctions of Russia | Belarus Conference in Stockholm
 
Selected Economic Effects of Sanctions | Belarus Conference in Stockholm
Selected Economic Effects of Sanctions | Belarus Conference in StockholmSelected Economic Effects of Sanctions | Belarus Conference in Stockholm
Selected Economic Effects of Sanctions | Belarus Conference in Stockholm
 
Belarusian Economy 2024 | Conference in Stockholm
Belarusian Economy 2024 | Conference in StockholmBelarusian Economy 2024 | Conference in Stockholm
Belarusian Economy 2024 | Conference in Stockholm
 
Tracking sanctions compliance | SITE 2023 Development Day conference
Tracking sanctions compliance | SITE 2023 Development Day conferenceTracking sanctions compliance | SITE 2023 Development Day conference
Tracking sanctions compliance | SITE 2023 Development Day conference
 
War and Trade in Eurasia | SITE 2023 Development Day conference
War and Trade in Eurasia | SITE 2023 Development Day conferenceWar and Trade in Eurasia | SITE 2023 Development Day conference
War and Trade in Eurasia | SITE 2023 Development Day conference
 
Reducing the Russian Economic Capacity and support Ukraine
Reducing the Russian Economic Capacity and support UkraineReducing the Russian Economic Capacity and support Ukraine
Reducing the Russian Economic Capacity and support Ukraine
 
Energy sanctions - What else can be done?
Energy sanctions - What else can be done?Energy sanctions - What else can be done?
Energy sanctions - What else can be done?
 
How should policy be designed during energy-economic warfare?
How should policy be designed during energy-economic warfare?How should policy be designed during energy-economic warfare?
How should policy be designed during energy-economic warfare?
 
The impact of the war on Russia’s fossil fuel earnings
The impact of the war on Russia’s fossil fuel earningsThe impact of the war on Russia’s fossil fuel earnings
The impact of the war on Russia’s fossil fuel earnings
 
The Russia sanctions as a human rights instrument: Violations of export contr...
The Russia sanctions as a human rights instrument: Violations of export contr...The Russia sanctions as a human rights instrument: Violations of export contr...
The Russia sanctions as a human rights instrument: Violations of export contr...
 
SITE 2022 Development Day conference program
SITE 2022 Development Day conference programSITE 2022 Development Day conference program
SITE 2022 Development Day conference program
 
SITE 2022 Development Day conference | Program
SITE 2022 Development Day conference | ProgramSITE 2022 Development Day conference | Program
SITE 2022 Development Day conference | Program
 
Program | SITE 2022 Development Day conference
Program | SITE 2022 Development Day conferenceProgram | SITE 2022 Development Day conference
Program | SITE 2022 Development Day conference
 
Ce^2 Conference 2022 Programme
Ce^2 Conference 2022 ProgrammeCe^2 Conference 2022 Programme
Ce^2 Conference 2022 Programme
 
Ce2 Worksop & Conference 2022 Program
Ce2 Worksop & Conference 2022 ProgramCe2 Worksop & Conference 2022 Program
Ce2 Worksop & Conference 2022 Program
 
Ce^2 Conference 2022 Program
Ce^2 Conference 2022 ProgramCe^2 Conference 2022 Program
Ce^2 Conference 2022 Program
 
(Ce)2 Workshop program (preliminary)
(Ce)2 Workshop program (preliminary)(Ce)2 Workshop program (preliminary)
(Ce)2 Workshop program (preliminary)
 
Unemployment and Intra-Household Dynamics: the Effect of Male Job Loss on Int...
Unemployment and Intra-Household Dynamics: the Effect of Male Job Loss on Int...Unemployment and Intra-Household Dynamics: the Effect of Male Job Loss on Int...
Unemployment and Intra-Household Dynamics: the Effect of Male Job Loss on Int...
 
Football, Alcohol and Domestic Abuse
Football, Alcohol and Domestic AbuseFootball, Alcohol and Domestic Abuse
Football, Alcohol and Domestic Abuse
 

Recently uploaded

HOW TO USE FACEBOOK _ by Clarissa Credito
HOW TO USE FACEBOOK _ by Clarissa CreditoHOW TO USE FACEBOOK _ by Clarissa Credito
HOW TO USE FACEBOOK _ by Clarissa Credito
ClarissaAlanoCredito
 
HOW TO USE THREADS an Instagram App_ by Clarissa Credito
HOW TO USE THREADS an Instagram App_ by Clarissa CreditoHOW TO USE THREADS an Instagram App_ by Clarissa Credito
HOW TO USE THREADS an Instagram App_ by Clarissa Credito
ClarissaAlanoCredito
 
Transform Your Presence Now!..............
Transform Your Presence Now!..............Transform Your Presence Now!..............
Transform Your Presence Now!..............
SocioCosmos
 
Your Path to YouTube Stardom Starts Here
Your Path to YouTube Stardom Starts HereYour Path to YouTube Stardom Starts Here
Your Path to YouTube Stardom Starts Here
SocioCosmos
 
Exploring The Dimensions and Dynamics of Felt Obligation: A Bibliometric Anal...
Exploring The Dimensions and Dynamics of Felt Obligation: A Bibliometric Anal...Exploring The Dimensions and Dynamics of Felt Obligation: A Bibliometric Anal...
Exploring The Dimensions and Dynamics of Felt Obligation: A Bibliometric Anal...
AJHSSR Journal
 
Buy Pinterest Followers, Reactions & Repins Go Viral on Pinterest with Socio...
Buy Pinterest Followers, Reactions & Repins  Go Viral on Pinterest with Socio...Buy Pinterest Followers, Reactions & Repins  Go Viral on Pinterest with Socio...
Buy Pinterest Followers, Reactions & Repins Go Viral on Pinterest with Socio...
SocioCosmos
 
SluggerPunk Angel Investor Final Proposal
SluggerPunk Angel Investor Final ProposalSluggerPunk Angel Investor Final Proposal
SluggerPunk Angel Investor Final Proposal
grogshiregames
 
快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样
快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样
快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样
ryxqoswi
 
Grow Your Reddit Community Fast.........
Grow Your Reddit Community Fast.........Grow Your Reddit Community Fast.........
Grow Your Reddit Community Fast.........
SocioCosmos
 
Your LinkedIn Success Starts Here.......
Your LinkedIn Success Starts Here.......Your LinkedIn Success Starts Here.......
Your LinkedIn Success Starts Here.......
SocioCosmos
 
Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...
Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...
Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...
AJHSSR Journal
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAMLORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAM
lorraineandreiamcidl
 
Unlock TikTok Success with Sociocosmos..
Unlock TikTok Success with Sociocosmos..Unlock TikTok Success with Sociocosmos..
Unlock TikTok Success with Sociocosmos..
SocioCosmos
 
Surat Digital Marketing School - course curriculum
Surat Digital Marketing School - course curriculumSurat Digital Marketing School - course curriculum
Surat Digital Marketing School - course curriculum
digitalcourseshop4
 
The Evolution of SEO: Insights from a Leading Digital Marketing Agency
The Evolution of SEO: Insights from a Leading Digital Marketing AgencyThe Evolution of SEO: Insights from a Leading Digital Marketing Agency
The Evolution of SEO: Insights from a Leading Digital Marketing Agency
Digital Marketing Lab
 
Project Serenity — 33% Life-time Commissions.docx
Project Serenity — 33% Life-time Commissions.docxProject Serenity — 33% Life-time Commissions.docx
Project Serenity — 33% Life-time Commissions.docx
zeqirielmedina8
 
Social Media Marketing Strategies .
Social Media Marketing Strategies                     .Social Media Marketing Strategies                     .
Social Media Marketing Strategies .
Virtual Real Design
 
SluggerPunk Final Angel Investor Proposal
SluggerPunk Final Angel Investor ProposalSluggerPunk Final Angel Investor Proposal
SluggerPunk Final Angel Investor Proposal
grogshiregames
 
EASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANEEASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANE
Febless Hernane
 

Recently uploaded (19)

HOW TO USE FACEBOOK _ by Clarissa Credito
HOW TO USE FACEBOOK _ by Clarissa CreditoHOW TO USE FACEBOOK _ by Clarissa Credito
HOW TO USE FACEBOOK _ by Clarissa Credito
 
HOW TO USE THREADS an Instagram App_ by Clarissa Credito
HOW TO USE THREADS an Instagram App_ by Clarissa CreditoHOW TO USE THREADS an Instagram App_ by Clarissa Credito
HOW TO USE THREADS an Instagram App_ by Clarissa Credito
 
Transform Your Presence Now!..............
Transform Your Presence Now!..............Transform Your Presence Now!..............
Transform Your Presence Now!..............
 
Your Path to YouTube Stardom Starts Here
Your Path to YouTube Stardom Starts HereYour Path to YouTube Stardom Starts Here
Your Path to YouTube Stardom Starts Here
 
Exploring The Dimensions and Dynamics of Felt Obligation: A Bibliometric Anal...
Exploring The Dimensions and Dynamics of Felt Obligation: A Bibliometric Anal...Exploring The Dimensions and Dynamics of Felt Obligation: A Bibliometric Anal...
Exploring The Dimensions and Dynamics of Felt Obligation: A Bibliometric Anal...
 
Buy Pinterest Followers, Reactions & Repins Go Viral on Pinterest with Socio...
Buy Pinterest Followers, Reactions & Repins  Go Viral on Pinterest with Socio...Buy Pinterest Followers, Reactions & Repins  Go Viral on Pinterest with Socio...
Buy Pinterest Followers, Reactions & Repins Go Viral on Pinterest with Socio...
 
SluggerPunk Angel Investor Final Proposal
SluggerPunk Angel Investor Final ProposalSluggerPunk Angel Investor Final Proposal
SluggerPunk Angel Investor Final Proposal
 
快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样
快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样
快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样
 
Grow Your Reddit Community Fast.........
Grow Your Reddit Community Fast.........Grow Your Reddit Community Fast.........
Grow Your Reddit Community Fast.........
 
Your LinkedIn Success Starts Here.......
Your LinkedIn Success Starts Here.......Your LinkedIn Success Starts Here.......
Your LinkedIn Success Starts Here.......
 
Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...
Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...
Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAMLORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAM
 
Unlock TikTok Success with Sociocosmos..
Unlock TikTok Success with Sociocosmos..Unlock TikTok Success with Sociocosmos..
Unlock TikTok Success with Sociocosmos..
 
Surat Digital Marketing School - course curriculum
Surat Digital Marketing School - course curriculumSurat Digital Marketing School - course curriculum
Surat Digital Marketing School - course curriculum
 
The Evolution of SEO: Insights from a Leading Digital Marketing Agency
The Evolution of SEO: Insights from a Leading Digital Marketing AgencyThe Evolution of SEO: Insights from a Leading Digital Marketing Agency
The Evolution of SEO: Insights from a Leading Digital Marketing Agency
 
Project Serenity — 33% Life-time Commissions.docx
Project Serenity — 33% Life-time Commissions.docxProject Serenity — 33% Life-time Commissions.docx
Project Serenity — 33% Life-time Commissions.docx
 
Social Media Marketing Strategies .
Social Media Marketing Strategies                     .Social Media Marketing Strategies                     .
Social Media Marketing Strategies .
 
SluggerPunk Final Angel Investor Proposal
SluggerPunk Final Angel Investor ProposalSluggerPunk Final Angel Investor Proposal
SluggerPunk Final Angel Investor Proposal
 
EASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANEEASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANE
 

Information and Communication Technologies, Protests, and Censorship

  • 1. Introduction Model Analysis Empirics Summary Appendix Information and Communication Technologies, Protests, and Censorship Maxim Ananyev University of Melbourne Maria Petrova University Pompeu Fabra and New Economic School Dimitrios Xefteris University of Cyprus Galina Zudenkova TU Dortmund University Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
  • 2. Introduction Model Analysis Empirics Summary Appendix Motivation Literature Motivation New communication technologies (Internet, online social networks) can reduce the costs of collective action and pose a threat to the stability of authoritarian regimes. If new technologies indeed facilitate protests and revolutions, can the regimes counteract it? Do innovations in state censorship follow the innovations in communication technologies? Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
  • 3. Introduction Model Analysis Empirics Summary Appendix Motivation Literature Motivation Advances in ICT (such as social media) played an important role in protest movements in Egypt, Russia, China, and all over the world. Enikolopov et al. 2016; Acemoglu et al. 2018; Qin et al. 2017; Steinert-Threlkeld et al. 2015; Aday et al. 2010; Frye et al. 2014. However, improvements in communication technologies do not necessarily lead to political changes. E.g., no large-scale protests in Iran or Saudi Arabia despite the fast growth of Internet and a quick increase of social media penetration. Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
  • 4. Introduction Model Analysis Empirics Summary Appendix Motivation Literature Motivation Authoritarian regimes can counteract and use censorship techniques (Morozov 2010, Esfandiari 2010, Guriev and Treisman 2015). Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
  • 5. Introduction Model Analysis Empirics Summary Appendix Motivation Literature This paper We develop a theoretical model of censorship where new communication technologies might be used to organize protests and revolutions; these technologies allow for both spread of information and coordination; two types of censorship could be used by the government to counteract: content censorship (obfuscating news); coordination censorship (temporary shutting down the channels for coordination); censorship costs can depend on its externalities on the production sector of the economy (ICT intensity of the economy). Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
  • 6. Introduction Model Analysis Empirics Summary Appendix Motivation Literature Our theory predicts that New technologies hurt the chance of survival of authoritarian governments, but less so in the economies with low ICT intensity. Less competent regimes are more likely to use coordination censorship. This effect is stronger in economies with low ICT intensity. Intermediate-type regimes are more likely to use content censorship. Higher costs of staging protests lead to less censorship. Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
  • 7. Introduction Model Analysis Empirics Summary Appendix Motivation Literature Empirically We test the model predictions using high-frequency data. We find that the within-country patterns of DDoS attacks (our proxy for coordination censorship) and VPN usage (our proxy for content censorship) are consistent with the model predictions. Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
  • 8. Introduction Model Analysis Empirics Summary Appendix Motivation Literature Literature Models of state censorship under the threat of regime change (Edmond 2013, Shadmehr and Bernhardt 2015, Redlicki 2016). Neither of these papers considers coordination mechanism and the possibility of coordination censorship. Little (2015) considers coordination mechanism but no state censorship (only partial equilibrium). Empirical studies of state censorship are rare (King et al. 2013, 2014; Qin et al. 2016; Knight and Tribin 2016). Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
  • 9. Introduction Model Analysis Empirics Summary Appendix Outline Citizens Regime Censorship Timing Model Outline Consider an authoritarian regime and two representative citizens. The regime wants to stay in power. Each citizen decides independently and simultaneously whether or not to participate in an upcoming uprising against the regime, and if so what tactic to use, tactic A or tactic B. Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
  • 10. Introduction Model Analysis Empirics Summary Appendix Outline Citizens Regime Censorship Timing Model Outline Tactic – any logistical details of the protest such as date, place, strategy, maneuver, concessions, etc. Neither the regime nor the citizens know what tactic is successful, tactic A or tactic B. They share a common prior that tactic A is successful with probability p ∈ (0, 1). Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
  • 11. Introduction Model Analysis Empirics Summary Appendix Outline Citizens Regime Censorship Timing Model Outline The uprising succeeds and so the regime is overthrown if and only if both citizens revolt using the successful tactic. Otherwise, the protest fails and the regime stays in power. It punishes the protestors severely (puts them in jail) if both citizens take part in the uprising but fail to coordinate on the successful tactic. If only one citizen revolts then the regime introduces a less severe punishment (Magaloni and Wallace 2008). Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
  • 12. Introduction Model Analysis Empirics Summary Appendix Outline Citizens Regime Censorship Timing Citizens The strategy space of each citizen: {PA, PB, NP} (protest using tactic A, protest using tactic B, not protest). γ > 0 – citizen’s cost of protesting. Each citizen derives expected utility ∈ R in case of the regime change, and utility θ ∈ R in case of the regime survival. θ – the regime’s competence. If both citizens take part in the unsuccessful revolution, each protestor incurs a large penalty cost κ ≥ κ > 0. No penalty cost if only one citizen protests. Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
  • 13. Introduction Model Analysis Empirics Summary Appendix Outline Citizens Regime Censorship Timing Citizens Citizens’ payoffs: PA PB NP PA p + (1 − p) (θ − κ) −γ, θ − κ − γ, θ − γ, p + (1 − p) (θ − κ) −γ θ − κ − γ θ PB θ − κ − γ, p (θ − κ) + (1 − p) − γ, θ − γ, θ − κ − γ p (θ − κ) + (1 − p) − γ θ NP θ, θ, θ, θ − γ θ − γ θ The citizens share common priors about regime type θ ∼ f (·) and the successful tactic, Pr (A is successful) = p. Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
  • 14. Introduction Model Analysis Empirics Summary Appendix Outline Citizens Regime Censorship Timing Regime The regime wants to survive and so maximizes the probability that the protest fails. It can use content and/or coordination censorship to strengthen its chances of staying in power. The regime knows its type θ. It has a prior about the citizens’ expected utility from a new government ∼ g (·). Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
  • 15. Introduction Model Analysis Empirics Summary Appendix Outline Citizens Regime Censorship Timing Censorship With probability 1 − q, mass media has no information about regime type θ. With probability q ∈ (0, 1), mass media has information about regime type θ. But the regime might censor, which leads to obfuscation. Content censorship – the regime’s hidden action to prevent the citizens from learning θ from the mass media. c ≥ 0 – the regime’s cost of content censorship. Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
  • 16. Introduction Model Analysis Empirics Summary Appendix Outline Citizens Regime Censorship Timing Censorship The citizens obtain information about θ from the mass media if the mass media has it and the regime applies no content censorship. Otherwise the citizens obtain no information about θ from the mass media. Then with probability r ∈ (0, 1), the citizens have no information about θ, but with probability 1 − r, the citizens still learn θ (e.g., from international media). Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
  • 17. Introduction Model Analysis Empirics Summary Appendix Outline Citizens Regime Censorship Timing Censorship Information about successful tactic (A or B) is transmitted via social media. But the regime might censor social media. Coordination censorship – the regime’s action to shut down the social media and so prevent the citizens from learning the successful tactic. The citizens observe the regime’s choice of coordination censorship. d ≥ 0 – the regime’s cost of coordination censorship. Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
  • 18. Introduction Model Analysis Empirics Summary Appendix Outline Citizens Regime Censorship Timing Timing Nature randomly draws the regime type θ, citizens’ expected utility from a new government and successful tactic of the uprising (A or B) from the corresponding distributions. The regime decides whether to apply content and/or coordination censorship. The citizens decide independently and simultaneously whether or not to participate in the revolt, and if so what tactic to use. The regime is either overthrown or not, and the citizens get their corresponding payoffs. Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
  • 19. Introduction Model Analysis Empirics Summary Appendix Outline Citizens Regime Censorship Timing Equilibrium Concept Perfect Bayesian equilibrium: the citizens’ beliefs about the regime type, their protest participation decisions and tactic choices, the regime’s censorship actions. Equilibrium selection: risk dominance criterion (see Harsanyi and Selten 1988). WLG, assume that the successful tactic is A. Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
  • 20. Introduction Model Analysis Empirics Summary Appendix Citizens Regime Equilibrium Comparative Statics Citizens’ Problem If the regime uses coordination censorship then the citizens do not protest. Intuition. They realize that without learning the tactic, they might fail to coordinate during the uprising. The regime would survive and punish them severely, which implies low expected payoffs from protesting. Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
  • 21. Introduction Model Analysis Empirics Summary Appendix Citizens Regime Equilibrium Comparative Statics Citizens’ Problem If the regime does not apply coordination censorship then the citizens’ decision about protesting is determined by the regime competence (or the expectation of it). If the citizens observe or expect that the regime is competent enough then they do not protest. Otherwise, they protest using the successful tactic learnt via social media. Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
  • 22. Introduction Model Analysis Empirics Summary Appendix Citizens Regime Equilibrium Comparative Statics Citizens’ Problem Lemma 1 Suppose that the regime applies no coordination censorship and the citizens observe θ. They do not protest if θ ≥ − 2γ, and protest using tactic A otherwise. 2 Suppose that the regime applies no coordination censorship and the citizens do not observe θ. They do not protest if E [θ|b] ≥ − 2γ, and protest using tactic A otherwise; b – the citizens’ beliefs about θ in this information set. 3 Suppose that the regime uses coordination censorship. Then the citizens do not protest. Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
  • 23. Introduction Model Analysis Empirics Summary Appendix Citizens Regime Equilibrium Comparative Statics Regime’s Problem If the mass media has no information about regime type θ then: No content censorship. The regime decides whether or not to use coordination censorship. The regime’s expected utility:    1 − d if coordination censorship, rG (E [θ|b] + 2γ) + (1 − r) G (θ + 2γ) otherwise, G (·) – CDF of the regime’s prior about the citizens’ expected utility from a new government . Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
  • 24. Introduction Model Analysis Empirics Summary Appendix Citizens Regime Equilibrium Comparative Statics Regime’s Problem If the mass media has information about regime type θ then: The regime decides whether or not to use content and/or coordination censorship. The regime will not use both types of censorship simultaneously. The regime’s expected utility:    1 − d if coordination censorship, rG (E [θ|b] + 2γ) + (1 − r) G (θ + 2γ) − c if content censor., G (θ + 2γ) otherwise. Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
  • 25. Introduction Model Analysis Empirics Summary Appendix Citizens Regime Equilibrium Comparative Statics Regime’s Problem Theorem For any parameter configuration, every equilibrium is characterized by an ordered pair (θ , θ ) ∈ (R ∪ {−∞, +∞})2 with θ ≤ θ such that 1. a regime of type θ ≤ θ opts for coordination censorship, 2. a regime of type θ < θ < θ uses content censorship, 3. and a regime of type θ ≥ θ applies no censorship. This result specifies a unique order of censorship choices as a function of θ. Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
  • 26. Introduction Model Analysis Empirics Summary Appendix Citizens Regime Equilibrium Comparative Statics Equilibrium Characterization We prove equilibrium existence and uniqueness for all admissible parameters of the model. While the order of censorship choices cannot be reversed in equilibrium, it is possible that a particular type of censorship does not occur in equilibrium. Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
  • 27. Introduction Model Analysis Empirics Summary Appendix Citizens Regime Equilibrium Comparative Statics Equilibrium The regime’s content obfuscation is effective in equilibrium. The citizens cannot perfectly infer θ in the absence of a media report. The citizens play a coordination game. This intensifies the effectiveness of censorship since the citizens’ actions are strategic complements. Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
  • 28. Introduction Model Analysis Empirics Summary Appendix Citizens Regime Equilibrium Comparative Statics Comparative Statics Assumption: regimes with higher ICT intensity face higher costs of coord. censorship (Ackermann 2017). Theorem 1. Less competent regimes are more likely to use coordination censorship. This effect is stronger in economies with low ICT intensity. 2. Intermediate-type regimes are more likely to use content censorship. 3. Higher costs of staging protests lead to less overall censorship and, in particular, less coordination censorship. Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
  • 29. Introduction Model Analysis Empirics Summary Appendix Strategy Data Empirical Results Empirical Strategy We test the model predictions using within-country data. A conceptually novel approach. Idea: relevant policy questions change often, even within a country headed by the same government. Assumption: each period, the government decides about censorship and the citizens decide about protests ignoring information on the government’s prior behavior because of quickly changing environment. It allows us to test the model predictions using high-frequency within-country data on censorship. Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
  • 30. Introduction Model Analysis Empirics Summary Appendix Strategy Data Empirical Results Data: Sovereign Bond Yields We measure the quality of a regime by the sovereign bond yields (daily data). Those yields measure the financial market’s estimates of the probability that a government will default on its obligations. A useful operationalization of the concept of “regime quality” from the model. 64 autocratic countries, Investing.com. For most of the countries, we use yields of 10-year bonds (daily data). Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
  • 31. Introduction Model Analysis Empirics Summary Appendix Strategy Data Empirical Results Data: DDoS attacks We use the data on Distributed Denial-of-Service attacks (DDoS attacks) to measure coordination censorship (daily data). DDoS attacks happen when a certain website is flooded by the automated requests that exceed the website’s capacity, and the website temporarily goes down. Daily data on attacks that happened between June 1, 2013 (when the website was launched) until Feb 28, 2015. We control for other reasons (apart from coordination censorship) that make DDoS attacks more likely: level of GDP per capita, a share of people having access to Internet and Polity 2 score. Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
  • 32. Introduction Model Analysis Empirics Summary Appendix Strategy Data Empirical Results Data: DDoS attacks Website Digital Attack Map – a collaboration between Google Ideas and a software security firm Arbor Networks. Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
  • 33. Introduction Model Analysis Empirics Summary Appendix Strategy Data Empirical Results Data: DDoS attacks Adjusted for the regime type, level of economic development and Internet penetration, Freedom of the Net scores are positively correlated with the number of DDoS attacks. Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
  • 34. Introduction Model Analysis Empirics Summary Appendix Strategy Data Empirical Results Data: DDoS attacks After the adjustment for GDP, Internet penetration and regime type, higher number of DDoS attacks is associated with higher levels of political filtering. Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
  • 35. Introduction Model Analysis Empirics Summary Appendix Strategy Data Empirical Results Data: VPN services We employ data on the usage of VPN services as a proxy of content censorship (quarterly data). People use VPN services to access prohibited content. globalwebindex.net VPN quality is unstable and VPNs slow down already imperfect speed of the Internet ⇒ it allows the citizens to eventually get access to censored information, but does not allow its users to smoothly and quickly coordinate their collective action. Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
  • 36. Introduction Model Analysis Empirics Summary Appendix Strategy Data Empirical Results Data: Snow and ICT We use the indicator for snow as a proxy for cost of protest (daily data). wunderground.com. We use data on ICT intensity of the economy. Country-level ICT intensity is calculated from the employment data from UNIDO, and industry-level ICT intensity of the US industries from the Wall Street Journal. Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
  • 37. Introduction Model Analysis Empirics Summary Appendix Strategy Data Empirical Results Coordination Censorship and Regime Competence Sovereign Bond Yield and DDoS Attacks: Daily Data. One percent increase in sovereign yield is associated with 2 percentage point increase in the daily risk of a DDoS attack. Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
  • 38. Introduction Model Analysis Empirics Summary Appendix Strategy Data Empirical Results Coordination Censorship and Regime Competence Competence-censorship effect is stronger in economies with low ICT intensity. Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
  • 39. Introduction Model Analysis Empirics Summary Appendix Strategy Data Empirical Results Coordination Censorship and Costs of Protest Snow and DDoS Attacks: Daily Data. An instance of snow is associated with the decrease of the probability of a DDoS attack by 4-6 percentage points. Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
  • 40. Introduction Model Analysis Empirics Summary Appendix Strategy Data Empirical Results Content Censorship and Regime Competence Sovereign Bond Yield and VPN Usage: Quarterly Data. The signs are consistent with the theory but the results are noisy. Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
  • 41. Introduction Model Analysis Empirics Summary Appendix Strategy Data Empirical Results Content Censorship and Cost of Protests Snow and VPN Usage: Quarterly Data. Results are not driven by northern countries like Russia, but rather by the incidence of snow in southern countries like Turkey, Iran, Mexico. Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
  • 42. Introduction Model Analysis Empirics Summary Appendix Summary We contribute to the literature on regime change by differentiating between two types of state censorship: coordination censorship (which prevents people from coordinating an anti-regime collective action), and content censorship (which prevents people from learning about the regime quality). We develop a model that explicitly considers the regime’s choice of censorship type. The model generates predictions that relate the choice of censorship to the costs of protests and the regime quality. Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
  • 43. Introduction Model Analysis Empirics Summary Appendix Summary We test the model predictions and find that they are corroborated by the data: coordination censorship is used by less competent governments; this effect is stronger in countries with low ICT intensity; content censorship is used by intermediate-type governments; higher costs of protests are associated with less censorship. Clear prediction for future political dynamics of authoritarian regimes: As ICT intensity of the economy increases, the regime might find it more costly to use censorship to suppress coordination. Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
  • 44. Introduction Model Analysis Empirics Summary Appendix Literature Equilibrium Literature Informational cascades: Bikhchandani, Hirshleifer and Welch (1992), Lohmann (1994, 2000). Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
  • 45. Introduction Model Analysis Empirics Summary Appendix Literature Equilibrium Equilibrium Characterization For the sake of tractability, we focus on a simpler case c = 0. We prove equilibrium existence and uniqueness for all admissible parameters of the model. θ1 ∈ R – a regime type indifferent between coord. and no censorship when the mass media has no info about θ, and between coord. and content censorship when the mass media has info about θ: 1 − d = rG (E [θ|b] + 2γ) + (1 − r) G (θ1 + 2γ) . θ2 ∈ R – a regime type indifferent between content and no censorship when the mass media has info about θ: θ2 = E [θ|b] . Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship
  • 46. Introduction Model Analysis Empirics Summary Appendix Literature Equilibrium Belief Updating E [θ|b]? The citizens do not observe θ but know that the regime doesn’t use coord. censorship. They realize that either 1 the media has no info about θ and the regime doesn’t censor ⇒ the regime is of type θ > θ1, or 2 the media has info about θ and the regime censors content ⇒ the regime is of type θ1 < θ < θ2. The media has info about θ with probability q ⇒ E [θ|b] = (1−q) +∞ θ1 zf(z)dz+q θ2 θ1 zf(z)dz (1−q)(1−F(θ1))+q(F(θ2)−F(θ1)). Ananyev, Petrova, Xefteris & Zudenkova ICT, Protests, and Censorship