Hostname: page-component-cd9895bd7-mkpzs Total loading time: 0 Render date: 2024-12-26T07:17:31.857Z Has data issue: false hasContentIssue false

Authoritarianism and the Internet

Published online by Cambridge University Press:  27 December 2018

Abstract

This article argues that Internet censorship is more fragile than is generally supposed and is, in fact, vulnerable to abrupt collapse. The volume and rapidity of online communication renders perfect policing of the Internet technologically impossible. Authoritarian governments are thus forced to rely on Internet users to police themselves in the form of self-censorship. This strategy has proven largely successful—legal ambiguity regarding what constitutes impermissible speech fosters norms of self-censorship. This reliance on self-censorship, however, renders these censorial systems susceptible to shocks. We set out a model that explains sudden breakdowns in Internet censorship that we term “cyberspeech cascades.” A cyberspeech cascade occurs when small expressions of online dissent produce large shifts in public perception regarding the acceptable limits of online expression that are, in fact, inaccurate. Online bandwagons of progressively more brazen speech proliferate into large-scale torrents of uncensored expression, triggering the temporary collapse of self-censorship norms online.

Type
Articles
Copyright
Copyright © American Bar Foundation, 2018 

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Adams, Paul C. 2007. Atlantic Reverberations: French Representations of an American Presidential Election. Burlington, VT: Ashgate.Google Scholar
Adams, Tim. 2011. How the Internet Created an Age of Rage. Guardian, July 24. https://www.theguardian.com/technology/2011/jul/24/internet-anonymity-trolling-tim-adams (accessed February 3, 2017).Google Scholar
Adi, Mohammad-Munir. 2014. The Usage of Social Media in the Arab Spring. Munster: Lit Verlag.Google Scholar
Alexander, Anne. 2011. Internet Role in Egypt's Protests. BBC, February 9. http://www.bbc.com/news/world-middle-east-12400319 (accessed March 1, 2017).Google Scholar
Allen-Ebrahimian, Bethany. 2015. The “Chilling Effect” of China's New Cybersecurity Regime. Foreign Policy, July 10. http://foreignpolicy.com/2015/07/10/china-new-cybersecurity-law-internet-security/ (accessed February 3, 2017).Google Scholar
Anderson, Lisa R., and Holt, Charles A. 1997. Information Cascades in the Laboratory. American Economic Review 87:847–62.Google Scholar
Bakalar, Nickolas. 2011. Watch Your Step While Washing Up. New York Times, August 15. http://www.nytimes.com/2011/08/16/health/research/16stats.html?_r=0 (accessed April 2, 2016).Google Scholar
Banerjee, Abhijit V. 1992. A Simple Model of Herd Behavior. Quarterly Journal of Economics 107:797817.Google Scholar
Basten, Nathali. 2011. (In)Visibility of Death: Neda—Constructions of Gender and Identity in the Media. Munich: GRIN Verlag.Google Scholar
Bikhchandani, Sushil, Hirshleifer, David, and Welch, Ivo. 1992. A Theory of Fads, Fashion, Custom, and Cultural Change as Information Cascades. Journal of Political Economy 100:9921026.Google Scholar
Bischoff, Paul. 2014. Tencent Owns 3 of the World's 5 Biggest Social Networks. Tech in Asia, November 3. https://www.techinasia.com/tencent-owns-3-worlds-5-biggest-social-networks (accessed February 3, 2017).Google Scholar
Boas, T. 2004. Weaving the Authoritarian Web. Current History 103:438–43.Google Scholar
Brown, Ian, and Marsden, Christopher T. 2013. Regulating Code: Good Governance and Better Regulation in the Information Age. Cambridge, MA: MIT Press.Google Scholar
Bulhakau, Valer. 2006. The Geopolitical Place of Belarus in Europe and the World. Warsaw: Fundacja Przestrzeni Obywat.Google Scholar
Burnell, Peter, Randall, Vicky, and Rakner, Lise. 2014. Politics in the Developing World. Oxford: Oxford University Press.Google Scholar
Cammett, Melani, Diwan, Ishac, Richards, Alan, and Waterbury, John. 2015. A Political Economy of the Middle East. Boulder, CO: Westview Press.Google Scholar
Caruso, Catherine. 2016. Can a Social-Media Algorithm Predict a Terror Attack? MIT Technology Review, June 16. https://www.technologyreview.com/s/601700/can-a-social-media-algorithm-predict-a-terror-attack/ (accessed February 4, 2017).Google Scholar
Chen, Adrian. 2015. The Agency. New York Times, June 7, MM57.Google Scholar
Chen, Lulu Yilun. 2016. $7,000-a-Month “Shameless China” Blogger Loses All with One Post. Bloomberg News, July 18. http://www.bloomberg.com/news/articles/2016-07-17/-7-000-a-month-shameless-china-blogger-loses-all-with-one-post (accessed February 3, 2017).Google Scholar
deTocqueville, Alexis. 1856. L'Ancien Régime et la Révolution. Paris: Michel Levy Freres.Google Scholar
Deibert, Ronald. 2010. Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace. Cambridge, MA: MIT Press.Google Scholar
Deibert, Ronald, Palfrey, John, Rohozinski, Rafal, and Zittrain, Jonathan 2011. Access Contested: Security, Identity, and Resistance in Asian Cyberspace. Cambridge, MA: MIT Press.Google Scholar
Deibert, Ronald, Palfrey, John, Rohozinski, Rafal, Zittrain, Jonathan, and Stein, Janice Gross. 2008. Access Denied: The Practice and Policy of Global Internet Filtering. Cambridge, MA: MIT Press.Google Scholar
Denyer, Simon. 2016. The Internet Was Supposed to Foster Democracy. China Has Different Ideas. Washington Post, July 10. https://www.washingtonpost.com/world/asia_pacific/the-internet-was-supposed-to-foster-democracy-china-has-different-ideas/2016/07/10/42954bbc-1dd9-11e6-b6e0-c53b7ef63b45_story.html (accessed February 3, 2017).Google Scholar
D'Hooghe, Ingrid. 2014. China's Public Diplomacy. Leiden: Martinus Nijhoff.Google Scholar
Druzin, Bryan, and Li, Jessica. 2015. The Art of Nailing Jello to the Wall: A Reassessment of the Political Power of the Internet. Journal of Law & Policy 40:139.Google Scholar
Druzin, Bryan, and Li, Jessica 2016. Censorship's Fragile Grip on the Internet: Can Online Speech be Controlled? Cornell International Law Journal 49:369414.Google Scholar
Easley, David, and Kleinberg, Jon. 2010. Networks, Crowds, and Markets: Reasoning About a Highly Connected World. Cambridge: Cambridge University Press.Google Scholar
Ellickson, Robert. 2001. The Evolution of Social Norms: A Perspective from the Legal Academy. In Social Norms, ed. Hechter, Michael and Opp, Karl-Dieter, 3575. New York: Russell Sage Foundation.Google Scholar
Featherman, Chris. 2015. Discourses of Ideology and Identity: Social Media and the Iranian Election Protests. New York: Routledge.Google Scholar
Flock, Elizabeth. 2011. Syria Revolution: A Revolt Brews Against Bashar al-Assad's Regime. Washington Post, March 15. http://www.washingtonpost.com/blogs/blogpost/post/syria-revolution-revolt-against-bashar-al-assads-regime/2011/03/15/ABrwNEX_blog.html (accessed February 4, 2017).Google Scholar
Ford, Christopher A. 2015. China Looks at the West: Identity, Global Ambitions, and the Future of Sino-American Relations. Lexington: University Press of Kentucky.Google Scholar
Freier, Anne. 2015. Sina Weibo Revenue and Statistics. Business of Apps, December 7. http://www.businessofapps.com/sina-weibo-revenue-and-statistics/ (accessed March 2, 2017).Google Scholar
Friedman, Thomas L. 2007. The World Is Flat 3.0: A Brief History of the Twenty-First Century. New York: Picador.Google Scholar
Gibson, Timothy A., and Lowes, Mark Douglas. 2007. Urban Communication: Production, Text, Context. New York: Rowman & Littlefield.Google Scholar
Glanville, Jo. 2010. Brave New Words: Is Technology the Saviour of Free Speech? London: Sage.Google Scholar
Globe and Mail. 2016. Tencent's QQ Web Browser May Put Users’ Data at Risk: Report. Globe & Mail, March 29. http://www.theglobeandmail.com/technology/popular-web-browser-in-china-may-put-users-data-at-risk-report/article29425182/ (accessed February 3, 2017).Google Scholar
Hachigian, Nina. 2001. China's Cyber-Strategy. Foreign Affairs, March/April. https://www.foreignaffairs.com/articles/asia/2001-03-01/chinas-cyber-strategy (accessed February 3, 2017).Google Scholar
Hayhtio, Tapio, and Jarmo, Rinne. 2008. Net Working/Networking: Citizen Initiated Internet Politics. Helsinki: University of Tampere.Google Scholar
Herold, David Kurt, and Marolt, Peter. 2011. Online Society in China: Creating, Celebrating, and Instrumentalising the Online Carnival. New York: Routledge.Google Scholar
Holt, Richard. 2004. Dialogue on the Internet: Language, Civic Identity, and Computer-Mediated Communication. Westport, CT: Praeger.Google Scholar
Howard, Philip, and Hussain, Muzammil. 2012. Egypt and Tunisia: The Role of Digital Media. In Liberation Technology: Social Media and the Struggle for Democracy, ed. Diamon, Larry and Plattner, Marc F., 110–23. Baltimore, MD: Johns Hopkins University Press.Google Scholar
IBP. 2013. Myanmar Internet and E-Commerce Investment and Business Guide—Regulations and Opportunities. Washington, DC: International Business Publications.Google Scholar
Isaac, Mike. 2016a. Other Gains Don't Offset Twitter Miss on Revenue. New York Times, April 27, B1.Google Scholar
Isaac, Mike. 2016b. WhatsApp Encryption Now Covers All Messages. New York Times, April 6, B3.Google Scholar
Joyce, Mary C. 2010. Digital Activism Decoded: The New Mechanics of Change. New York: International Debate Education Association.Google Scholar
Kuran, Timur. 1989. Sparks and Prairie Fires: A Theory of Unanticipated Political Revolution. Public Choice 61:4174.Google Scholar
Kuran, Timur. 1991. Now Out of Never: The Element of Surprise in the East European Revolution of 1989. World Politics 44:748.Google Scholar
Kuran, Timur. 1997. Private Truths, Public Lies. Cambridge, MA: Harvard University Press.Google Scholar
Kuran, Timur. 1998. Ethnic Norms and Their Transformation Through Reputational Cascades. Journal of Legal Studies 27:623–59.Google Scholar
Kuran, Timur, and Sunstein, Cass. 1999. Availability Cascades and Risk Regulation. Stanford Law Review 51:683768.Google Scholar
Kyi, Aung San Suu. 2010. Freedom from Fear and Other Writings. London: Penguin.Google Scholar
Lemieux, Pierre. 2004. Following the Herd. Regulation 26:1621.Google Scholar
Link, Perry. 2002. China: The Anaconda in the Chandelier. New York Review of Books, April 11. http://www.nybooks.com/articles/archives/2002/apr/11/china-the-anaconda-in-the-chandelier/ (accessed February 3, 2017).Google Scholar
Link, Perry, Madsen, Richard P., and Pickowicz, Paul G. 2013. Restless China. New York: Rowman & Littlefield.Google Scholar
Mackey, Robert. 2009. Updates on the Protests in Iran. New York Times, July 9. http://thelede.blogs.nytimes.com/2009/07/09/latest-updates-on-iran-election-protests/?_r=0 (accessed April 12, 2016).Google Scholar
Morozov, Evgeny. 2011. The Net Delusion: How Not to Liberate the World. London: Penguin.Google Scholar
Noelle-Neumann, Elisabeth. 1974. The Spiral of Silence: A Theory of Public Opinion. Journal of Communication 24:4351.Google Scholar
OECD. 2012. OECD Internet Economy Outlook 2012. Paris: OECD.Google Scholar
Oloffson, Kristi. 2010. YouTube's 50 Best Videos. Time, March 29. http://content.time.com/time/specials/packages/article/0,28804,1974961_1974925_1974743,00.html (accessed February 3, 2017).Google Scholar
Picker, Randal. 1997. Simple Games in a Complex World: A Generative Approach to the Adoption of Norms. University of Chicago Law Review 64:1225–88.Google Scholar
Preston, Jennifer. 2011. Movement Began with Outrage and a Facebook Page that Gave It an Outlet. New York Times, February 5. http://www.nytimes.com/2011/02/06/world/middleeast/06face.html?_r=0 (accessed April 2, 2016).Google Scholar
Rawnsley, Gary D., and Rawnsley, Ming-Yeh T. 2015. Routledge Handbook of Chinese Media. New York: Routledge.Google Scholar
Ren, Fujun, and Zhai, Jiequan. 2013. Communication and Popularization of Science and Technology in China. Heidelberg: Springer Science & Business Media.Google Scholar
Reporters Without Borders. 2014. Enemies of the Internet 2014: Entities at the Heart of Censorship and Surveillance. http://12mars.rsf.org/2014-en/enemies-of-the-internet-2014-entities-at-the-heart-of-censorship-and-surveillance/ (accessed May 17, 2016).Google Scholar
Roe, Mark J. 1996. A Chaos and Evolution in Law and Economics. Harvard Law Review 109:641–68.Google Scholar
Schelling, Thomas C. 1978. Micromotives and Macrobehavior. New York: W.W. Norton & Company.Google Scholar
Shiller, Robert J. 1995. Conversation, Information, and Herd Behavior. American Economic Review 85:181–85.Google Scholar
Sisario, Ben. 2016. Music World Bands Together Against YouTube, Seeking Change to Law. New York Times, May 31. https://www.nytimes.com/2016/06/01/business/media/music-world-bands-together-against-youtube-seeking-change-to-law.html (accessed July 6, 2016).Google Scholar
So, Alvin Y. 2012. Handbook of Contemporary China. Singapore: World Scientific Publishing.Google Scholar
Sterelny, Kim, Joyce, Richard, Calcott, Brett, and Fraser, Ben. 2013. Cooperation and its Evolution. Cambridge, MA: MIT Press.Google Scholar
Stewart, James B. 2016. Facebook Has 50 Minutes of Your Time Each Day. It Wants More. New York Times, May 5. https://www.nytimes.com/2016/05/06/business/facebook-bends-the-rules-of-audience-engagement-to-its-advantage.html (accessed May 17, 2016).Google Scholar
Sunstein, Cass R. 1996a. On the Expressive Function of Law. University of Pennsylvania Law Review 144:2021–53.Google Scholar
Sunstein, Cass R. 1996b. Social Norms and Social Roles. Columbia Law Review 96:903–68.Google Scholar
Taylor, William C. 2014. Military Responses to the Arab Uprisings and the Future of Civil-Military Relations in the Middle East: Analysis from Egypt, Tunisia, Libya, and Syria. New York: Palgrave Macmillan.Google Scholar
Tkacheva, Olesya, Schwartz, Lowell H., Libicki, Martin C., Taylor, Julie E., Martini, Jeffrey, and Baxter, Caroline. 2013. Internet Freedom and Political Space. Santa Monica, CA: Rand Corporation.Google Scholar
White, Stephen, Sakwa, Richard, and Hale, Henry E. 2014. Developments in Russian Politics 8. New York: Palgrave Macmillan.Google Scholar
Wines, Michael. 2009. A Dirty Pun Tweaks China's Online Censors. New York Times, March 11. http://www.nytimes.com/2009/03/12/world/asia/12beast.html?_r=0 (accessed May 17, 2016).Google Scholar
Wingfield, Nick. 2016. Microsoft Buys LinkedIn for $26.2 Billion, Reasserting Its Muscle. New York Times, June 14. https://www.nytimes.com/2016/06/14/business/dealbook/microsoft-to-buy-linkedin-for-26-2-billion.html (accessed April 9, 2016).Google Scholar
World Bank. 2016. World Development Report 2016: Digital Dividends. Washington, DC: World Bank.Google Scholar
Xu, Xiaowen. 2011. Internet Facilitated Civic Engagement in China's Context: A Case Study of the Internet Event of Wenzhou High-Speed Train Accident. Master's thesis, Columbia University, New York.Google Scholar
Youn, Monica. 2013. The Chilling Effect and the Problem of Private Action. Vanderbilt Law Review 66:14731539.Google Scholar
Youngs, Gillian. 2013. Digital World: Connectivity, Creativity and Rights. New York: Routledge.Google Scholar
Yu, Haiqing. 2009. Media and Cultural Transformation in China. Oxford: Taylor & Francis.Google Scholar