{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,24]],"date-time":"2025-09-24T09:33:30Z","timestamp":1758706410713,"version":"3.41.2"},"reference-count":162,"publisher":"Oxford University Press (OUP)","issue":"1","license":[{"start":{"date-parts":[[2021,2,16]],"date-time":"2021-02-16T00:00:00Z","timestamp":1613433600000},"content-version":"vor","delay-in-days":46,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,2,16]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Cybersecurity, defined as the prevention and mitigation of malicious interference with digital devices and networks, is a key area of contest for digitalized politics, especially in uncertain and turbulent situations. Nowhere is this more starkly illustrated than in states such as Egypt, where the period since the January 2011 revolution has seen several changes of government and the subsequent consolidation of executive power, increasingly strict limits on free speech, and extensive violence by Islamist groups against the state and civilian targets and by the state against protesters and dissidents. How, then, are cybersecurity policies, practices, and technologies deployed and contested in uncertain political environments? The article argues that cybersecurity provides a way for the Egyptian government and opposition activists to \u201cmanipulate uncertainty\u201d to their advantage. Each side uses cybersecurity policies, practices, and technologies to restrict their adversary\u2019s scope for action, seeking to make the other more predictable while retaining or increasing their own freedom of action. In addition to providing extensive empirical data on cybersecurity developments in Egypt, the article makes two theoretical contributions. First, it shows how political struggles between state and opposition movements assimilate the influential language and content of cybersecurity, generating distinct cybersecurity politics. Second, it highlights the role of uncertainty as a driver\u2014among others\u2014of cycles of innovation and response in contentious politics, including those that center on cybersecurity.<\/jats:p>","DOI":"10.1093\/cybsec\/tyaa026","type":"journal-article","created":{"date-parts":[[2021,2,19]],"date-time":"2021-02-19T02:57:29Z","timestamp":1613703449000},"source":"Crossref","is-referenced-by-count":9,"title":["Manipulating uncertainty: cybersecurity politics in Egypt"],"prefix":"10.1093","volume":"7","author":[{"given":"Bassant","family":"Hassib","sequence":"first","affiliation":[{"name":"Department of Political Science, British University in Egypt, Suez Desert Road, El Sherouk City, Cairo, 11837, Egypt"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7481-4037","authenticated-orcid":false,"given":"James","family":"Shires","sequence":"additional","affiliation":[{"name":"Institute of Security and Global Affairs, University of Leiden, Turfmarkt 99, Den Haag, 2511DP, The Netherlands"}]}],"member":"286","published-online":{"date-parts":[[2021,2,16]]},"reference":[{"key":"2021021615035395100_tyaa026-B1","first-page":"18","article-title":"Family resemblance or family argument? Three perspectives of cybersecurity and their interaction","volume":"14","author":"Shires","year":"2019","journal-title":"St Anthonys Int Rev"},{"key":"2021021615035395100_tyaa026-B2","doi-asserted-by":"crossref","first-page":"521","DOI":"10.4324\/9780429399718-44","volume-title":"Routledge Companion to Global Cyber-Security Strategy","author":"Hassib","year":"2021"},{"key":"2021021615035395100_tyaa026-B3","first-page":"205","volume-title":"Governing Cyberspace: Power, Behavior, and Diplomacy","author":"Shires","year":"2020"},{"key":"2021021615035395100_tyaa026-B4","doi-asserted-by":"crossref","DOI":"10.1057\/9781137020925","volume-title":"Egyptian Revolution 2.0: Political Blogging, Civic Engagement, and Citizen Journalism","author":"el-Nawawy","year":"2013"},{"key":"2021021615035395100_tyaa026-B5","doi-asserted-by":"crossref","DOI":"10.1057\/978-1-137-48069-9","volume-title":"Cyberactivism and Citizen Journalism in Egypt: Digital Dissidence and Political Change","author":"Radsch","year":"2016"},{"key":"2021021615035395100_tyaa026-B6","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511804366","volume-title":"Contentious Performances","author":"Tilly","year":"2008"},{"volume-title":"The Arab Uprising: The Unfinished Revolutions of the New Middle East","year":"2013","author":"Lynch","key":"2021021615035395100_tyaa026-B7"},{"key":"2021021615035395100_tyaa026-B8","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1017\/CBO9781139236737.009","volume-title":"The New Middle East: Protest and Revolution in the Arab World","author":"Chalcraft","year":"2013"},{"key":"2021021615035395100_tyaa026-B9","doi-asserted-by":"crossref","DOI":"10.1093\/acprof:oso\/9780199660063.001.0001","volume-title":"The Arab Spring: Pathways of Repression and Reform","author":"Brownlee","year":"2015"},{"key":"2021021615035395100_tyaa026-B10","doi-asserted-by":"crossref","DOI":"10.1017\/9781316882702","volume-title":"Egypt in a Time of Revolution","author":"Ketchley","year":"2017"},{"key":"2021021615035395100_tyaa026-B11","doi-asserted-by":"crossref","first-page":"348","DOI":"10.1017\/S0020743815000094","article-title":"Technologies of liberation and\/or otherwise","volume":"47","author":"Khiabany","year":"2015","journal-title":"Int J Middle East Stud"},{"key":"2021021615035395100_tyaa026-B12","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1017\/S1537592714003120","article-title":"Corrupting the cyber-commons: social media as a tool of autocratic stability","volume":"13","author":"Gunitsky","year":"2015","journal-title":"Perspect Polit"},{"key":"2021021615035395100_tyaa026-B13","article-title":"\u2018Facebook protesters\u2019 helped sudan drive out bashir","author":"Emont","year":"2019","journal-title":"Wall Street Journal"},{"year":"2020","author":"Bartu","key":"2021021615035395100_tyaa026-B14"},{"volume-title":"Who Controls the Internet?: Illusions of a Borderless World","year":"2008","author":"Goldsmith","key":"2021021615035395100_tyaa026-B15"},{"key":"2021021615035395100_tyaa026-B16","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1111\/j.1468-2478.2010.00592.x","article-title":"From global village to virtual battlespace: the colonizing of the internet and the extension of realpolitik","volume":"54","author":"Manjikian","year":"2010","journal-title":"Int Stud Q"},{"key":"2021021615035395100_tyaa026-B17","doi-asserted-by":"crossref","DOI":"10.12987\/yale\/9780300181357.001.0001","volume-title":"The Global War for Internet Governance","author":"DeNardis","year":"2014"},{"volume-title":"Common-Knowledge Attacks on Democracy.","year":"2018","author":"Schneier","key":"2021021615035395100_tyaa026-B18"},{"year":"2019","author":"Farrell","key":"2021021615035395100_tyaa026-B19"},{"volume-title":"Transitions from Authoritarian Rule: Tentative Conclusions about Uncertain Democracies","year":"1986","author":"O\u2019Donnell","key":"2021021615035395100_tyaa026-B20"},{"key":"2021021615035395100_tyaa026-B21","doi-asserted-by":"crossref","DOI":"10.1177\/0888325493007002003","article-title":"Uncertainty in the transition: post-communism in Hungary","author":"Bunce","year":"1993","journal-title":"East Eur Polit Soc"},{"key":"2021021615035395100_tyaa026-B22","doi-asserted-by":"crossref","DOI":"10.1093\/acprof:oso\/9780199680320.001.0001","volume-title":"The Politics of Uncertainty: Sustaining and Subverting Electoral Authoritarianism","author":"Schedler","year":"2013"},{"key":"2021021615035395100_tyaa026-B23","doi-asserted-by":"crossref","first-page":"1159","DOI":"10.1080\/13510347.2017.1289179","article-title":"Online clustering, fear and uncertainty in Egypt\u2019s transition","volume":"24","author":"Lynch","year":"2017","journal-title":"Democratization"},{"key":"2021021615035395100_tyaa026-B24","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1177\/1354066107074290","article-title":"Governing terrorism through risk: taking precautions, (un)knowing the future","volume":"13","author":"Aradau","year":"2007","journal-title":"Eur J Int Relat"},{"key":"2021021615035395100_tyaa026-B25","doi-asserted-by":"crossref","first-page":"411","DOI":"10.1177\/0967010607084994","article-title":"Knowns and unknowns in the \u2018War on Terror\u2019: uncertainty and the political construction of danger","volume":"38","author":"Daase","year":"2007","journal-title":"Secur Dialogue"},{"key":"2021021615035395100_tyaa026-B26","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1177\/0967010608088773","article-title":"Beyond risk: premediation and the post-9\/11 security imagination","volume":"39","author":"Goede","year":"2008","journal-title":"Secur Dialogue"},{"key":"2021021615035395100_tyaa026-B27","doi-asserted-by":"crossref","DOI":"10.1515\/9781626373938","volume-title":"Middle East Monarchies: The Challenge of Modernity","author":"Kostiner","year":"2000"},{"key":"2021021615035395100_tyaa026-B28","volume-title":"Soldiers, Spies, and Statesmen: Egypt\u2019s Road to Revolt","author":"Kandil","year":"2014","edition":"London\/New York"},{"key":"2021021615035395100_tyaa026-B29","doi-asserted-by":"crossref","DOI":"10.1093\/acprof:oso\/9780190239206.001.0001","volume-title":"The Power Triangle: Military, Security, and Politics in Regime Change","author":"Kandil","year":"2016"},{"key":"2021021615035395100_tyaa026-B30","doi-asserted-by":"crossref","DOI":"10.1017\/9781108147873","volume-title":"Contesting Authoritarianism: Labor Challenges to the State in Egypt","author":"Bishara","year":"2018"},{"key":"2021021615035395100_tyaa026-B31","doi-asserted-by":"crossref","first-page":"271","DOI":"10.1353\/sor.2012.0035","article-title":"Fear and the ruptured state: reflections on Egypt after Mubarak","volume":"79","author":"Asad","year":"2012","journal-title":"Soc Res"},{"year":"1964","author":"Hofstadter","key":"2021021615035395100_tyaa026-B32"},{"key":"2021021615035395100_tyaa026-B33","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9781139565417","volume-title":"Power, Politics, and Paranoia: Why People Are Suspicious of Their Leaders","author":"van Prooijen","year":"2014"},{"volume-title":"Risk Society: Towards a New Modernity","year":"1992","author":"Beck","key":"2021021615035395100_tyaa026-B34"},{"key":"2021021615035395100_tyaa026-B35","doi-asserted-by":"crossref","DOI":"10.1108\/eb023001","volume-title":"The Risk Management of Everything: Rethinking the Politics of Uncertainty","author":"Power","year":"2004"},{"volume-title":"Mission Improbable: Using Fantasy Documents to Tame Disaster","year":"2001","author":"Clarke","key":"2021021615035395100_tyaa026-B36"},{"volume-title":"Coercion: The Power to Hurt in International Politics","year":"2018","author":"Greenhill","key":"2021021615035395100_tyaa026-B37"},{"key":"2021021615035395100_tyaa026-B38","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780190618094.001.0001","volume-title":"Cyber Strategy: The Evolving Character of Power and Coercion","author":"Valeriano","year":"2018"},{"key":"2021021615035395100_tyaa026-B39","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1080\/21693293.2013.804672","article-title":"The nature of resilience","volume":"1","author":"Zebrowski","year":"2013","journal-title":"Resilience"},{"key":"2021021615035395100_tyaa026-B40","doi-asserted-by":"crossref","first-page":"299","DOI":"10.1111\/1467-9256.12035","article-title":"The future of cyber-resilience in an age of global complexity","volume":"33","author":"Herrington","year":"2013","journal-title":"Politics"},{"key":"2021021615035395100_tyaa026-B41","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1177\/0967010614559637","article-title":"Resilience and (in)security: practices, subjects, temporalities","volume":"46","author":"Dunn Cavelty","year":"2015","journal-title":"Secur Dialogue"},{"volume-title":"Secrets: On the Ethics of Concealment and Revelation","year":"1989","author":"Bok","key":"2021021615035395100_tyaa026-B42"},{"volume-title":"The Declining Half-Life of Secrets and the Future of Signals Intelligence","year":"2015","author":"Swire","key":"2021021615035395100_tyaa026-B43"},{"key":"2021021615035395100_tyaa026-B44","doi-asserted-by":"crossref","first-page":"316","DOI":"10.1080\/09636412.2015.1038188","article-title":"Weaving tangled webs: offense, defense, and deception in cyberspace","volume":"24","author":"Gartzke","year":"2015","journal-title":"Secur Stud"},{"key":"2021021615035395100_tyaa026-B45","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1080\/01402390802407392","article-title":"Surprise and terrorism: a conceptual framework","volume":"32","author":"Morris","year":"2009","journal-title":"J Strateg Stud"},{"year":"2017","author":"Nedal","key":"2021021615035395100_tyaa026-B46"},{"key":"2021021615035395100_tyaa026-B47","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1080\/00396338.2015.1046230","article-title":"Governing cyberspace through constructive ambiguity","volume":"57","author":"Cornish","year":"2015","journal-title":"Survival"},{"key":"2021021615035395100_tyaa026-B48","doi-asserted-by":"crossref","first-page":"192","DOI":"10.1177\/1354066115584086","article-title":"Taking ambiguity seriously: explaining the indeterminacy of the European Union conventional arms export control regime","volume":"22","author":"Hansen","year":"2016","journal-title":"Eur J Int Relat"},{"key":"2021021615035395100_tyaa026-B49","doi-asserted-by":"crossref","DOI":"10.7208\/chicago\/9780226803531.001.0001","volume-title":"Regimes and Repertoires","author":"Tilly","year":"2006"},{"key":"2021021615035395100_tyaa026-B50","doi-asserted-by":"crossref","first-page":"1155","DOI":"10.1111\/j.1468-2478.2009.00572.x","article-title":"Digital disaster, cyber security, and the Copenhagen school","volume":"53","author":"Hansen","year":"2009","journal-title":"Int Stud Q"},{"key":"2021021615035395100_tyaa026-B51","doi-asserted-by":"crossref","DOI":"10.1093\/cybsec\/tyy006","article-title":"A taxonomy of cyber-harms: defining the impacts of cyber-attacks and understanding how they propagate","volume":"4","author":"Agrafiotis","year":"2018","journal-title":"J Cybersecurity"},{"key":"2021021615035395100_tyaa026-B52","doi-asserted-by":"crossref","first-page":"110","DOI":"10.1177\/1206331211430016","article-title":"Securing virtual space cyber war, cyber terror, and risk","volume":"15","author":"Barnard-Wills","year":"2012","journal-title":"Space Cult"},{"key":"2021021615035395100_tyaa026-B53","doi-asserted-by":"crossref","first-page":"701","DOI":"10.1007\/s11948-014-9551-y","article-title":"Breaking the cyber-security dilemma: aligning security needs and removing vulnerabilities","volume":"20","author":"Dunn Cavelty","year":"2014","journal-title":"Sci Eng Ethics"},{"key":"2021021615035395100_tyaa026-B54","first-page":"31","article-title":"Enacting expertise: ritual and risk in cybersecurity","volume":"6","author":"Shires","year":"2018","journal-title":"Polit Gov"},{"volume-title":"Contesting \u2018Cyber\u2019","year":"2017","author":"Shires","key":"2021021615035395100_tyaa026-B55"},{"key":"2021021615035395100_tyaa026-B56","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1080\/23738871.2019.1636108","article-title":"Hack-and-leak operations: intrusion and influence in the Gulf","volume":"4","author":"Shires","year":"2019","journal-title":"J Cyber Policy"},{"key":"2021021615035395100_tyaa026-B57","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9781316271636","volume-title":"Cyber Security and the Politics of Time","author":"Stevens","year":"2015"},{"key":"2021021615035395100_tyaa026-B58","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1080\/13523260.2019.1670006","article-title":"Cyber-noir: cybersecurity and popular culture","volume":"41","author":"Shires","year":"2020","journal-title":"Contemp Secur Policy"},{"author":"Branch","key":"2021021615035395100_tyaa026-B59"},{"year":"2018","author":"Shires","key":"2021021615035395100_tyaa026-B60"},{"volume-title":"Is the GCC Cyber Resilient?","year":"2020","author":"Shires","key":"2021021615035395100_tyaa026-B61"},{"key":"2021021615035395100_tyaa026-B62","doi-asserted-by":"crossref","first-page":"452","DOI":"10.1080\/01900692.2019.1680689","article-title":"The governance of Turkey\u2019s Cyberspace: between cyber security and information security","volume":"43","author":"Eldem","year":"2020","journal-title":"Int J Public Adm"},{"key":"2021021615035395100_tyaa026-B63","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1017\/gov.2013.47","article-title":"On violence and repression: a relational approach (The Government and Opposition\/Leonard Schapiro Memorial Lecture, 2013)","volume":"49","author":"della Porta","year":"2014","journal-title":"Gov Oppos"},{"key":"2021021615035395100_tyaa026-B64","doi-asserted-by":"crossref","first-page":"704","DOI":"10.1080\/03050629.2012.726187","article-title":"The Arab spring, winter, and back again? (Re)Introducing the dissent-repression nexus with a twist","volume":"38","author":"Davenport","year":"2012","journal-title":"Int Interact"},{"key":"2021021615035395100_tyaa026-B65","doi-asserted-by":"crossref","first-page":"1122","DOI":"10.1177\/0003122414554081","article-title":"Protest on the fly: toward a theory of spontaneity in the dynamics of protest and social movements","volume":"79","author":"Snow","year":"2014","journal-title":"Am Sociol Rev"},{"volume-title":"Players and Arenas: The Interactive Dynamics of Protest","year":"2015","author":"Duyvendak","key":"2021021615035395100_tyaa026-B66"},{"key":"2021021615035395100_tyaa026-B67","doi-asserted-by":"crossref","DOI":"10.5117\/9789089647597","volume-title":"Breaking Down the State: Protestors Engaged","author":"Duyvendak","year":"2015"},{"key":"2021021615035395100_tyaa026-B68","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1080\/14742837.2017.1344547","article-title":"Unpacking the effects of repression: the evolution of Islamist repertoires of contention in Egypt after the fall of President Morsi","volume":"17","author":"Grimm","year":"2018","journal-title":"Soc Mov Stud"},{"key":"2021021615035395100_tyaa026-B69","doi-asserted-by":"crossref","DOI":"10.1515\/9789048536160","volume-title":"Microfoundations of the Arab Uprisings: Mapping Interactions between Regimes and Protesters","author":"Volpi","year":"2017"},{"key":"2021021615035395100_tyaa026-B70","volume-title":"Global Cultures of Contestation: Mobility, Sustainability, Aesthetics & Connectivity","author":"Alimardani","year":"2017","edition":"1st edn."},{"key":"2021021615035395100_tyaa026-B71","doi-asserted-by":"crossref","DOI":"10.1177\/2053951719885967","article-title":"From data politics to the contentious politics of data","author":"Beraldo","year":"2019","journal-title":"Big Data Soc"},{"year":"2017","author":"Giandomenico","key":"2021021615035395100_tyaa026-B72"},{"volume-title":"Advanced Persistent Threat Hacking: The Art and Science of Hacking Any Organization","year":"2014","author":"Wrightson","key":"2021021615035395100_tyaa026-B73"},{"volume-title":"The Cyber Deterrence Problem.","year":"2020","author":"Brantly","key":"2021021615035395100_tyaa026-B74"},{"key":"2021021615035395100_tyaa026-B75","doi-asserted-by":"crossref","DOI":"10.1177\/1357034X15623622","article-title":"Surveillance, data and embodiment: on the work of being watched","author":"Smith","year":"2016","journal-title":"Body Soc"},{"key":"2021021615035395100_tyaa026-B76","doi-asserted-by":"crossref","DOI":"10.1177\/1461444818775968","article-title":"Deconstructing datafication\u2019s brave new world","author":"Couldry","year":"2018","journal-title":"New Media Soc"},{"volume-title":"The Age of Surveillance Capitalism: The Fight for the Future at the New Frontier of Power","year":"2019","author":"Zuboff\u00a0","key":"2021021615035395100_tyaa026-B77"},{"key":"2021021615035395100_tyaa026-B78","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1002\/poi3.190","article-title":"Requiem for a dream: on advancing human rights via internet architecture","volume":"11","author":"Mueller","year":"2019","journal-title":"Policy Internet"},{"key":"2021021615035395100_tyaa026-B79","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1002\/poi3.200","article-title":"Internet architecture and human rights: beyond the human rights gap","volume":"11","author":"Zalnieriute","year":"2019","journal-title":"Policy Internet"},{"volume-title":"The Culture of Surveillance: Watching as a Way of Life","year":"2018","author":"Lyon","key":"2021021615035395100_tyaa026-B80"},{"key":"2021021615035395100_tyaa026-B81","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1111\/j.1460-2466.2012.01636.x","article-title":"Social media and the activist toolkit: user agreements, corporate interests, and the information infrastructure of modern social movements","volume":"62","author":"Youmans","year":"2012","journal-title":"J Commun"},{"key":"2021021615035395100_tyaa026-B82","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1111\/ips.12048","article-title":"After Snowden: rethinking the impact of surveillance","volume":"8","author":"Bauman","year":"2014","journal-title":"Int Polit Sociol"},{"key":"2021021615035395100_tyaa026-B83","doi-asserted-by":"crossref","first-page":"474","DOI":"10.1080\/1369118X.2018.1518472","article-title":"Online censorship and digital surveillance: the relationship between suppression technologies and democratization across countries","volume":"23","author":"Stoycheff","year":"2020","journal-title":"Inf Commun Soc"},{"key":"2021021615035395100_tyaa026-B84","doi-asserted-by":"crossref","first-page":"887","DOI":"10.1162\/002081898550789","article-title":"International norm dynamics and political change","volume":"52","author":"Finnemore","year":"1998","journal-title":"Int Organ"},{"key":"2021021615035395100_tyaa026-B85","doi-asserted-by":"crossref","first-page":"625","DOI":"10.1162\/105474605775196571","article-title":"Sousveillance and Cyborglogs: a 30-year empirical voyage through ethical, legal, and policy issues","volume":"14","author":"Mann","year":"2005","journal-title":"Presence Teleoperators Virtual Environ"},{"key":"2021021615035395100_tyaa026-B86","doi-asserted-by":"crossref","first-page":"416","DOI":"10.1080\/1369118X.2017.1284880","article-title":"Twitter and video activism as tools for counter-surveillance: the case of social protests in Spain","volume":"21","author":"Hermida","year":"2018","journal-title":"Inf Commun Soc"},{"key":"2021021615035395100_tyaa026-B87","first-page":"1","article-title":"Expose, debunk, ridicule, resist! Networked civic monitoring of populist radical right online action in Finland","volume":"23","author":"Hatakka","year":"2019","journal-title":"Inf Commun Soc"},{"key":"2021021615035395100_tyaa026-B88","doi-asserted-by":"crossref","first-page":"576","DOI":"10.1177\/0163443716643006","article-title":"Crypto and empire: the contradictions of counter-surveillance advocacy","volume":"38","author":"G\u00fcrses","year":"2016","journal-title":"Media Cult Soc"},{"key":"2021021615035395100_tyaa026-B89","doi-asserted-by":"crossref","DOI":"10.1177\/2053951716679678","article-title":"Towards data justice? The ambiguity of anti-surveillance resistance in political activism","author":"Dencik","year":"2016","journal-title":"Big Data Soc"},{"key":"2021021615035395100_tyaa026-B90","doi-asserted-by":"crossref","first-page":"1014","DOI":"10.1080\/1369118X.2018.1451908","article-title":"Counter-surveillance and alternative new media in Turkey","volume":"21","author":"Ataman","year":"2018","journal-title":"Inf Commun Soc"},{"key":"2021021615035395100_tyaa026-B91","doi-asserted-by":"crossref","DOI":"10.17645\/mac.v3i3.277","article-title":"Veillant panoptic assemblage\u2019: mutual watching and resistance to mass surveillance after Snowden","volume":"3","author":"Bakir","year":"2015","journal-title":"Media Commun"},{"year":"2017","author":"The new cyber military-industrial complex","key":"2021021615035395100_tyaa026-B92"},{"key":"2021021615035395100_tyaa026-B93","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1353\/jod.2015.0051","article-title":"Authoritarianism goes global: cyberspace under siege","volume":"26","author":"Deibert","year":"2015","journal-title":"J Democr"},{"volume-title":"Black Code: Inside the Battle for Cyberspace","year":"2013","author":"Deibert","key":"2021021615035395100_tyaa026-B94"},{"key":"2021021615035395100_tyaa026-B95","article-title":"TikTok sorry for blocking teenager who disguised Xinjiang video as make-up tutorial","author":"Kuo","year":"2019","journal-title":"The Guardian"},{"volume-title":"Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous","year":"2014","author":"Coleman","key":"2021021615035395100_tyaa026-B96"},{"volume-title":"Chilling Effects: NSA Surveillance Drives U.S. Writers to Self-Censor","year":"2013","author":"PEN","key":"2021021615035395100_tyaa026-B97"},{"key":"2021021615035395100_tyaa026-B98","doi-asserted-by":"crossref","DOI":"10.14763\/2017.2.692","article-title":"Internet surveillance, regulation, and chilling effects online: a comparative case study","volume":"6","author":"Penney","year":"2017","journal-title":"Internet Policy Rev"},{"key":"2021021615035395100_tyaa026-B99","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1080\/23738871.2018.1455884","article-title":"Freedom of expression in the digital age: enhanced or undermined? The case of Egypt","volume":"3","author":"Fathy","year":"2018","journal-title":"J Cyber Policy"},{"volume-title":"Safer Field Research in the Social Sciences: A Guide to Human and Digital Security in Hostile Environments","year":"2020","author":"Grimm","key":"2021021615035395100_tyaa026-B100"},{"year":"2016","key":"2021021615035395100_tyaa026-B101"},{"key":"2021021615035395100_tyaa026-B102","article-title":"One U.S. corporation\u2019s role in Egypt\u2019s brutal crackdown","author":"Karr","year":"2011","journal-title":"Huffington Post"},{"key":"2021021615035395100_tyaa026-B103","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1111\/j.1460-2466.2012.01628.x","article-title":"Clicks, cabs, and coffee houses: social media and oppositional movements in Egypt, 2004\u20132011","volume":"62","author":"Lim","year":"2012","journal-title":"J Commun"},{"key":"2021021615035395100_tyaa026-B104","doi-asserted-by":"crossref","first-page":"994","DOI":"10.1080\/1369118X.2015.1088049","article-title":"Protest leadership in the age of social media","volume":"19","author":"Poell","year":"2016","journal-title":"Inf Commun Soc"},{"year":"2011","author":"Staff Report","key":"2021021615035395100_tyaa026-B105"},{"key":"2021021615035395100_tyaa026-B106","doi-asserted-by":"crossref","first-page":"1141","DOI":"10.1177\/1461444818821375","article-title":"Revisiting leadership in information and communication technology (ICT)-enabled activism: a study of Egypt\u2019s grassroots human rights groups","volume":"21","author":"Azer","year":"2019","journal-title":"New Media Soc"},{"key":"2021021615035395100_tyaa026-B107","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1080\/10584609.2012.737439","article-title":"Media disruption and revolutionary unrest: evidence from Mubarak\u2019s quasi-experiment","volume":"31","author":"Hassanpour","year":"2014","journal-title":"Polit Commun"},{"key":"2021021615035395100_tyaa026-B108","article-title":"How was Egypt\u2019s internet access shut off?","author":"Greenemeier","year":"2011","journal-title":"Scientific American"},{"key":"2021021615035395100_tyaa026-B109","article-title":"Google and Twitter launch service enabling Egyptians to tweet by phone","author":"Arthur","year":"2011","journal-title":"The Guardian"},{"key":"2021021615035395100_tyaa026-B110","article-title":"British firm offered spying software to Egyptian regime \u2013 documents","author":"McVeigh","year":"2011","journal-title":"The Guardian"},{"key":"2021021615035395100_tyaa026-B111","article-title":"Egypt: how companies help the government spy on activists","author":"Raoof","year":"2011","journal-title":"Global Voices Advocacy"},{"year":"2014","author":"Amin","key":"2021021615035395100_tyaa026-B112"},{"year":"2013","author":"Marquis-Boire","key":"2021021615035395100_tyaa026-B113"},{"key":"2021021615035395100_tyaa026-B114","article-title":"National ICT Strategy 2012-2017: towards a digital society and knowledge-based economy","author":"MCIT (Egypt)","year":"2012","journal-title":"MCIT"},{"key":"2021021615035395100_tyaa026-B115"},{"key":"2021021615035395100_tyaa026-B116","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1353\/jod.1991.0033","article-title":"What democracy is\u2026and is not","volume":"2","author":"Schmitter","year":"1991","journal-title":"J Democr"},{"volume-title":"Terrorism and Civil Society: Post-9\/11 Progress and Challenges","year":"2020","author":"Hassib","key":"2021021615035395100_tyaa026-B117"},{"key":"2021021615035395100_tyaa026-B118","doi-asserted-by":"crossref","DOI":"10.7312\/tank16810","volume-title":"With Us and against Us: How America\u2019s Partners Help and Hinder the War on Terror","author":"Tankel","year":"2018"},{"year":"2015","author":"Kimball","key":"2021021615035395100_tyaa026-B119"},{"year":"2015","author":"Ahram Online","key":"2021021615035395100_tyaa026-B120"},{"year":"2015","author":"Staff Report","key":"2021021615035395100_tyaa026-B121"},{"year":"2017","author":"Tesquet","key":"2021021615035395100_tyaa026-B122"},{"year":"2014","author":"Frenkel","key":"2021021615035395100_tyaa026-B123"},{"year":"2014","author":"Ezzat","key":"2021021615035395100_tyaa026-B124"},{"year":"2018","key":"2021021615035395100_tyaa026-B125"},{"year":"2020","author":"AFTE Egypt","key":"2021021615035395100_tyaa026-B126"},{"year":"2017","author":"Staff Report","key":"2021021615035395100_tyaa026-B127"},{"year":"2019","key":"2021021615035395100_tyaa026-B128"},{"year":"2017","author":"Al-Sadiq","key":"2021021615035395100_tyaa026-B129"},{"year":"2018","author":"Ghaith","key":"2021021615035395100_tyaa026-B130"},{"year":"2016","author":"Staff Report","key":"2021021615035395100_tyaa026-B131"},{"year":"2017","author":"MM","key":"2021021615035395100_tyaa026-B132"},{"year":"2017","author":"Saker","key":"2021021615035395100_tyaa026-B133"},{"year":"2017","author":"AFTE Egypt","key":"2021021615035395100_tyaa026-B134"},{"year":"2016","author":"Greenberg","key":"2021021615035395100_tyaa026-B135"},{"year":"2018","author":"Marlinspike","key":"2021021615035395100_tyaa026-B136"},{"key":"2021021615035395100_tyaa026-B137","article-title":"Nile Phish: large scale phishing campaign targeting Egyptian civil society","volume":"2","author":"Scott-Railton","year":"2017","journal-title":"Citizen Lab"},{"year":"2016","author":"Raoof","key":"2021021615035395100_tyaa026-B138"},{"year":"2017","author":"Al-Bermawy","key":"2021021615035395100_tyaa026-B139"},{"key":"2021021615035395100_tyaa026-B140","article-title":"German-made FinSpy spyware found in Egypt, and Mac and Linux versions revealed","volume":"25","author":"Staff Report","year":"2020","journal-title":"Amnesty International"},{"year":"2019","author":"Abu Omar","key":"2021021615035395100_tyaa026-B141"},{"year":"2019","key":"2021021615035395100_tyaa026-B142"},{"year":"2019","author":"Hamama","key":"2021021615035395100_tyaa026-B143"},{"year":"2019","author":"Deknatel","key":"2021021615035395100_tyaa026-B144"},{"year":"2018","author":"Davidson","key":"2021021615035395100_tyaa026-B145"},{"year":"2016","key":"2021021615035395100_tyaa026-B146"},{"year":"2017","author":"Hakmeh","key":"2021021615035395100_tyaa026-B147"},{"year":"2019","author":"Staff Report","key":"2021021615035395100_tyaa026-B148"},{"year":"2018","author":"Supreme Cybersecurity Council","key":"2021021615035395100_tyaa026-B149"},{"year":"2019","author":"Gleicher","key":"2021021615035395100_tyaa026-B150"},{"year":"2019","author":"DFRLab","key":"2021021615035395100_tyaa026-B151"},{"year":"2019","author":"Twitter Safety","key":"2021021615035395100_tyaa026-B152"},{"year":"2019","author":"Gleicher","key":"2021021615035395100_tyaa026-B153"},{"year":"2019","author":"MEMO","key":"2021021615035395100_tyaa026-B154"},{"key":"2021021615035395100_tyaa026-B155","article-title":"Egypt curbs online dissent with street searches: \u2018he asked to see my phone\u2019","volume":"7","author":"Malsin","year":"2019","journal-title":"Wall Street Journal"},{"year":"2019","author":"Netblocks","key":"2021021615035395100_tyaa026-B156"},{"year":"2018","author":"Guerin","key":"2021021615035395100_tyaa026-B157"},{"year":"2019","author":"OTF Information Controls Fellow","key":"2021021615035395100_tyaa026-B158"},{"key":"2021021615035395100_tyaa026-B159","doi-asserted-by":"crossref","first-page":"411","DOI":"10.1017\/S0892679418000618","article-title":"Toward a human-centric approach to cybersecurity","volume":"32","author":"Deibert","year":"2018","journal-title":"Ethics Int Aff"},{"year":"2020","author":"Gunitsky","key":"2021021615035395100_tyaa026-B160"},{"key":"2021021615035395100_tyaa026-B161","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1007\/s11133-018-9373-3","article-title":"Deepening the explanation of radical flank effects: tracing contingent outcomes of destructive capacity","volume":"41","author":"Ellefsen","year":"2018","journal-title":"Qual Sociol"},{"volume-title":"Transnational Protest and Global Activism","year":"2004","author":"Porta","key":"2021021615035395100_tyaa026-B162"}],"container-title":["Journal of Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/cybersecurity\/article-pdf\/7\/1\/tyaa026\/36276523\/tyaa026.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"http:\/\/academic.oup.com\/cybersecurity\/article-pdf\/7\/1\/tyaa026\/36276523\/tyaa026.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,18]],"date-time":"2022-12-18T04:05:11Z","timestamp":1671336311000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article\/doi\/10.1093\/cybsec\/tyaa026\/6137887"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,1]]},"references-count":162,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,2,16]]}},"URL":"https:\/\/doi.org\/10.1093\/cybsec\/tyaa026","relation":{},"ISSN":["2057-2085","2057-2093"],"issn-type":[{"type":"print","value":"2057-2085"},{"type":"electronic","value":"2057-2093"}],"subject":[],"published-other":{"date-parts":[[2021,1,1]]},"published":{"date-parts":[[2021,1,1]]},"article-number":"tyaa026"}}