{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T07:54:47Z","timestamp":1776930887361,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":148,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2026,4,13]]},"DOI":"10.1145\/3772318.3790369","type":"proceedings-article","created":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T07:35:38Z","timestamp":1776065738000},"page":"1-30","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["From Using to Infrastructuring: Grassroots VPN-Building in Iran\u2019s Women\u2013Life\u2013Freedom Movement"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2120-1437","authenticated-orcid":false,"given":"Sarvin","family":"Qalandar","sequence":"first","affiliation":[{"name":"Zentrum f\u00fcr Digitalisierung S\u00fcdwestfalen, Siegen, Germany and Zentrum f\u00fcr Digitalisierung S\u00fcdwestfalen, Siegen, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9219-7327","authenticated-orcid":false,"given":"Philip","family":"Engelbutzeder","sequence":"additional","affiliation":[{"name":"University of Siegen, Siegen, Germany and University of Siegen, Siegen, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8613-3477","authenticated-orcid":false,"given":"Dave","family":"Randall","sequence":"additional","affiliation":[{"name":"University of Siegen, Siegen, Germany and University of Siegen, Siegen, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1214-1551","authenticated-orcid":false,"given":"Volker","family":"Wulf","sequence":"additional","affiliation":[{"name":"Institute of Information Systems and New Media, University of Siegen, Siegen, Germany and Institute of Information Systems and New Media, University of Siegen, Siegen, Germany"}]}],"member":"320","published-online":{"date-parts":[[2026,4,13]]},"reference":[{"key":"e_1_3_3_2_2_2","doi-asserted-by":"crossref","unstructured":"Konstantin Aal Maximilian Kr\u00fcger Markus Rohde Borislav Tadic and Volker Wulf. 2019. Social media and ICT usage in conflicts areas. Information Technology for Peace and Security: IT Applications and Infrastructures in Conflicts Crises War and Peace (2019) 383\u2013401.","DOI":"10.1007\/978-3-658-25652-4_18"},{"key":"e_1_3_3_2_3_2","doi-asserted-by":"crossref","unstructured":"Laila Abbas and Menna Elhosary. 2025. Digitized Narratives on# MahsaAmini: Constructing a Digital Transnational Feminist Movement on TikTok. Women\u2019s Studies in Communication 48 1 (2025) 122\u2013147.","DOI":"10.1080\/07491409.2024.2431332"},{"key":"e_1_3_3_2_4_2","unstructured":"Shahram Akbarzadeh Amin Naeni Ihsan Yilmaz and Galib Bashirov. 2024. Cyber Surveillance and Digital Authoritarianism in Iran. Global Policy. March (2024)."},{"key":"e_1_3_3_2_5_2","unstructured":"Alavi Shahed. 2020. Who are the Kulbars? Why are they Systematically Targeted and Killed?https:\/\/iranwire.com\/en\/features\/66702\/ Accessed: 2025-02-19."},{"key":"e_1_3_3_2_6_2","doi-asserted-by":"crossref","unstructured":"Sadaf\u00a0R Ali and Shahira Fahmy. 2013. Gatekeeping and citizen journalism: The use of social media during the recent uprisings in Iran Egypt and Libya. Media War & Conflict 6 1 (2013) 55\u201369.","DOI":"10.1177\/1750635212469906"},{"key":"e_1_3_3_2_7_2","unstructured":"Mahsa Alimardani. 2016. Iran Declares \u2018Unveiling\u2019of its National Intranet. Global Voices (2016)."},{"key":"e_1_3_3_2_8_2","doi-asserted-by":"crossref","unstructured":"Majdah Alshehri and Norman\u00a0Makoto Su. 2023. Comfort Activism: Online Photography for Social Change in a Minority Group. Proceedings of the ACM on Human-Computer Interaction 7 CSCW1 (2023) 1\u201333.","DOI":"10.1145\/3579468"},{"key":"e_1_3_3_2_9_2","unstructured":"Louis Althusser. 2010. Ideology and ideological state apparatuses (notes towards an investigation)(1970). Cultural theory: an Anthology (2010) 204\u2013222."},{"key":"e_1_3_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-31642-5_8"},{"key":"e_1_3_3_2_11_2","unstructured":"Collin Anderson. 2013. Dimming the Internet: Detecting throttling as a mechanism of censorship in Iran. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1306.4361 (2013)."},{"key":"e_1_3_3_2_12_2","volume-title":"3rd USENIX Workshop on Free and Open Communications on the Internet (FOCI 13)","author":"Aryan Simurgh","year":"2013","unstructured":"Simurgh Aryan, Homa Aryan, and J\u00a0Alex Halderman. 2013. Internet censorship in Iran: A first look. In 3rd USENIX Workshop on Free and Open Communications on the Internet (FOCI 13)."},{"key":"e_1_3_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642422"},{"key":"e_1_3_3_2_14_2","doi-asserted-by":"crossref","unstructured":"Thomas Berker and Ruth Woods. 2025. Resistance against zero-emission neighbourhood infrastructuring: key lessons from Norway. Buildings & Cities 6 1 (2025).","DOI":"10.5334\/bc.522"},{"key":"e_1_3_3_2_15_2","doi-asserted-by":"crossref","unstructured":"Ben Biedermann Matthew Scerri Victoria Kozlova and Joshua Ellul. 2025. Aggregating Digital Identities through Bridging. Distributed Ledger Technologies: Research and Practice 5 1 (2025) 1\u201317.","DOI":"10.1145\/3719661"},{"key":"e_1_3_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.4324\/9781315167305"},{"key":"e_1_3_3_2_17_2","unstructured":"Turkey Blocks. 2016. TOR network blocked in Turkey as government cracks down on VPN use. https:\/\/turkeyblocks.org\/2016\/12\/18\/tor-blocked-in-turkey-vpn-ban\/ Accessed: 2025-03-11."},{"key":"e_1_3_3_2_18_2","first-page":"97","volume-title":"International handbook of internet research","author":"Bowker Geoffrey\u00a0C","year":"2010","unstructured":"Geoffrey\u00a0C Bowker, Karen Baker, Florence Millerand, and David Ribes. 2010. Toward information infrastructure studies: Ways of knowing in a networked environment. In International handbook of internet research. Springer, 97\u2013117."},{"key":"e_1_3_3_2_19_2","doi-asserted-by":"crossref","unstructured":"Virginia Braun and Victoria Clarke. 2006. Using thematic analysis in psychology. Qualitative research in psychology 3 2 (2006) 77\u2013101.","DOI":"10.1191\/1478088706qp063oa"},{"key":"e_1_3_3_2_20_2","doi-asserted-by":"crossref","unstructured":"Richard\u00a0R Brooks Lu Yu Yu Fu Oluwakemi Hambolu John Gaynard Julie Owono Archippe Yepmou and Felix Blanc. 2018. Internet freedom in West Africa: technical support for journalists and democracy advocates. Commun. ACM 61 5 (2018) 72\u201382.","DOI":"10.1145\/3199477"},{"key":"e_1_3_3_2_21_2","doi-asserted-by":"crossref","unstructured":"Amber Buck. 2025. Redrawing the Maps: Digital Literacy Practices of Grassroots Activists. Communication Design Quarterly Review 12 2 (2025) 22\u201332.","DOI":"10.1145\/3655727.3655730"},{"key":"e_1_3_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.1145\/3657054.3657073"},{"key":"e_1_3_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.1145\/3598469.3598536"},{"key":"e_1_3_3_2_24_2","volume-title":"Networks of outrage and hope: Social movements in the Internet age","author":"Castells Manuel","year":"2015","unstructured":"Manuel Castells. 2015. Networks of outrage and hope: Social movements in the Internet age. John Wiley & Sons."},{"key":"e_1_3_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663720"},{"key":"e_1_3_3_2_26_2","first-page":"10","volume-title":"Workshop at the crossroads: The interaction of HCI and systems issues in UbiComp","author":"Chalmers Matthew","year":"2003","unstructured":"Matthew Chalmers and Ian MacColl. 2003. Seamful and seamless design in ubiquitous computing. In Workshop at the crossroads: The interaction of HCI and systems issues in UbiComp , Vol.\u00a08. 10."},{"key":"e_1_3_3_2_27_2","doi-asserted-by":"crossref","unstructured":"Chen Chen. 2025. The post-digital life of transnational activists: Develop a tactical technological literacy. Communication Design Quarterly Review 12 3 (2025) 11\u201321.","DOI":"10.1145\/3563890.3713045"},{"key":"e_1_3_3_2_28_2","doi-asserted-by":"publisher","DOI":"10.1145\/3297662.3365814"},{"key":"e_1_3_3_2_29_2","doi-asserted-by":"crossref","unstructured":"Randy Connolly. 2023. Datafication platformization algorithmic governance and digital sovereignty: Four concepts you should teach. ACM Inroads 14 1 (2023) 40\u201348.","DOI":"10.1145\/3583087"},{"key":"e_1_3_3_2_30_2","unstructured":"Council on Foreign Relations. 2022. The Promise of Digital Activism and Its Dangers. https:\/\/www.cfr.org\/blog\/promise-digital-activism-and-its-dangers-0 Accessed: 2025-02-19."},{"key":"e_1_3_3_2_31_2","doi-asserted-by":"crossref","unstructured":"Christopher A\u00a0Le Dantec and Carl DiSalvo. 2013. Infrastructuring and the formation of publics in participatory design. Social Studies of Science 43 2 (2013) 241\u2013264.","DOI":"10.1177\/0306312712471581"},{"key":"e_1_3_3_2_32_2","doi-asserted-by":"publisher","DOI":"10.5555\/2584523"},{"key":"e_1_3_3_2_33_2","doi-asserted-by":"publisher","DOI":"10.14236\/ewic\/HCI2007.53"},{"key":"e_1_3_3_2_34_2","doi-asserted-by":"publisher","DOI":"10.1145\/3588001.3609368"},{"key":"e_1_3_3_2_35_2","doi-asserted-by":"crossref","unstructured":"Daniel\u00a0W Drezner. 2022. How not to sanction. International Affairs 98 5 (2022) 1533\u20131552.","DOI":"10.1093\/ia\/iiac065"},{"key":"e_1_3_3_2_36_2","doi-asserted-by":"crossref","unstructured":"Michaelanne Dye David Nemer Neha Kumar and Amy\u00a0S Bruckman. 2019. If it rains ask grandma to disconnect the nano: Maintenance & care in Havana\u2019s StreetNet. Proceedings of the ACM on human-computer interaction 3 CSCW (2019) 1\u201327.","DOI":"10.1145\/3359289"},{"key":"e_1_3_3_2_37_2","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/9780262015103.001.0001"},{"key":"e_1_3_3_2_38_2","unstructured":"Paul\u00a0N Edwards Steven\u00a0J Jackson Melissa\u00a0K Chalmers Geoffrey\u00a0C Bowker Christine\u00a0L Borgman David Ribes Matt Burton and Scout Calvert. 2013. Knowledge infrastructures: Intellectual frameworks and research challenges. (2013)."},{"key":"e_1_3_3_2_39_2","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815690"},{"key":"e_1_3_3_2_40_2","doi-asserted-by":"crossref","unstructured":"Roya Ensafi Philipp Winter Abdullah Mueen and Jedidiah\u00a0R Crandall. 2015. Analyzing the Great Firewall of China over space and time. Proceedings on privacy enhancing technologies (2015).","DOI":"10.1515\/popets-2015-0005"},{"key":"e_1_3_3_2_41_2","unstructured":"Steven Feldstein. 2021. Digital Technology\u2019s Evolving Role in politics protest and Repression. United States Institute of Peace (2021)."},{"key":"e_1_3_3_2_42_2","doi-asserted-by":"publisher","DOI":"10.1145\/3658644.3690198"},{"key":"e_1_3_3_2_43_2","doi-asserted-by":"crossref","unstructured":"Radoslaw Fiedler and Ellias\u00a0Aghili Dehnavi. 2024. Navigating Engagement with Iran: Exploring US Strategies and Options: A Futuristic Scenario and Review. (2024).","DOI":"10.22161\/ijels.92.18"},{"key":"e_1_3_3_2_44_2","unstructured":"Filter Watch. 2023. How the Iranian Government Pushes Users to the National Information Network by Raising Internet Prices. https:\/\/filter.watch\/english\/2024\/01\/01\/policy-monitor-dec-2023\/ Accessed: March 10 2025."},{"key":"e_1_3_3_2_45_2","unstructured":"Filter Watch. 2024. Investigative Report - November 2024: The Internet in Iran: From Public Resource to Exclusive Commodity \u2013 Exploring Pricing and Access Challenges. https:\/\/filter.watch\/english\/2024\/11\/30\/investigative-report-november-2024-internet-from-a-public-infrastructure-to-a-luxury-commodity\/ Accessed: March 10 2025."},{"key":"e_1_3_3_2_46_2","doi-asserted-by":"publisher","DOI":"10.1007\/1-4020-5386-X_19"},{"key":"e_1_3_3_2_47_2","doi-asserted-by":"publisher","DOI":"10.1145\/3643834.3661585"},{"key":"e_1_3_3_2_48_2","unstructured":"Freedom House. 2024. Freedom on the Net 2024 - Iran Country Report. https:\/\/freedomhouse.org\/country\/iran\/freedom-net\/2024 Accessed: March 10 2025."},{"key":"e_1_3_3_2_49_2","unstructured":"Sheera Frenkel. 2018. Iranian authorities block access to social media tools. The New York Times 2 (2018)."},{"key":"e_1_3_3_2_50_2","unstructured":"Friedrich-Ebert-Stiftung (FES). 2024. The Internet in the Women Life Freedom Era. https:\/\/library.fes.de\/pdf-files\/international\/21296.pdf Accessed: March 10 2025."},{"key":"e_1_3_3_2_51_2","doi-asserted-by":"crossref","unstructured":"Jordana\u00a0J George and Dorothy\u00a0E Leidner. 2019. From clicktivism to hacktivism: Understanding digital activism. Information and organization 29 3 (2019) 100249.","DOI":"10.1016\/j.infoandorg.2019.04.001"},{"key":"e_1_3_3_2_52_2","doi-asserted-by":"crossref","unstructured":"Phillipa Gill Masashi Crete-Nishihata Jakub Dalek Sharon Goldberg Adam Senft and Greg Wiseman. 2015. Characterizing web censorship worldwide: Another look at the opennet initiative data. ACM Transactions on the Web (TWEB) 9 1 (2015) 1\u201329.","DOI":"10.1145\/2700339"},{"key":"e_1_3_3_2_53_2","unstructured":"Global Indigenous Data Alliance (GIDA). 2019. CARE Principles for Indigenous Data Governance. https:\/\/static1.squarespace.com\/static\/5d3799de845604000199cd24\/t\/6397b363b502ff481fce6baf\/1670886246948\/CARE%2BPrinciples_One%2BPagers%2BFINAL_Oct_17_2019.pdf One-pager October 17 2019. Developed within the Research Data Alliance (RDA) International Indigenous Data Sovereignty Interest Group.."},{"key":"e_1_3_3_2_54_2","doi-asserted-by":"publisher","DOI":"10.1093\/oso\/9780197743577.001.0001"},{"key":"e_1_3_3_2_55_2","volume-title":"Iran protests spark wider adoption of anti-censorship tools","author":"Gold Ashley","unstructured":"Ashley Gold, Margaret Harding\u00a0McGill, and Scott Rosenberg. [n. d.]. Iran protests spark wider adoption of anti-censorship tools. Axios. https:\/\/www.axios.com\/2022\/09\/30\/iran-protests-vpn-google-jigsaw-outline"},{"key":"e_1_3_3_2_56_2","doi-asserted-by":"crossref","unstructured":"Margarita Grinko Sarvin Qalandar Dave Randall and Volker Wulf. 2022. Nationalizing the internet to break a protest movement: Internet shutdown and counter-appropriation in Iran of late 2019. Proceedings of the ACM on Human-Computer Interaction 6 CSCW2 (2022) 1\u201321.","DOI":"10.1145\/3555205"},{"key":"e_1_3_3_2_57_2","volume-title":"How the Death of a Kurdish Woman Galvanised Women in Iran","author":"Guardian The","year":"2022","unstructured":"The Guardian. 2022. How the Death of a Kurdish Woman Galvanised Women in Iran. https:\/\/www.theguardian.com\/world\/2022\/sep\/27\/how-death-kurdish-woman-galvanised-women-iran-mahsa-amini Accessed: 17-February-2025."},{"key":"e_1_3_3_2_58_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642279"},{"key":"e_1_3_3_2_59_2","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3512268"},{"key":"e_1_3_3_2_60_2","doi-asserted-by":"crossref","unstructured":"Christina\u00a0N Harrington Paola Favela Cella\u00a0M Sum Sarah Fox and Lynn Dombrowski. 2024. The Denizen Designer Project: Practices Relationships and Principles of Activist-Led Design. Proceedings of the ACM on Human-Computer Interaction 8 CSCW2 (2024) 1\u201332.","DOI":"10.1145\/3686897"},{"key":"e_1_3_3_2_61_2","unstructured":"Alireza Hashemzadegan and Ali Gholami. 2022. Internet Censorship in Iran: An Inside Look. Journal of Cyberspace Studies 6 2 (2022) 183\u2013204."},{"key":"e_1_3_3_2_62_2","doi-asserted-by":"publisher","DOI":"10.2307\/j.ctv550cf2.8"},{"key":"e_1_3_3_2_63_2","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278565"},{"key":"e_1_3_3_2_64_2","doi-asserted-by":"publisher","DOI":"10.1145\/3664476.3669930"},{"key":"e_1_3_3_2_65_2","doi-asserted-by":"crossref","unstructured":"Philip\u00a0N Howard and Malcolm\u00a0R Parks. 2012. Social media and political change: Capacity constraint and consequence. 359\u2013362\u00a0pages.","DOI":"10.1111\/j.1460-2466.2012.01626.x"},{"key":"e_1_3_3_2_66_2","volume-title":"Internet Cost Rises In Iran, Limiting People\u2019s Access To Information","author":"International Iran","year":"2022","unstructured":"Iran International. 2022. Internet Cost Rises In Iran, Limiting People\u2019s Access To Information. https:\/\/www.iranintl.com\/en\/202204193098 Accessed: March 10, 2025."},{"key":"e_1_3_3_2_67_2","unstructured":"Steven\u00a0J Jackson. 2013. Rethinking repair: breakdown maintenance and repair in media and technology studies today. Media meets technology MIT Press forthcoming 68 (2013)."},{"key":"e_1_3_3_2_68_2","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557332"},{"key":"e_1_3_3_2_69_2","doi-asserted-by":"crossref","unstructured":"H\u00e5kan Johansson and Gabriella Scaramuzzino. 2019. The logics of digital advocacy: Between acts of political influence and presence. New media & society 21 7 (2019) 1528\u20131545.","DOI":"10.1177\/1461444818822488"},{"key":"e_1_3_3_2_70_2","doi-asserted-by":"crossref","unstructured":"KD Joshi and Xuefei Deng. 2024. IT research in marginalized contexts: An evolving landscape. ACM SIGMIS Database: the DATABASE for Advances in Information Systems 55 2 (2024) 6\u201313.","DOI":"10.1145\/3663682.3663684"},{"key":"e_1_3_3_2_71_2","doi-asserted-by":"crossref","unstructured":"Helena Karasti Florence Millerand Christine\u00a0M Hine and Geoffrey\u00a0C Bowker. 2016. Knowledge infrastructures: part I. Science & Technology Studies 29 1 (2016) 2\u201312.","DOI":"10.23987\/sts.55406"},{"key":"e_1_3_3_2_72_2","doi-asserted-by":"crossref","unstructured":"Helena Karasti Volkmar Pipek and Geoffrey\u00a0C Bowker. 2018. An afterword to \u2018infrastructuring and collaborative design\u2019. Computer Supported Cooperative Work (CSCW) 27 2 (2018) 267\u2013289.","DOI":"10.1007\/s10606-017-9305-x"},{"key":"e_1_3_3_2_73_2","doi-asserted-by":"crossref","unstructured":"Ishan Karunanayake Nadeem Ahmed Robert Malaney Rafiqul Islam and Sanjay\u00a0K Jha. 2021. De-anonymisation attacks on tor: A survey. IEEE Communications Surveys & Tutorials 23 4 (2021) 2324\u20132350.","DOI":"10.1109\/COMST.2021.3093615"},{"key":"e_1_3_3_2_74_2","unstructured":"Andrea Kavanaugh Seungwon Yang Steven Sheetz Lin\u00a0Tzy Li and Edward Fox. 2011. Between a rock and a cell phone: Social media use during mass protests in Iran Tunisia and Egypt. (2011)."},{"key":"e_1_3_3_2_75_2","doi-asserted-by":"publisher","DOI":"10.1145\/3646547.3688447"},{"key":"e_1_3_3_2_76_2","unstructured":"Tomislav Kuna. 2015. MAINTENANCE OF POWER\u2013LOUIS ALTHYSSER\u2019S IDEOLOGICAL AND REPRESSIVE STATE APPARATUSES. Folia Linguistica et Litteraria13 (2015) 27\u201340."},{"key":"e_1_3_3_2_77_2","doi-asserted-by":"crossref","unstructured":"Brian Larkin. 2013. The politics and poetics of infrastructure. Annual review of anthropology 42 2013 (2013) 327\u2013343.","DOI":"10.1146\/annurev-anthro-092412-155522"},{"key":"e_1_3_3_2_78_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544549.3585834"},{"key":"e_1_3_3_2_79_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445263"},{"key":"e_1_3_3_2_80_2","doi-asserted-by":"publisher","DOI":"10.1007\/1-4020-5386-X_1"},{"key":"e_1_3_3_2_81_2","doi-asserted-by":"publisher","DOI":"10.1145\/3154448.3154450"},{"key":"e_1_3_3_2_82_2","doi-asserted-by":"crossref","unstructured":"Thomas Ludwig Volkmar Pipek and Peter Tolmie. 2018. Designing for collaborative infrastructuring: Supporting resonance activities. Proceedings of the ACM on Human-Computer Interaction 2 CSCW (2018) 1\u201329.","DOI":"10.1145\/3274382"},{"key":"e_1_3_3_2_83_2","doi-asserted-by":"crossref","unstructured":"Yao Lyu Jie Cai and John\u00a0M Carroll. 2025. A Systematic Literature Review of Infrastructure Studies in SIGCHI. Proceedings of the ACM on Human-Computer Interaction 9 7 (2025) 1\u201341.","DOI":"10.1145\/3757545"},{"key":"e_1_3_3_2_84_2","doi-asserted-by":"crossref","unstructured":"Tara Matthews Elie Bursztein Patrick\u00a0Gage Kelley Lea Kissner Andreas Kramm Andrew Oplinger Andreas Schou Manya Sleeper Stephan Somogyi Dalila Szostak et\u00a0al. 2025. Supporting the Digital Safety of At-Risk Users: Lessons Learned from 9+ Years of Research & Training. ACM Transactions on Computer-Human Interaction (2025).","DOI":"10.1145\/3716382"},{"key":"e_1_3_3_2_85_2","doi-asserted-by":"publisher","DOI":"10.1145\/3394332.3402823"},{"key":"e_1_3_3_2_86_2","doi-asserted-by":"crossref","unstructured":"Jessica McClearn Rikke\u00a0Bjerg Jensen and Reem Talhouk. 2024. Security patchworking in Lebanon: Infrastructuring across failing infrastructures. Proceedings of the ACM on Human-Computer Interaction 8 CSCW1 (2024) 1\u201326.","DOI":"10.1145\/3637397"},{"key":"e_1_3_3_2_87_2","doi-asserted-by":"crossref","unstructured":"Diego\u00a0A Mej\u00eda-Alandia. 2025. \u201cDigital Content for a Generation that Will Live to Witness the End Times\u201d Nostalgia and Social Change in Demagog Studio\u2019s Post-Apocalyptic Meta-Communication. ACM Games: Research and Practice 3 2 (2025) 1\u201313.","DOI":"10.1145\/3716319"},{"key":"e_1_3_3_2_88_2","unstructured":"Cristian Mendoza. 2022. The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power: by Shoshana Zuboff New York Public Affairs 2019 704 pp. \u20ac 20.00 ISBN 978-1610395694."},{"key":"e_1_3_3_2_89_2","doi-asserted-by":"crossref","unstructured":"Marcus Michaelsen. 2017. Far away so close: Transnational activism digital surveillance and authoritarian control in Iran. Surveillance & Society 15 3\/4 (2017) 465\u2013470.","DOI":"10.24908\/ss.v15i3\/4.6635"},{"key":"e_1_3_3_2_90_2","doi-asserted-by":"crossref","unstructured":"Ellen Middaugh Lynn\u00a0Schofield Clark and Parissa\u00a0J Ballard. 2017. Digital media participatory politics and positive youth development. Pediatrics 140 Supplement_2 (2017) S127\u2013S131.","DOI":"10.1542\/peds.2016-1758Q"},{"key":"e_1_3_3_2_91_2","doi-asserted-by":"publisher","DOI":"10.5555\/2601822"},{"key":"e_1_3_3_2_92_2","doi-asserted-by":"publisher","DOI":"10.1145\/3670243.3674223"},{"key":"e_1_3_3_2_93_2","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243824"},{"key":"e_1_3_3_2_94_2","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134075"},{"key":"e_1_3_3_2_95_2","doi-asserted-by":"publisher","DOI":"10.1145\/3080556.3080564"},{"key":"e_1_3_3_2_96_2","unstructured":"CTV News. 2024. Shutdown of Telegram App in Iran a Major Blow to Protest Movement. https:\/\/www.ctvnews.ca\/world\/article\/shutdown-of-telegram-app-in-iran-a-major-blow-to-protest-movement\/ Accessed: March 10 2025."},{"key":"e_1_3_3_2_97_2","doi-asserted-by":"crossref","unstructured":"Elena Not Chiara Leonardi Diego L\u00f3pez-De-Ipi\u00f1a Daniel Silva\u00a0Palacios Ruben S\u00e1nchez-Corcuera Raman Kazhamiakin and Matteo Gerosa. 2024. Designing a digital environment to support the co-production of public services: Balancing multiple requirements and governance concepts. Digital Government: Research and Practice 5 3 (2024) 1\u201330.","DOI":"10.1145\/3664612"},{"key":"e_1_3_3_2_98_2","doi-asserted-by":"crossref","unstructured":"Meghan\u00a0L O\u2019Sullivan. 2010. Iran and the great sanctions debate. The Washington Quarterly 33 4 (2010) 7\u201321.","DOI":"10.1080\/0163660X.2010.516638"},{"key":"e_1_3_3_2_99_2","doi-asserted-by":"crossref","unstructured":"Elena Parmiggiani. 2017. This is not a fish: on the scale and politics of infrastructure design studies. Computer Supported Cooperative Work (CSCW) 26 1 (2017) 205\u2013243.","DOI":"10.1007\/s10606-017-9266-0"},{"key":"e_1_3_3_2_100_2","doi-asserted-by":"publisher","DOI":"10.1007\/1-4020-5386-X_15"},{"key":"e_1_3_3_2_101_2","doi-asserted-by":"crossref","unstructured":"Volkmar Pipek and Volker Wulf. 2009. Infrastructuring: Toward an integrated perspective on the design and use of information technology. Journal of the Association for Information Systems 10 5 (2009) 1.","DOI":"10.17705\/1jais.00195"},{"key":"e_1_3_3_2_102_2","doi-asserted-by":"publisher","DOI":"10.1145\/3744169.3744177"},{"key":"e_1_3_3_2_103_2","doi-asserted-by":"crossref","unstructured":"Israr Qureshi Shan\u00a0L Pan and Yingqin Zheng. 2021. Digital social innovation: An overview and research framework.Information Systems Journal 31 5 (2021).","DOI":"10.1111\/isj.12362"},{"key":"e_1_3_3_2_104_2","doi-asserted-by":"crossref","unstructured":"Babak Rahimi. 2011. The agonistic social media: Cyberspace in the formation of dissent and consolidation of state power in postelection Iran. The Communication Review 14 3 (2011) 158\u2013178.","DOI":"10.1080\/10714421.2011.597240"},{"key":"e_1_3_3_2_105_2","volume-title":"Iran\u2019s Minority Kurds in Focus After Woman\u2019s Death in Custody","year":"2022","unstructured":"Reuters. 2022. Iran\u2019s Minority Kurds in Focus After Woman\u2019s Death in Custody. https:\/\/www.reuters.com\/world\/middle-east\/irans-minority-kurds-focus-after-womans-death-custody-2022-10-10\/ Accessed: 17-February-2025."},{"key":"e_1_3_3_2_106_2","volume-title":"Censored: distraction and diversion inside China\u2019s Great Firewall","author":"Roberts Margaret","year":"2018","unstructured":"Margaret Roberts. 2018. Censored: distraction and diversion inside China\u2019s Great Firewall. Princeton University Press."},{"key":"e_1_3_3_2_107_2","first-page":"187","volume-title":"Proceedings of IADIS International Conference on e-Society","author":"Rohde Markus","year":"2003","unstructured":"Markus Rohde. 2003. Building an e-community of Iranian NGOs. In Proceedings of IADIS International Conference on e-Society. 187\u2013194."},{"key":"e_1_3_3_2_108_2","unstructured":"Markus Rohde. 2003. Supporting an Electronic \u201aCommunity of Practice\u2019of Iranian Civil Society Organizations\u2019. IADIS International Journal on WWW\/Internet 1 2 (2003) 91\u2013106."},{"key":"e_1_3_3_2_109_2","doi-asserted-by":"crossref","unstructured":"Markus Rohde. 2004. Find what binds. Building social capital in an Iranian NGO community system. Social capital and information technology 75 (2004) 111.","DOI":"10.7551\/mitpress\/6289.003.0006"},{"key":"e_1_3_3_2_110_2","volume-title":"Workshop Paper, Proceedings of ACM Conference on Computer Supported Cooperative Work","author":"Rohde Markus","year":"2013","unstructured":"Markus Rohde. 2013. Trust in electronically-supported networks of political activists. In Workshop Paper, Proceedings of ACM Conference on Computer Supported Cooperative Work."},{"key":"e_1_3_3_2_111_2","doi-asserted-by":"crossref","unstructured":"Markus Rohde Konstantin Aal Kaoru Misaki Dave Randall Anne Weibert and Volker Wulf. 2016. Out of Syria: Mobile media in use at the time of civil war. International Journal of Human-Computer Interaction 32 7 (2016) 515\u2013531.","DOI":"10.1080\/10447318.2016.1177300"},{"key":"e_1_3_3_2_112_2","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518768"},{"key":"e_1_3_3_2_113_2","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517579"},{"key":"e_1_3_3_2_114_2","unstructured":"Ibrahim Saleh. 2012. When the sweet \u2018Arab Spring\u2019turns sour: The ties that bind. ASJMC Insights. Journal of the Association of Schools of Journalism and Mass Communication (ASJMC) (2012)."},{"key":"e_1_3_3_2_115_2","doi-asserted-by":"crossref","unstructured":"Nivien Saleh. 2012. Egypt\u2019s digital activism and the Dictator\u2019s Dilemma: An evaluation. Telecommunications Policy 36 6 (2012) 476\u2013483.","DOI":"10.1016\/j.telpol.2012.04.001"},{"key":"e_1_3_3_2_116_2","doi-asserted-by":"publisher","DOI":"10.1145\/3627611.3627613"},{"key":"e_1_3_3_2_117_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642826"},{"key":"e_1_3_3_2_118_2","doi-asserted-by":"crossref","unstructured":"Peer Schouten and Jan Bachmann. 2022. Infrastructural frontiers: Terrains of resistance at the material edge of the state. Geoforum 136 (2022) 219\u2013224.","DOI":"10.1016\/j.geoforum.2022.06.002"},{"key":"e_1_3_3_2_119_2","doi-asserted-by":"crossref","unstructured":"Bryan Semaan. 2019. \u2019Routine Infrastructuring\u2019as\u2019 Building Everyday Resilience with Technology\u2019 When Disruption Becomes Ordinary. Proceedings of the ACM on Human-Computer Interaction 3 CSCW (2019) 1\u201324.","DOI":"10.1145\/3359175"},{"key":"e_1_3_3_2_120_2","volume-title":"Kurdish diaspora, identities, and transnational activism","year":"2021","unstructured":"Shabaka. 2021. Kurdish diaspora, identities, and transnational activism. Shabaka. https:\/\/shabaka.org\/kurdish-diaspora-identities-and-transnational-activism\/"},{"key":"e_1_3_3_2_121_2","doi-asserted-by":"crossref","unstructured":"Jeffrey Shantz. 2009. Re-building infrastructures of resistance. Socialism and Democracy 23 2 (2009) 102\u2013109.","DOI":"10.1080\/08854300902904949"},{"key":"e_1_3_3_2_122_2","doi-asserted-by":"publisher","DOI":"10.1145\/3709026.3709100"},{"key":"e_1_3_3_2_123_2","doi-asserted-by":"crossref","unstructured":"Dan Sholler. 2020. Infrastructuring as an occasion for resistance: Organized resistance to policy-driven information infrastructure development in the US healthcare industry. Computer Supported Cooperative Work (CSCW) 29 4 (2020) 451\u2013496.","DOI":"10.1007\/s10606-020-09375-z"},{"key":"e_1_3_3_2_124_2","doi-asserted-by":"crossref","unstructured":"Robert Soden David Ribes Seyram Avle and Will Sutherland. 2021. Time for historicism in CSCW: An invitation. Proceedings of the ACM on Human-Computer Interaction 5 CSCW2 (2021) 1\u201318.","DOI":"10.1145\/3479603"},{"key":"e_1_3_3_2_125_2","doi-asserted-by":"publisher","DOI":"10.1145\/3598469.3598470"},{"key":"e_1_3_3_2_126_2","doi-asserted-by":"crossref","unstructured":"Susan\u00a0Leigh Star. 1999. The ethnography of infrastructure. American behavioral scientist 43 3 (1999) 377\u2013391.","DOI":"10.1177\/00027649921955326"},{"key":"e_1_3_3_2_127_2","unstructured":"Susan\u00a0Leigh Star and Geoffrey\u00a0C Bowker. 2006. How to infrastructure. Handbook of new media: Social shaping and social consequences of ICTs (2006) 230\u2013245."},{"key":"e_1_3_3_2_128_2","volume-title":"VPNs Surge Amid Protests, Conflict and War in 2022","author":"Department Statista Research","unstructured":"Statista Research Department. [n. d.]. VPNs Surge Amid Protests, Conflict and War in 2022. Statista. https:\/\/www.statista.com\/chart\/28378\/vpn-surge-by-country-in-2022\/ Chart."},{"key":"e_1_3_3_2_129_2","doi-asserted-by":"crossref","unstructured":"Sharifa Sultana Pratyasha Saha Shaid Hasan SM\u00a0Raihanul Alam Rokeya Akter Md\u00a0Mirajul Islam Raihan\u00a0Islam Arnob AKM\u00a0Najmul Islam Mahdi\u00a0Nasrullah Al-Ameen and Syed\u00a0Ishtiaque Ahmed. 2022. Imagined online communities: Communionship sovereignty and inclusiveness in Facebook Groups. Proceedings of the ACM on Human-Computer Interaction 6 CSCW2 (2022) 1\u201329.","DOI":"10.1145\/3555132"},{"key":"e_1_3_3_2_130_2","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417883"},{"key":"e_1_3_3_2_131_2","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858153"},{"key":"e_1_3_3_2_132_2","doi-asserted-by":"crossref","unstructured":"Qingfeng Tan Xuebin Wang Wei Shi Jian Tang and Zhihong Tian. 2022. An anonymity vulnerability in tor. IEEE\/ACM Transactions on Networking 30 6 (2022) 2574\u20132587.","DOI":"10.1109\/TNET.2022.3174003"},{"key":"e_1_3_3_2_133_2","doi-asserted-by":"crossref","unstructured":"Tiera Tanksley. 2020. Texting tweeting and talking back to power: How black girls leverage social media as a platform for civic engagement. Black Girl Civics: Expanding and Navigating the Boundaries of Civic Engagement. Information Age Publishing (2020).","DOI":"10.1108\/978-1-64802-218-020251015"},{"key":"e_1_3_3_2_134_2","doi-asserted-by":"crossref","unstructured":"Jordan Taylor Wesley\u00a0Hanwen Deng Kenneth Holstein Sarah Fox and Haiyi Zhu. 2024. Carefully Unmaking the \u201cMarginalized User\u201d: A Diffractive Analysis of a Gay Online Community. ACM Transactions on Computer-Human Interaction 31 6 (2024) 1\u201330.","DOI":"10.1145\/3673229"},{"key":"e_1_3_3_2_135_2","volume-title":"Twitter and tear gas: The power and fragility of networked protest","author":"Tufekci Zeynep","year":"2017","unstructured":"Zeynep Tufekci. 2017. Twitter and tear gas: The power and fragility of networked protest. Yale University Press."},{"key":"e_1_3_3_2_136_2","unstructured":"UK Home Office. 2022. Country Policy and Information Note: Smugglers Iran. https:\/\/www.gov.uk\/government\/publications\/iran-country-policy-and-information-notes\/country-policy-and-information-note-smugglers-iran-february-2022-accessible Accessed: 2025-02-19."},{"key":"e_1_3_3_2_137_2","doi-asserted-by":"crossref","unstructured":"Danial Vahabli. 2025. From the global South to the human rights stage: A study of global frame resonance using a comparative case of Women Life Freedom and Bloody November in Iran. International Journal of Comparative Sociology 66 2 (2025) 320\u2013348.","DOI":"10.1177\/00207152241269783"},{"key":"e_1_3_3_2_138_2","doi-asserted-by":"crossref","unstructured":"Willem Van\u00a0Kemenade. 2010. China vs. the Western campaign for Iran sanctions. The Washington Quarterly 33 3 (2010) 99\u2013114.","DOI":"10.1080\/0163660X.2010.492344"},{"key":"e_1_3_3_2_139_2","volume-title":"Neue Funktionen in MAXQDA 24","author":"GmbH VERBI","year":"2025","unstructured":"VERBI GmbH. 2025. Neue Funktionen in MAXQDA 24. MAXQDA. https:\/\/www.maxqda.com\/de\/neu-in-maxqda-24"},{"key":"e_1_3_3_2_140_2","doi-asserted-by":"publisher","DOI":"10.1145\/3314183.3324965"},{"key":"e_1_3_3_2_141_2","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813715"},{"key":"e_1_3_3_2_142_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642681"},{"key":"e_1_3_3_2_143_2","doi-asserted-by":"publisher","DOI":"10.1145\/2517840.2517856"},{"key":"e_1_3_3_2_144_2","doi-asserted-by":"crossref","unstructured":"Priscilla\u00a0NY Wong Aneesha Singh and Duncan\u00a0P Brumby. 2024. I Just Don\u2019t Quite Fit In: How People of Colour Participate in Online and Offline Climate Activism. Proceedings of the ACM on Human-Computer Interaction 8 CSCW1 (2024) 1\u201335.","DOI":"10.1145\/3637347"},{"key":"e_1_3_3_2_145_2","doi-asserted-by":"crossref","unstructured":"Volker Wulf Dave Randall Konstantin Aal and Markus Rohde. 2022. The personal is the political: Internet filtering and counter appropriation in the Islamic Republic of Iran. Computer Supported Cooperative Work (CSCW) 31 2 (2022) 373\u2013409.","DOI":"10.1007\/s10606-022-09426-7"},{"key":"e_1_3_3_2_146_2","doi-asserted-by":"crossref","unstructured":"Diwen Xue Reethika Ramesh Arham Jain Michaelis Kallitsis J\u00a0Alex Halderman Jedidiah\u00a0R Crandall and Roya Ensafi. 2025. OpenVPN is open to VPN fingerprinting. Commun. ACM 68 1 (2025) 79\u201387.","DOI":"10.1145\/3618117"},{"key":"e_1_3_3_2_147_2","doi-asserted-by":"crossref","unstructured":"Altug Yalcintas and Naseraddin Alizadeh. 2020. Digital protectionism and national planning in the age of the internet: the case of Iran. Journal of Institutional Economics 16 4 (2020) 519\u2013536.","DOI":"10.1017\/S1744137420000077"},{"key":"e_1_3_3_2_148_2","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978365"},{"key":"e_1_3_3_2_149_2","doi-asserted-by":"publisher","DOI":"10.4324\/9781003320609-27"}],"event":{"name":"CHI 2026: CHI Conference on Human Factors in Computing Systems","location":"Barcelona Spain","acronym":"CHI '26","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2026 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3772318.3790369","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T08:48:59Z","timestamp":1776415739000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3772318.3790369"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,4,13]]},"references-count":148,"alternative-id":["10.1145\/3772318.3790369","10.1145\/3772318"],"URL":"https:\/\/doi.org\/10.1145\/3772318.3790369","relation":{},"subject":[],"published":{"date-parts":[[2026,4,13]]},"assertion":[{"value":"2026-04-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}