{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T02:26:27Z","timestamp":1773455187142,"version":"3.50.1"},"reference-count":23,"publisher":"SAGE Publications","issue":"2","license":[{"start":{"date-parts":[[2016,3,31]],"date-time":"2016-03-31T00:00:00Z","timestamp":1459382400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["New Media &amp; Society"],"published-print":{"date-parts":[[2018,2]]},"abstract":"<jats:p> Why do people use anonymity-granting technologies when surfing the Internet? Anecdotal evidence suggests that people often resort to using online anonymity services, like the Tor network, because they are concerned about the possibility of their government infringing their civil and political rights, especially in highly repressive regimes. This claim has yet to be subject to rigorous cross-national, over time testing. In this article, econometric analysis of newly compiled data on Tor network usage from 2011 to 2013 shows that the relationship between political repression and the use of the Tor network is U-shaped. Political repression drives usage of Tor the most in both highly repressive and highly liberal contexts. The shape of this relationship plausibly emerges as a function of people\u2019s opportunity to use Tor and their need to use anonymity-granting technologies to express their basic political rights in highly repressive regimes. <\/jats:p>","DOI":"10.1177\/1461444816639976","type":"journal-article","created":{"date-parts":[[2016,4,1]],"date-time":"2016-04-01T01:45:54Z","timestamp":1459475154000},"page":"435-452","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":42,"title":["Tor, what is it good for? Political repression and the use of online anonymity-granting technologies"],"prefix":"10.1177","volume":"20","author":[{"given":"Eric","family":"Jardine","sequence":"first","affiliation":[{"name":"Centre for International Governance Innovation (CIGI), Canada"}]}],"member":"179","published-online":{"date-parts":[[2016,3,31]]},"reference":[{"key":"bibr1-1461444816639976","doi-asserted-by":"publisher","DOI":"10.1111\/0020-8833.00215"},{"key":"bibr2-1461444816639976","unstructured":"BBC World News (2014) Russia offers $110,000 to crack Tor anonymous network. BBC World News. Available at: http:\/\/www.bbc.com\/news\/technology-28526021 (accessed 7 November 2014)."},{"key":"bibr3-1461444816639976","doi-asserted-by":"publisher","DOI":"10.1353\/hrq.1995.0001"},{"key":"bibr4-1461444816639976","unstructured":"Freedom House (2014) Available at: https:\/\/freedomhouse.org\/"},{"key":"bibr5-1461444816639976","unstructured":"Goodin D (2014) Active attack on Tor network tried to decloak users for five months. ArcTechnica. Available at: http:\/\/arstechnica.com\/security\/2014\/07\/active-attack-on-tor-network-tried-to-decloak-users-for-five-months\/ (accessed 29 September 2014)."},{"key":"bibr6-1461444816639976","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2478.2009.00580.x"},{"key":"bibr7-1461444816639976","doi-asserted-by":"publisher","DOI":"10.1177\/0022343307078942"},{"key":"bibr8-1461444816639976","author":"Hampson F","year":"2016","journal-title":"Look Who\u2019s Watching: Why the World is Losing Faith in the Internet. Waterloo:"},{"key":"bibr9-1461444816639976","doi-asserted-by":"publisher","DOI":"10.1177\/0022002791035001007"},{"key":"bibr10-1461444816639976","doi-asserted-by":"publisher","DOI":"10.1023\/A:1006250203828"},{"key":"bibr11-1461444816639976","doi-asserted-by":"crossref","unstructured":"Jardine E (2015) The Dark Web Dilemma: Tor, Anonymity and Online Policing. Global Commission on Internet Governance paper series no. 21. Available at: http:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=2667711","DOI":"10.2139\/ssrn.2667711"},{"key":"bibr12-1461444816639976","unstructured":"Lambert T (2003) When you need to correct for clustering. Deltoid. Available at: http:\/\/scienceblogs.com\/deltoid\/2003\/09\/10\/cluster\/ (accessed 7 November 2014)."},{"key":"bibr13-1461444816639976","unstructured":"MIT Technology Review (2012) How China blocks the Tor anonymity network. MIT Technology Review. Available at: http:\/\/www.technologyreview.com\/view\/427413\/how-china-blocks-the-tor-anonymity-network\/ (accessed 8 November 2012)."},{"key":"bibr14-1461444816639976","doi-asserted-by":"publisher","DOI":"10.2307\/2095339"},{"key":"bibr15-1461444816639976","unstructured":"Owen G, Savage N (2015) The Tor Darknet. Global Commission on Internet Governance paper series no. 20. Available at: https:\/\/ourinternet.org\/publication\/the-tor-dark-net\/"},{"key":"bibr16-1461444816639976","unstructured":"Princeton\u2019s Office of Information Technology (2014) Encryption and international travel. Available at: http:\/\/www.princeton.edu\/itsecurity\/encryption\/encryption-and-internatio\/"},{"key":"bibr17-1461444816639976","doi-asserted-by":"publisher","DOI":"10.1080\/01436590220108207"},{"key":"bibr18-1461444816639976","unstructured":"Schmidheiny K (2015) Panel data: fixed and random effects. Available at: http:\/\/kurt.schmidheiny.name\/teaching\/panel.pdf"},{"key":"bibr19-1461444816639976","unstructured":"Tor Challenge (2014) What is Tor? Available at: https:\/\/www.eff.org\/torchallenge\/what-is-tor.html"},{"key":"bibr20-1461444816639976","unstructured":"Tor Project (2014a) Tor. Available at: https:\/\/www.torproject.org\/index.html.en"},{"key":"bibr21-1461444816639976","unstructured":"Tor Project (2014b) Tor metrics: users. Available at: https:\/\/metrics.torproject.org\/users.html?graph=userstats-relay-country&start=2014-01-01&end=2014-07-24&country=all&events=off#userstats-relay-country"},{"key":"bibr22-1461444816639976","unstructured":"Tor Project (2015) Tor: overview. Available at: https:\/\/www.torproject.org\/about\/overview"},{"key":"bibr23-1461444816639976","volume-title":"Global Competitiveness Index","author":"World Economic Forum","year":"2015"}],"container-title":["New Media &amp; Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1461444816639976","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/1461444816639976","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1461444816639976","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T05:11:23Z","timestamp":1740805883000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/1461444816639976"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3,31]]},"references-count":23,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2018,2]]}},"alternative-id":["10.1177\/1461444816639976"],"URL":"https:\/\/doi.org\/10.1177\/1461444816639976","relation":{},"ISSN":["1461-4448","1461-7315"],"issn-type":[{"value":"1461-4448","type":"print"},{"value":"1461-7315","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,3,31]]}}}