{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T16:42:57Z","timestamp":1761324177077,"version":"3.41.0"},"reference-count":95,"publisher":"Sociedade Brasileira de Computacao - SB","issue":"1","license":[{"start":{"date-parts":[[2018,11,2]],"date-time":"2018-11-02T00:00:00Z","timestamp":1541116800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/100000194","name":"U.S. Department of State","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000194","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Internet Serv Appl"],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1186\/s13174-018-0093-4","type":"journal-article","created":{"date-parts":[[2018,8,22]],"date-time":"2018-08-22T12:37:14Z","timestamp":1534941434000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A user-driven free speech application for anonymous and verified online, public group discourse"],"prefix":"10.5753","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6963-5088","authenticated-orcid":false,"given":"Michael","family":"Nekrasov","sequence":"first","affiliation":[]},{"given":"Danny","family":"Iland","sequence":"additional","affiliation":[]},{"given":"Miriam","family":"Metzger","sequence":"additional","affiliation":[]},{"given":"Lisa","family":"Parks","sequence":"additional","affiliation":[]},{"given":"Elizabeth","family":"Belding","sequence":"additional","affiliation":[]}],"member":"3742","published-online":{"date-parts":[[2018,11,2]]},"reference":[{"key":"93_CR1","unstructured":"Facebook. Two Billion People Coming Together on Facebook. 2017. https:\/\/newsroom.fb.com\/news\/2017\/06\/two-billion-people-coming-together%-on-facebook\/ . Accessed on 23 Apr 2018."},{"key":"93_CR2","unstructured":"Stats IL. Twitter Usage Statistics. http:\/\/www.internetlivestats.com\/twitter-statistics\/ . Accessed on 17 Oct 2017."},{"key":"93_CR3","unstructured":"United Nations. Universal Declaration of Human Rights. 1948. http:\/\/www.un.org\/en\/universal-declaration-human-rights\/ . Accessed on 16 Feb 2017."},{"key":"93_CR4","unstructured":"United Nations. Resolution 32\/13: The promotion, protection and enjoyment of human rights on the Internet. 2016. https:\/\/http:\/\/undocs.org\/A\/HRC\/RES\/32\/13 . Accessed Oct 2017."},{"key":"93_CR5","unstructured":"Peterson A. Turkey strengthens Twitter ban, institutes IP level block. 2014. https:\/\/www.washingtonpost.com\/news\/the-switch\/wp\/2014\/03\/22\/turkey-strengthens-twitter-ban-institutes-ip-level-block . Accessed June 2016."},{"key":"93_CR6","unstructured":"Turkey Blocks. New internet shutdown in Turkey\u2019s Southeast: 8% of country now offline amidst Diyarbakir unrest. 2016. https:\/\/turkeyblocks.org\/2016\/10\/27\/new-internet-shutdown-turkey-southeast-offline-diyarbakir-unrest\/ . Accessed June 2016."},{"key":"93_CR7","doi-asserted-by":"publisher","unstructured":"Dainotti A, Squarcella C, Aben E, Claffy KC, Chiesa M, Russo M, Pescap\u00e9 A. Analysis of Country-wide Internet Outages Caused by Censorship. In: Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference. IMC \u201911. Berlin: 2011. p. 1\u201318. http:\/\/doi.acm.org\/10.1145\/2X00000.2068818 . Accessed Oct 2017. https:\/\/doi.org\/10.1145\/2068816.2068818 .","DOI":"10.1145\/2068816.2068818"},{"key":"93_CR8","unstructured":"Lee TB. Here\u2019s how Iran censors the Internet. 2013. https:\/\/www.washingtonpost.com\/news\/the-switch\/wp\/2013\/08\/15\/heres-how-iran-censors-the-internet . Accessed Oct 2017."},{"key":"93_CR9","unstructured":"Kelly S, Earp M, Reed L, Shahbaz A, Truong M. Privatizing Censorship, Eroding Privacy. 2015. https:\/\/freedomhouse.org\/sites\/default\/files\/FH_FOTN_2015Report.pdf . Accessed Oct 2017."},{"key":"93_CR10","unstructured":"Lim K, Danubrata E. Singapore seen getting tough on dissent as cartoonist charged. 2013. http:\/\/www.reuters.com\/article\/us-singapore-dissent-idUSBRE96P0AF20130726 . Accessed Oct 2017."},{"key":"93_CR11","volume-title":"Proceedings of the 2nd USENIX Workshop on Free and Open Communications on the Internet","author":"Y Breindl","year":"2012","unstructured":"Breindl Y, Wright J. Internet Filtering in Liberal Democracies. In: Proceedings of the 2nd USENIX Workshop on Free and Open Communications on the Internet. Bellevue: USENIX: 2012. https:\/\/www.usenix.org\/conference\/foci12\/workshop-program\/presentation\/Breindl . Accessed Oct 2017."},{"key":"93_CR12","unstructured":"Goldman D. Donald Trump wants to \u2019close up\u2019 the Internet. 2015. http:\/\/money.cnn.com\/2015\/12\/08\/technology\/donald-trump-internet\/ . Accessed Oct 2017."},{"key":"93_CR13","unstructured":"Riley C. Theresa May: Internet must be regulated to prevent terrorism. 2017. http:\/\/money.cnn.com\/2017\/06\/04\/technology\/social-media-terrorism-extremism-london\/index.html . Accessed Oct 2017."},{"key":"93_CR14","unstructured":"Norris P. It\u2019s not just Trump. Authoritarian populism is rising across the West. Here\u2019s why. 2016. https:\/\/www.washingtonpost.com\/news\/monkey-cage\/wp\/2016\/03\/11\/its-not-just-trump-authoritarian-populism-is-rising-across-the-west-heres-why . Accessed Oct 2017."},{"key":"93_CR15","unstructured":"House F. Freedom in the World 2017. 2017. https:\/\/freedomhouse.org\/sites\/default\/files\/FH_FIW_2017_Report_Final.pdf . Accessed on 25 Oct 2017."},{"key":"93_CR16","unstructured":"Kasparov G, Halvorssen T. Why the rise of authoritarianism is a global catastrophe. 2017. https:\/\/www.washingtonpost.com\/news\/democracy-post\/wp\/2017\/02\/13\/why-the-rise-of-authoritarianism-is-a-global-catastrophe . Accessed Oct 2017."},{"key":"93_CR17","unstructured":"Williams R. The Rise of Authoritarianism. 2016. https:\/\/www.psychologytoday.com\/blog\/wired-success\/201603\/the-rise-authoritarianism . Accessed Oct 2017."},{"key":"93_CR18","volume-title":"Proceedings of the USENIX Conference on Security Symposium. USENIX Association. SSYM\u201904","author":"P Syverson","year":"2004","unstructured":"Syverson P, Dingledine R, Mathewson N. Tor: the second generation onion router. In: Proceedings of the USENIX Conference on Security Symposium. USENIX Association. SSYM\u201904. Berkeley: USENIX Association. p. 21\u201321. 2004. http:\/\/dl.acm.org\/citation.cfm?id=1X00000.1251396 . Accessed May 2017. http:\/\/dl.acm.org\/citation.cfm?id=1251375.1251396 ."},{"key":"93_CR19","unstructured":"Open Whisper Systems. Signal. https:\/\/itunes.apple.com\/us\/app\/signal-private-messenger\/id874139669 . Accessed Feb 2017."},{"key":"93_CR20","unstructured":"Inc W. WhatsApp. https:\/\/www.whatsapp.com\/ . Accessed on 27 Oct 2017."},{"key":"93_CR21","unstructured":"Carey B. How Fiction Becomes Fact on Social Media. 2017. https:\/\/www.nytimes.com\/2017\/10\/20\/health\/social-media-fake-news.html?r=0 . Accessed Oct 2017."},{"key":"93_CR22","unstructured":"Earle S. Trolls, Bots and Fake News: The Mysterious World of Social Media Manipulation. 2017. http:\/\/www.newsweek.com\/trolls-bots-and-fake-news-dark-and-mysterious-world-social-media-manipulation-682155 . Accessed Oct 2017."},{"key":"93_CR23","unstructured":"Benedictus L. Invasion of the troll armies: \u2018Social media where the war goes on\u2019. 2016. https:\/\/www.theguardian.com\/media\/2016\/nov\/06\/troll-armies-social-media-trump-russian . Accessed Feb 2017."},{"key":"93_CR24","unstructured":"Chen A. The Agency. 2015. https:\/\/www.nytimes.com\/2015\/06\/07\/magazine\/the-agency.html . Accessed Feb 2017."},{"key":"93_CR25","unstructured":"Jackson D. AP Twitter feed hacked; no attack at White House. 2013. https:\/\/www.usatoday.com\/story\/theoval\/2013\/04\/23\/obama-carney-associated-press-hack-white-house\/2106757\/ . Accessed Oct 2017."},{"key":"93_CR26","unstructured":"Bowden G. BBC Northampton Twitter Account Issues Donald Trump Shot Tweet After \u2019Hack\u2019. 2017. http:\/\/www.huffingtonpost.co.uk\/entry\/bbc-northampton-twitter-account-donald-trump_uk_588340fae4b0f94bb303e768 . Accessed Oct 2017."},{"key":"93_CR27","unstructured":"Ingram M. Twitter Hack Takes Over Accounts to Spread Fake News. 2017. http:\/\/fortune.com\/2017\/06\/09\/twitter-hack-fake-news\/ . Accessed Oct 2017."},{"key":"93_CR28","doi-asserted-by":"crossref","unstructured":"Nekrasov M, Parks L, Belding E. Limits to Internet Freedoms: Being Heard in an Increasingly Authoritarian World. In: Proceedings of the Third Workshop on Computing Within Limits. ACM LIMITS \u201917. Santa Barbara: 2017.","DOI":"10.1145\/3080556.3080564"},{"key":"93_CR29","unstructured":"Nekrasov M, Iland D, Metzger M, Zhao B, Belding E. SecurePost: Verified Group-Anonymity on Social Media. In: Proceedings of the 7th USENIX Workshop on Free and Open Communications on the Internet FOCI. USENIX: 2017."},{"issue":"2","key":"93_CR30","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1109\/MIC.2003.1189191","volume":"7","author":"J Zittrain","year":"2003","unstructured":"Zittrain J, Edelman B. Internet filtering in China. IEEE Internet Comput. 2003; 7(2):70\u201377.","journal-title":"IEEE Internet Comput"},{"issue":"2","key":"93_CR31","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1017\/S0003055413000014","volume":"107","author":"G King","year":"2013","unstructured":"King G, Pan J, Roberts ME. How Censorship in China Allows Government Criticism but Silences Collective Expression. Am Polit Sci Rev. 2013; 107(2):326\u201343.","journal-title":"Am Polit Sci Rev"},{"key":"93_CR32","doi-asserted-by":"crossref","unstructured":"Crandall JR, Zinn D, Byrd M, Barr ET, East R. ConceptDoppler: a weather tracker for internet censorship. In: ACM Conference on Computer and Communications Security: 2007. p. 352\u201365.","DOI":"10.1145\/1315245.1315290"},{"key":"93_CR33","volume-title":"Proceedings of the 2nd USENIX Workshop on Free and Open Communications on the Internet","author":"P Winter","year":"2012","unstructured":"Winter P, Lindskog S. How the Great Firewall of China is Blocking Tor. In: Proceedings of the 2nd USENIX Workshop on Free and Open Communications on the Internet. Bellevue: USENIX: 2012. https:\/\/www.usenix.org\/conference\/foci12\/workshop-program\/presentation\/Winter . Accessed June 2016."},{"key":"93_CR34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-67744-6_25","volume-title":"Human-Computer Interaction","author":"Y Kou","year":"2017","unstructured":"Kou Y, Semaan B, Nardi B. A Confucian Look at Internet Censorship in China In: Bernhaupt R, Dalvi G, Joshi A, Balkrishan DK, O\u2019Neill J, Winckler M, editors. Human-Computer Interaction. Cham: Springer International Publishing: 2017. p. 377\u201398. https:\/\/doi.org\/10.1007\/978-3-319-67744-6_25 . Accessed Oct 2017."},{"key":"93_CR35","unstructured":"Aryan S, Aryan H, Halderman JA. Internet Censorship in Iran: A First Look. In: Proceedings of the 3rd USENIX Workshop on Free and Open Communications on the Internet. Washington: 2013. https:\/\/www.usenix.org\/conference\/foci13\/internet-censorship-iran-first-look . Accessed June 2016."},{"key":"93_CR36","doi-asserted-by":"crossref","unstructured":"Chaabane A, Chen T, Cunche M, De Cristofaro E, Friedman A, Kaafar MA. Censorship in the Wild: Analyzing Internet Filtering in Syria. In: Proceedings of the 2014 Conference on Internet Measurement Conference. IMC \u201914: 2014. p. 285\u201398.","DOI":"10.1145\/2663716.2663720"},{"key":"93_CR37","unstructured":"Nabi Z. The Anatomy of Web Censorship in Pakistan. In: Proceedings of the 3rd USENIX Workshop on Free and Open Communications on the Internet. Washington: 2013. https:\/\/www.usenix.org\/conference\/foci13\/workshop-program\/presentation\/Nabi . Accessed June 2016."},{"key":"93_CR38","unstructured":"House F. Freedom in the World 2016 Table of Country Scores. 2016. https:\/\/freedomhouse.org\/report\/freedom-world-2016\/table-scores . Accessed 23 Oct 2017."},{"key":"93_CR39","unstructured":"Internet Monitor. Zambia. http:\/\/thenetmonitor.org\/countries\/zmb\/access . Accessed June 2014."},{"key":"93_CR40","unstructured":"High Commissioner of the Republic of Zambia. Demography. http:\/\/www.zambiapretoria.net\/demography\/ . Accessed 09 April 2018."},{"key":"93_CR41","unstructured":"OECD Better Life Index. Turkey. http:\/\/www.oecdbetterlifeindex.org\/countries\/turkey\/ . Accessed June 2015."},{"key":"93_CR42","unstructured":"Chilkhaasuren B, Baasankhuu B. Population and economic activities of Ulaanbaatar. 2012. https:\/\/www.ubstat.mn2Fupload2Freports2Fub_khotiin_khun_am_ediin_zasag_angli_ulaanbaatar_2012-08.pdf . Accessed June 2016."},{"key":"93_CR43","first-page":"273","volume":"17","author":"A Strauss","year":"1994","unstructured":"Strauss A, Corbin J. Grounded theory methodology. Handb Qual Res. 1994; 17:273\u201385.","journal-title":"Handb Qual Res"},{"key":"93_CR44","unstructured":"SecurePost. SecurePost - Safe, Secure, Social Media. https:\/\/securepost.co . Accessed May 2017."},{"key":"93_CR45","unstructured":"ITU. 2017 estimates for key ICT indicators. 2017. http:\/\/www.itu.int\/en\/ITU-D\/Statistics\/Documents\/statistics\/2017\/ITU_Key_2005-2017_ICT_data.xls . Accessed Oct 2017."},{"key":"93_CR46","unstructured":"ITU. ICT Facts and Figures 2017. 2017. http:\/\/www.itu.int\/en\/ITU-D\/Statistics\/Documents\/facts\/ICTFactsFigures2017.pdf . Accessed Oct 2017."},{"key":"93_CR47","unstructured":"Alexa. Top 500 Global Sites. https:\/\/www.alexa.com\/topsites . Accessed 30 Oct 2017."},{"key":"93_CR48","unstructured":"Statista. Global social media ranking 2017. 2017. https:\/\/www.statista.com\/statistics\/272014\/global-social-networks-ranked-by-number-of-users\/ . Accessed Oct 2017."},{"key":"93_CR49","unstructured":"StatCounter. Mobile Operating System Market Share Zambia. 2017. http:\/\/gs.statcounter.com\/os-market-share\/mobile\/zambia\/#monthly-201302-201709-bar . Accessed 16 Oct 2017."},{"key":"93_CR50","unstructured":"StatCounter. Mobile Operating System Market Share Turkey. 2017. http:\/\/gs.statcounter.com\/os-market-share\/mobile\/turkey . Accessed 23 Oct 2017."},{"key":"93_CR51","unstructured":"Statista. Mobile OS market share 2017. 2017. https:\/\/www.statista.com\/statistics\/266136\/global-market-share-held-by-smartphone-operating-systems\/ . Accessed 16 Oct 2017."},{"key":"93_CR52","unstructured":"Bhattacharya A. Android (GOOG) just hit a record 88% market share of all smartphones. 2016. https:\/\/qz.com\/826672\/android-goog-just-hit-a-record-88-market-share-of-all-smartphones\/ . Accessed Oct 2017."},{"key":"93_CR53","unstructured":"FreedomHouse. Turkey - Country report - Freedom of the Press - 2014. 2014. https:\/\/freedomhouse.org\/report\/freedom-press\/2014\/turkey . Accessed 02 Oct 2017."},{"key":"93_CR54","unstructured":"Lowen M. Is Gollum good or evil? Jail term in Turkey hinges on answer. 2015. http:\/\/www.bbc.com\/news\/world-europe-32302697 . Accessed Oct 2017."},{"key":"93_CR55","unstructured":"Letsch C. Turkish composer and pianist convicted of blasphemy on Twitter. 2013. https:\/\/www.theguardian.com\/world\/2013\/apr\/15\/turkish-composer-fazil-say-convicted-blasphemhy . Accessed 02 Oct 2017."},{"key":"93_CR56","unstructured":"Akwei I. Zambian opposition leader arrested over \u2019libelous\u2019 Facebook post. 2017. http:\/\/www.africanews.com\/2017\/04\/14\/zambian-opposition-leader-arrested-for-libelous-facebook-post\/\/ . Accessed 02 Oct 2017."},{"key":"93_CR57","unstructured":"Times L. Zambia : Police arrest engineering student for \u2019insulting\u2019 President Lungu on Facebook. 2017. https:\/\/www.lusakatimes.com\/2017\/07\/25\/police-arrest-unza-student-insulting-president-lungu-facebook\/ . Accessed 25 Oct 2017."},{"key":"93_CR58","unstructured":"FreedomHouse. Freedom Of The Net - 2016. 2016. https:\/\/freedomhouse.org\/report\/freedom-net\/freedom-net-2016 . Accessed 02 Oct 2017."},{"key":"93_CR59","unstructured":"Sturcke J. Libel laws explained. 2006. https:\/\/www.theguardian.com\/technology\/2006\/aug\/31\/news.politicsandthemedia . Accessed Oct 2017."},{"issue":"1","key":"93_CR60","first-page":"339","volume":"62","author":"RJ Krotoszynski Jr","year":"2005","unstructured":"Krotoszynski Jr RJ. Defamation in the Digital Age: Some Comparative Law Observations on the Difficulty of Reconciling Free Speech and Reputation in the Emerging Global Village. Wash Lee Law Rev. 2005; 62(1):339.","journal-title":"Wash Lee Law Rev"},{"key":"93_CR61","unstructured":"US Department of State. Mongolia Country Reports on Human Rights Practices. 2016. http:\/\/www.state.gov\/j\/drl\/rls\/hrrpt\/humanrightsreport\/index.htm?year=2016&dlid=265356 . Accessed 03 Oct 2017."},{"key":"93_CR62","unstructured":"Gardner L. Mongolia\u2019s Media Laws Threaten Press Freedom. 2014. http:\/\/mediashift.org\/2014\/04\/mongolias-media-laws-threaten-press-freedom\/ . Accessed 03 Oct 2017."},{"key":"93_CR63","unstructured":"FreedomHouse. Mongolia - Country report - Freedom of the Press. 2015. https:\/\/freedomhouse.org\/report\/freedom-press\/2015\/mongolia . Accessed 03 Oct 2017."},{"issue":"6","key":"93_CR64","doi-asserted-by":"publisher","first-page":"815","DOI":"10.1177\/0146167202289010","volume":"28","author":"MR Hebl","year":"2002","unstructured":"Hebl MR, Foster JB, Mannix LM, Dovidio JF. Formal and interpersonal discrimination: A field study of bias toward homosexual applicants. Personal Soc Psychol Bull. 2002; 28(6):815\u2013825.","journal-title":"Personal Soc Psychol Bull"},{"key":"93_CR65","unstructured":"Facebook. What names are allowed on Facebook?. https:\/\/www.facebook.com\/help\/112146705538576 . Accessed Feb 2017."},{"key":"93_CR66","unstructured":"Galperin E. Changes to Facebook\u2019s \u201cReal Names\u201d Policy Still Don\u2019t Fix the Problem. 2015. https:\/\/www.eff.org\/deeplinks\/2015\/12\/changes-facebooks-real-names-policy-still-dont-fix-problem . Accessed Feb 2017."},{"key":"93_CR67","unstructured":"Facebook. Government Requests Report. https:\/\/govtrequests.facebook.com\/ . Accessed Feb 2017."},{"key":"93_CR68","unstructured":"Twitter. Information requests. https:\/\/transparency.twitter.com\/en\/information-requests.html . Accessed May 2017."},{"key":"93_CR69","unstructured":"Hinduja S. Doxing and Cyberbullying. 2015. http:\/\/cyberbullying.org\/doxing-and-cyberbullying . Accessed Oct 2017."},{"key":"93_CR70","unstructured":"Ellis EG. Doxing Is a Perilous Form of Justice\u2014Even When It\u2019s Outing Nazis. 2017. https:\/\/www.wired.com\/story\/doxing-charlottesville\/ . Accessed Oct 2017."},{"key":"93_CR71","unstructured":"IFLA. How To Spot Fake News. https:\/\/www.ifla.org\/publications\/node\/11174 . Accessed 02 Oct 2017."},{"key":"93_CR72","unstructured":"Kiely E, Robertson L. How to Spot Fake News. 2016. http:\/\/www.factcheck.org\/2016\/11\/how-to-spot-fake-news\/ . Accessed 02 Oct 2017."},{"key":"93_CR73","doi-asserted-by":"publisher","unstructured":"Parks L, Mukherjee R. From platform jumping to self-censorship: Internet freedom, social media, and circumvention practices in Zambia. Communication and Critical\/Cultural Studies. 2017. https:\/\/doi.org\/10.1080\/14791420.2017.1290262 . Accessed Oct 2017.","DOI":"10.1080\/14791420.2017.1290262"},{"key":"93_CR74","unstructured":"Walker S. Salutin\u2019 Putin: inside a Russian troll house. 2015. https:\/\/www.theguardian.com\/world\/2015\/apr\/02\/putin-kremlin-inside-russian-troll-house . Accessed Feb 2017."},{"key":"93_CR75","unstructured":"Hess A. On Twitter, a Battle Among Political Bots. 2016. https:\/\/www.nytimes.com\/2016\/12\/14\/arts\/on-twitter-a-battle-among-political-bots.html . Accessed Feb 2017."},{"key":"93_CR76","unstructured":"Miller C. Bots will set the political agenda in 2017. 2017. http:\/\/www.wired.co.uk\/article\/politics-governments-bots-twitter . Accessed Feb 2017."},{"issue":"1","key":"93_CR77","first-page":"2","volume":"8","author":"Z Yang","year":"2014","unstructured":"Yang Z, Wilson C, Wang X, Gao T, Zhao BY, Dai Y. Uncovering social network sybils in the wild. ACM Trans Knowl Discov Data (TKDD). 2014; 8(1):2.","journal-title":"ACM Trans Knowl Discov Data (TKDD)"},{"key":"93_CR78","unstructured":"Verkamp JP, Gupta M. Five Incidents, One Theme: Twitter Spam as a Weapon to Drown Voices of Protest. In: Proceedings of the 3rd USENIX Workshop on Free and Open Communications on the Internet. Washington: 2013. https:\/\/www.usenix.org\/conference\/foci13\/technical-sessions\/papers\/verkamp . Accessed Oct 2017."},{"issue":"2","key":"93_CR79","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1257\/jep.31.2.211","volume":"31","author":"H Allcott","year":"2017","unstructured":"Allcott H, Gentzkow M. Social Media and Fake News in the 2016 Election. J Econ Perspect. 2017; 31(2):211\u201336.","journal-title":"J Econ Perspect"},{"key":"93_CR80","unstructured":"FIDH. Turkey: Provisional release of human rights lawyer Mr. Levent Piskin. 2016. https:\/\/www.fidh.org\/en\/issues\/human-rights-defenders\/turkey-provisional-release-of-human-rights-lawyer-mr-levent-piskin . Accessed Oct 2017."},{"key":"93_CR81","unstructured":"Stockholm Center for Freedom. Demirta\u015f\u2019s lawyer accused of joining HDP\u2019s WhatsApp group \u2013. 2017. https:\/\/stockholmcf.org\/demirtass-lawyer-accused-of-joining-hdps-whatsapp-group\/ . Accessed 02 Oct 2017."},{"key":"93_CR82","unstructured":"Hatti W. Attorney Levent Pi\u015fkin is being charged for meeting his client Selahattin Demirta\u015f. 2017. https:\/\/washingtonhatti.com\/2017\/04\/11\/attorney-levent-piskin-is-being-charged-for-meeting-his-client-selahattin-demirtas\/ . Accessed 02 Oct 2017."},{"key":"93_CR83","unstructured":"Twitter. Twitter Help Center: Country withheld content. https:\/\/support.twitter.com\/articles\/20169222 . Accessed 17 Oct 2017."},{"key":"93_CR84","unstructured":"Shevchenko V. Ukrainians petition Facebook against \u2019Russian trolls\u2019. 2015. http:\/\/www.bbc.com\/news\/world-europe-32720965 . Accessed June 2016."},{"key":"93_CR85","unstructured":"Pizzi M. Isolated in Camp, Syrians Desperate to Get Online. 2015. http:\/\/america.aljazeera.com\/articles\/2015\/7\/16\/internet-access-zaatari-camp.html . Accessed June 2016."},{"key":"93_CR86","unstructured":"Richtel M. Egypt Cuts Off Most Internet and Cellphone Service. 2011. http:\/\/www.nytimes.com\/2011\/01\/29\/technology\/internet\/29cutoff.html . Accessed June 2016."},{"key":"93_CR87","unstructured":"Chulov M. Syria shuts off internet access across the country. 2012. https:\/\/www.theguardian.com\/world\/2012\/nov\/29\/syria-blocks-internet . Accessed June 2016."},{"key":"93_CR88","unstructured":"Conditt J. Turkey shuts off internet service in 11 Kurdish cities. 2016. https:\/\/www.engadget.com\/2016\/10\/27\/turkey-internet-shutdown-kurdish-cities\/ . Accessed June 2016."},{"key":"93_CR89","doi-asserted-by":"crossref","unstructured":"Parks L, Goodwin H, Han L. \u201cI Have the Government in My Pocket\u201d: Social Media Users in Turkey, Transmit-Trap Dynamics, and Struggles Over Internet Freedom; 2017.","DOI":"10.1111\/cccr.12173"},{"key":"93_CR90","unstructured":"Google. Android Developers Dashboard. https:\/\/developer.android.com\/about\/dashboards\/index.html . Accessed 04 Oct 2017."},{"key":"93_CR91","doi-asserted-by":"crossref","unstructured":"Rivest R, Shamir A, Tauman Y. How to leak a secret. Advances in Cryptology\u2014ASIACRYPT 2001; 2001, pp. 552\u2013565.","DOI":"10.1007\/3-540-45682-1_32"},{"key":"93_CR92","doi-asserted-by":"crossref","unstructured":"Chaum D, Van Heyst E. Group signatures. In: Advances in Cryptology\u2014EUROCRYPT\u201991. Springer: 1991. p. 257\u2013265.","DOI":"10.1007\/3-540-46416-6_22"},{"key":"93_CR93","unstructured":"Zetetic. SQLCipher. https:\/\/www.zetetic.net\/sqlcipher\/sqlcipher-for-android\/ . Accessed 13 May 2017."},{"key":"93_CR94","unstructured":"Apple. iOS Security; 2017. https:\/\/www.apple.com\/business\/docs\/iOS_Security_Guide.pdf . Accessed Oct 2017."},{"key":"93_CR95","unstructured":"Google. Language and Locale. https:\/\/developer.android.com\/guide\/topics\/resources\/multilingual-support.html . Accessed 25 Oct 2017."}],"container-title":["Journal of Internet Services and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13174-018-0093-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13174-018-0093-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13174-018-0093-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,6]],"date-time":"2025-07-06T13:27:33Z","timestamp":1751808453000},"score":1,"resource":{"primary":{"URL":"https:\/\/jisajournal.springeropen.com\/articles\/10.1186\/s13174-018-0093-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11,2]]},"references-count":95,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,12]]}},"alternative-id":["93"],"URL":"https:\/\/doi.org\/10.1186\/s13174-018-0093-4","relation":{},"ISSN":["1867-4828","1869-0238"],"issn-type":[{"type":"print","value":"1867-4828"},{"type":"electronic","value":"1869-0238"}],"subject":[],"published":{"date-parts":[[2018,11,2]]},"assertion":[{"value":"11 May 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 August 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 November 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"We obtained IRB approval from UC Santa Barbara prior to conducting our fieldwork.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare that they have no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Publisher\u2019s Note"}}],"article-number":"21"}}