{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T10:40:24Z","timestamp":1742812824037,"version":"3.40.2"},"reference-count":78,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,4,1]]},"abstract":"<p>The expansion of access to information and communication technologies (ICTs) has provided new political organizing tools for citizens \u2014 a development of particular importance for individuals living under authoritarian regimes that rely on the repression of free speech to maintain power. Such repressitarian elites exert control over citizen online communications, but it is economically counterproductive for countries hoping to engage in the 21st century\u2019s wired economy to crack down tightly on Internet. This article examines the struggles between maintaining openness and crackdowns in Iran, Egypt, China, and Singapore. These four countries are known to exert severe controls over free expression. However, Iran and Egypt have seen the rise of organized opposition movements despite the controls on media expression, whereas China and Singapore offer useful case studies on the economic dimensions of the balance between participating in the globally networked society and controlling citizen expression.<\/p>","DOI":"10.4018\/jicthd.2012040101","type":"journal-article","created":{"date-parts":[[2012,3,29]],"date-time":"2012-03-29T13:29:24Z","timestamp":1333027764000},"page":"1-19","source":"Crossref","is-referenced-by-count":1,"title":["Cyber-Dissent and Power"],"prefix":"10.4018","volume":"4","author":[{"given":"Brian J.","family":"Bowe","sequence":"first","affiliation":[{"name":"Grand Valley State University, USA"}]},{"given":"Robin","family":"Blom","sequence":"additional","affiliation":[{"name":"Michigan State University, USA"}]},{"given":"Eric","family":"Freedman","sequence":"additional","affiliation":[{"name":"Michigan State University, USA"}]}],"member":"2432","reference":[{"key":"jicthd.2012040101-0","unstructured":"Abdel Dayem, M. (2009). Attempting to silence Iran\u2019s \u2018Weblogistan.\u2019 Nieman Reports, 42-44."},{"key":"jicthd.2012040101-1","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1163\/9789047416173_007","article-title":"The unintended consequences of technological policy: The Internet and civil society in Singapore","author":"Z.Baber","year":"2005","journal-title":"Cyberasia: The Internet and society in Asia"},{"key":"jicthd.2012040101-2","unstructured":"Barboza, D. (2010, August 13) New China search engine will be state-controlled. The New York Times. Retrieved from: http:\/\/www.nytimes.com\/2010\/08\/14\/technology\/internet\/14search.html"},{"key":"jicthd.2012040101-3","unstructured":"Barns, E. (2010, November 26). Mystery surrounds cyber missile that crippled Iran\u2019s nuclear weapons ambitions. Fox News. Retrieved from http:\/\/www.foxnews.com\/scitech\/2010\/11\/26\/secret-agent-crippled-irans-nuclear-ambitions\/"},{"key":"jicthd.2012040101-4","doi-asserted-by":"publisher","DOI":"10.1177\/1748048507072774"},{"key":"jicthd.2012040101-5","doi-asserted-by":"publisher","DOI":"10.2307\/40203576"},{"key":"jicthd.2012040101-6","doi-asserted-by":"publisher","DOI":"10.1080\/13604819708900050"},{"key":"jicthd.2012040101-7","unstructured":"Charny, N. (2006, April 20). Chinese partner censors Skype text messages. PCmag.com. Retrieved from: http:\/\/www.pcmag.com\/article2\/0,2817,1951637,00.asp"},{"key":"jicthd.2012040101-8","unstructured":"CIA. (2011). World factbook. Retrieved from https:\/\/www.cia.gov\/library\/publications\/the-world-factbook\/"},{"key":"jicthd.2012040101-9","unstructured":"Clayton, M. (2011, January 3). Stuxnet attack on Iran nuclear program came about a year ago, report says. Christian Science Monitor. Retrieved from http:\/\/www.csmonitor.com\/USA\/2011\/0103\/Stuxnet-attack-on-Iran-nuclear-program-came-about-a-year-ago-report-says"},{"key":"jicthd.2012040101-10","unstructured":"Clinton, H. R. (2010, January 21). Speech on Internet freedom. Retrieved from http:\/\/www.state.gov\/secretary\/rm\/2010\/01\/135519.htm"},{"key":"jicthd.2012040101-11","unstructured":"Colley, A. (2007, March 6). States still hold out on YouTube. Australian. Retrieved from http:\/\/www.theaustralian.com.au\/australian-it\/states-still-hold-out-on-youtube\/story-e6frgamx-1111113102808"},{"key":"jicthd.2012040101-12","unstructured":"Committee to Protect Journalists (CPJ). (2011a, April 11). More journalists held in Libya; blogger jailed in Egypt. Retrieved from http:\/\/www.cpj.org\/2011\/04\/more-journalists-held-in-libya-blogger-jailed-in-e.php"},{"key":"jicthd.2012040101-13","unstructured":"Committee to Protect Journalists (CPJ). (2011b, September 13). Egyptian military institutes new media restrictions. Retrieved November 13, 2011, from http:\/\/www.cpj.org\/2011\/09\/egyptian-military-institutes-new-media-restriction.php"},{"key":"jicthd.2012040101-14","unstructured":"Committee to Protect Journalists (CPJ). (2011c, October 31). Egyptian military officials jail blogger who criticized them. Retrieved November 13, 2011, from http:\/\/www.cpj.org\/2011\/10\/egyptian-military-officials-jail-blogger-who-criti.php"},{"key":"jicthd.2012040101-15","unstructured":"Committee to Protect Journalists (CPJ). (2011d, January 26). Singapore forces popular site to register as political group. Retrieved November 13, 2011, from http:\/\/www.cpj.org\/2011\/01\/singapore-forces-popular-website-to-register-as-po.php"},{"key":"jicthd.2012040101-16","unstructured":"Cowie, J. (2011). Egypt leaves the Internet. Renesys Blog. Retrieved from http:\/\/www.renesys.com\/blog\/2011\/01\/egypt-leaves-the-internet.shtml"},{"key":"jicthd.2012040101-17","doi-asserted-by":"publisher","DOI":"10.1007\/s10551-007-9373-9"},{"key":"jicthd.2012040101-18","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/8551.001.0001","author":"R.Deibert","year":"2010","journal-title":"Access controlled: The shaping of power, rights, and rule in cyberspace"},{"key":"jicthd.2012040101-19","first-page":"15","article-title":"Beyond denial: Introducing next-generation information access controls","author":"R.Deibert","year":"2010","journal-title":"Access controlled: The shaping of power, rights, and rule in cyberspace"},{"key":"jicthd.2012040101-20","doi-asserted-by":"publisher","DOI":"10.1111\/j.1749-5687.2009.00088.x"},{"key":"jicthd.2012040101-21","unstructured":"Drummond, D. (2010, January 12). A new approach to China. Official Google Blog. Retrieved from http:\/\/googleblog.blogspot.com\/2010\/01\/new-approach-to-china.html"},{"key":"jicthd.2012040101-22","doi-asserted-by":"publisher","DOI":"10.1080\/1360083042000190634"},{"key":"jicthd.2012040101-23","first-page":"20","article-title":"A new kind of cyberwar.","author":"P.Eng","year":"1998","journal-title":"Columbia Journalism Review"},{"key":"jicthd.2012040101-24","unstructured":"Fathi, M. (2009, June 23). In a death seen around the world, a symbol of Iranian protests. The New York Times. Retrieved from http:\/\/www.nytimes.com\/2009\/06\/23\/world\/middleeast\/23neda.html"},{"journal-title":"U.S. initiatives to promote global Internet freedom: Issues, policy, and technology","year":"2010","author":"P. M.Figliola","key":"jicthd.2012040101-25"},{"issue":"4","key":"jicthd.2012040101-26","first-page":"94","article-title":"Two decades of repression: The persistence of authoritarian controls on the mass media in Central Asia.","volume":"11","author":"E.Freedman","year":"2010","journal-title":"Central Asia and the Caucasus"},{"key":"jicthd.2012040101-27","first-page":"42","article-title":"Trading free speech.","author":"J.Garvie","year":"2007","journal-title":"Index on Censorship"},{"key":"jicthd.2012040101-28","doi-asserted-by":"publisher","DOI":"10.1080\/10714420390226270.002"},{"key":"jicthd.2012040101-29","unstructured":"George, C. (2009). Coercion unmasked: The counter-hegemonic impact of new media activism in Singapore. Paper presented at the Annual Meeting of the International Communication Association, Chicago, IL."},{"key":"jicthd.2012040101-30","unstructured":"Gillmor, D. (2011) Egypt\u2019s communications \u201ckill switch.\u201d Salon. Retrieved from http:\/\/www.salon.com\/technology\/dan_gillmor\/2011\/01\/28\/egypt_kill_switch"},{"key":"jicthd.2012040101-31","unstructured":"Global Network Initiative. (2010). Inaugural Report 2010. Retrieved from http:\/\/www.globalnetworkinitiative.org\/cms\/uploads\/1\/GNI_annual_report_2010.pdf"},{"key":"jicthd.2012040101-32","unstructured":"Google. (2010). Google transparency report. Retrieved from http:\/\/www.google.com\/transparencyreport\/governmentrequests\/"},{"journal-title":"The information revolution in Asia","year":"2003","author":"N.Hachigian","key":"jicthd.2012040101-33"},{"key":"jicthd.2012040101-34","doi-asserted-by":"publisher","DOI":"10.1386\/jammr.1.3.215_1"},{"key":"jicthd.2012040101-35","doi-asserted-by":"crossref","first-page":"92","DOI":"10.16997\/wpcc.110","article-title":"Arab citizen journalism in action: Challenging mainstream media, authorities and media laws.","volume":"6","author":"N.Hamdy","year":"2009","journal-title":"Westminster Papers in Communication and Culture"},{"key":"jicthd.2012040101-36","unstructured":"Herrmann, S. (2009, June 16), Social media in Iran. Retrieved from http:\/\/www.bbc.co.uk\/blogs\/theeditors\/2009\/06\/social_media_in_iran.html"},{"key":"jicthd.2012040101-37","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780199736416.001.0001"},{"key":"jicthd.2012040101-38","unstructured":"Human Rights Watch. (2006). China report. Retrieved from http:\/\/www.hrw.org\/english\/docs\/2006\/01\/18\/china12270.htm"},{"key":"jicthd.2012040101-39","unstructured":"Iran's Twitter revolution. (2009, June 16). Washington Times. Retrieved from http:\/\/www.washingtontimes.com\/news\/2009\/jun\/16\/irans-twitter-revolution\/"},{"key":"jicthd.2012040101-40","unstructured":"Ishani, M. (2011). The hopeful network. Foreign Policy. Retrieved from http:\/\/www.foreignpolicy.com\/articles\/2011\/02\/07\/the_hopeful_network"},{"key":"jicthd.2012040101-41","first-page":"80","article-title":"Future web: Exporting censorship.","author":"X.Jardin","year":"2007","journal-title":"Index on Censorship"},{"key":"jicthd.2012040101-42","unstructured":"Jiang, S. (2010). China blanks Nobel Peace Prize searches. CNN. Retrieved from http:\/\/www.cnn.com\/2010\/WORLD\/asiapcf\/10\/08\/china.internet\/index.html"},{"key":"jicthd.2012040101-43","unstructured":"Johnson, B. (2011). How Egypt switched off the Internet. GigaOm. Retrieved from http:\/\/gigaom.com\/2011\/01\/28\/how-egypt-switched-off-the-internet\/"},{"key":"jicthd.2012040101-44","unstructured":"Kelly, J., & Etling, B. (2008). Mapping Iran\u2019s online public: Politics and culture in the Persian blogosphere. Retrieved from http:\/\/cyber.law.harvard.edu\/publications\/2008\/Mapping_Irans_Online_Public"},{"key":"jicthd.2012040101-45","doi-asserted-by":"crossref","unstructured":"Khamis, S., & Vaughn, K. (2011). Cyberactivism in the Egyptian revolution: How civic engagement and citizen journalism tilted the balance. Arab Media & Society, 13. Retrieved from http:\/\/www.arabmediasociety.com\/?article=769","DOI":"10.70090\/SKKV11ER"},{"key":"jicthd.2012040101-46","first-page":"28","article-title":"Iranian youth online: Identity between traditional and modern lifestyles. 3CM","volume":"4","author":"A. A.Kia","year":"2008","journal-title":"Journal of Community, Citizen's and Third Sector Media and Communication"},{"journal-title":"The elements of journalism","year":"2007","author":"B.Kovach","key":"jicthd.2012040101-47"},{"key":"jicthd.2012040101-48","doi-asserted-by":"publisher","DOI":"10.1177\/1748048507072777"},{"key":"jicthd.2012040101-49","first-page":"33","article-title":"Differential e-mobilization and cyberspace in East Asian economies: Contours of emerging cyber-activism and (anti)democratic regimes in the information society","author":"O. K.Lai","year":"2004","journal-title":"The political economy of the Internet in Asia and the Pacific: Digital divides, economic competiveness, and security challenges"},{"key":"jicthd.2012040101-50","unstructured":"Landler, M., & Stelter, B. (2009, June 16). Washington taps into a potent new force in diplomacy. The New York Times. Retrieved from http:\/\/www.nytimes.com\/2009\/06\/17\/world\/middleeast\/17media.html"},{"key":"jicthd.2012040101-51","first-page":"162","article-title":"Emulating Singapore: Towards a model for Internet regulation in Asia","author":"T.Lee","year":"2004","journal-title":"Asian cyberactivism: Freedom of expression and media censorship"},{"key":"jicthd.2012040101-52","doi-asserted-by":"publisher","DOI":"10.1177\/0163443709350098"},{"key":"jicthd.2012040101-53","unstructured":"MacKinnon, R. (2005, June 17). Screenshots of Censorship. RConversation Blog. Retrieved from http:\/\/rconversation.blogs.com\/rconversation\/2005\/06\/screenshots_of_.html"},{"key":"jicthd.2012040101-54","doi-asserted-by":"crossref","first-page":"87","DOI":"10.7551\/mitpress\/8551.003.0011","article-title":"Protecting privacy and expression online: Can the Global Network Initiative embrace the character of the net?","author":"C. M.Maclay","year":"2010","journal-title":"Access controlled: The shaping of power, rights, and rule in cyberspace"},{"key":"jicthd.2012040101-55","unstructured":"Morillon, L., & Julliard, J. (2010). Enemies of the Internet: Web 2.0 versus control 2.0. Reporters without Borders. Retrieved from http:\/\/www.rsf.org\/ennemis.html"},{"journal-title":"The net delusion: the dark side of Internet freedom","year":"2011","author":"E.Morozov","key":"jicthd.2012040101-56"},{"key":"jicthd.2012040101-57","unstructured":"Nasseri, L. (2010, November 29). Ahmadinehad confirms several Iran centrifuges affected by computer virus. Bloomberg. Retrieved from http:\/\/www.bloomberg.com\/news\/2010-11-29\/ahmadinejad-confirms-several-iran-centrifuges-affected-by-computer-virus.html"},{"key":"jicthd.2012040101-58","doi-asserted-by":"publisher","DOI":"10.2202\/1932-0205.1160"},{"key":"jicthd.2012040101-59","unstructured":"OpenNet Initiative. (2005, April 15). Special report: Kyrgyzstan, election monitoring in Kyrgyzstan. Retrieved from http:\/\/opennet.net\/special\/kg\/"},{"key":"jicthd.2012040101-60","first-page":"9","article-title":"Digital natives, digital immigrants.","author":"M.Prensky","year":"2001","journal-title":"Horizon"},{"key":"jicthd.2012040101-61","unstructured":"Quirk, P. W. (2009, June 17). Iran\u2019s Twitter revolution. Foreign Policy in Focus. Retrieved from http:\/\/www.fpif.org\/articles\/irans_twitter_revolution"},{"key":"jicthd.2012040101-62","unstructured":"Reporters Without Borders. (2011, September 10). Is the Supreme Council a new predator of press freedom? Retrieved from http:\/\/en.rsf.org\/egypt-is-the-supreme-council-a-new-10-09-2011,40962.html"},{"key":"jicthd.2012040101-63","doi-asserted-by":"publisher","DOI":"10.1177\/1748048509350337"},{"key":"jicthd.2012040101-64","unstructured":"Shapiro, S. M. (2009, January 22). Revolution, Facebook-style. The New York Times. Retrieved from http:\/\/www.nytimes.com\/2009\/01\/25\/magazine\/25bloggers-t.html"},{"key":"jicthd.2012040101-65","unstructured":"Shiels, M. (2010, December 30). Cyber-sabotage and espionage top 2011 security fears. Retrieved from http:\/\/www.bbc.co.uk\/news\/technology-12056594"},{"key":"jicthd.2012040101-66","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1080\/03064220802081738","article-title":"Notes on the net.","author":"Z.Shuguang","year":"2008","journal-title":"Index on Censorship"},{"key":"jicthd.2012040101-67","unstructured":"Stanyer, J., & Davidson, S. (2009). The Internet and the visibility of oppression in non-democratic states: The online exposure of human rights violations and the other repressive acts. Paper presented at the Annual Meeting of the International Communication Association, Chicago, IL."},{"key":"jicthd.2012040101-68","unstructured":"Sullivan, A. (2009, June 13). The revolution will be twittered. The Atlantic. Retrieved from http:\/\/www.theatlantic.com\/daily-dish\/archive\/2009\/06\/the-revolution-will-be-twittered\/200478\/"},{"key":"jicthd.2012040101-69","unstructured":"Swaine, J. (2008, August 11). Georgia: Russia \u2018conducting cyber war.\u2019 The Telegraph. Retrieved from http:\/\/www.telegraph.co.uk\/news\/worldnews\/europe\/georgia\/2539157\/Georgia-Russia-conducting-cyber-war.html"},{"key":"jicthd.2012040101-70","unstructured":"Twitter. (2009, June). Down time rescheduled. Retrieved from http:\/\/blog.twitter.com\/2009\/06\/down-time-rescheduled.html"},{"key":"jicthd.2012040101-71","unstructured":"U.S. State Department. (2010a). 2009 human rights report: Egypt. Retrieved from http:\/\/www.state.gov\/g\/drl\/rls\/hrrpt\/2009\/nea\/136067.htm"},{"key":"jicthd.2012040101-72","unstructured":"U.S. State Department. (2010b). 2009 human rights report: Singapore. Retrieved from http:\/\/www.state.gov\/g\/drl\/rls\/hrrpt\/2009\/eap\/136008.htm"},{"key":"jicthd.2012040101-73","unstructured":"U.S. State Department. (2011). 2010 human rights report: Iran. Retrieved from http:\/\/www.state.gov\/g\/drl\/rls\/hrrpt\/2010\/nea\/154461.htm"},{"key":"jicthd.2012040101-74","unstructured":"Van Dijk, J., & Hacker, K. (2000). The digital divide as a complex and dynamic phenomenon. Paper presented at the Annual Conference of the International Communication Association, Acapulco, Mexico."},{"key":"jicthd.2012040101-75","doi-asserted-by":"publisher","DOI":"10.1080\/10670560903033836"},{"key":"jicthd.2012040101-76","doi-asserted-by":"publisher","DOI":"10.1177\/0163443707080536"},{"key":"jicthd.2012040101-77","first-page":"255","article-title":"Market or party controls? Chinese media in transition.","volume":"67","author":"B. H.Winfield","year":"2005","journal-title":"International Journal for Communication Studies"}],"container-title":["International Journal of Information Communication Technologies and Human Development"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=65755","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T10:03:03Z","timestamp":1742810583000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/jicthd.2012040101"}},"subtitle":["Negotiating Online Boundaries in Repressitarian Regimes"],"short-title":[],"issued":{"date-parts":[[2012,4,1]]},"references-count":78,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2012,4]]}},"URL":"https:\/\/doi.org\/10.4018\/jicthd.2012040101","relation":{},"ISSN":["1935-5661","1935-567X"],"issn-type":[{"type":"print","value":"1935-5661"},{"type":"electronic","value":"1935-567X"}],"subject":[],"published":{"date-parts":[[2012,4,1]]}}}