2012
DOI: 10.4018/jep.2012040104
|View full text |Cite
|
Sign up to set email alerts
|

A Taxonomy of Censors and Anti-Censors

Abstract: The tug-of-war on the Internet between censor and anti-censor technologies is intensifying. With an aim to raise awareness on Internet censorship and its circumvention, this paper and its companion Part II present a conceptual study of Internet censorship and anti-censorship. This first paper focuses on Internet censorship. It outlines an historical account of censorship through the lens of news coverage in the past decade, and presents a taxonomy of the principles, techniques, and technologies of Internet cen… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
29
0

Year Published

2014
2014
2025
2025

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 35 publications
(29 citation statements)
references
References 5 publications
0
29
0
Order By: Relevance
“…There are three main steps of censorship and its circumvention: (1) monitoring and surveillance, (2) blocking, filtering, and modifying content, (3) recording events [1]. The second step is the main focus in this article.…”
Section: Typical Censorship Circumventionmentioning
confidence: 99%
See 1 more Smart Citation
“…There are three main steps of censorship and its circumvention: (1) monitoring and surveillance, (2) blocking, filtering, and modifying content, (3) recording events [1]. The second step is the main focus in this article.…”
Section: Typical Censorship Circumventionmentioning
confidence: 99%
“…Censorship is defined as institution, system or practice of reading communication and deleting material considered sensitive or harmful [1]. Sometimes, technological advances not only make it easier for the exchange and spread of information and knowledge, it also may increase the practice and frequency of censorship.…”
Section: Introductionmentioning
confidence: 99%
“…Some researchers summarize the counter-censorship technologies adopted by Chinese users (see Burnett & Feamster, 2013;Leberknight, Chiang, Poor, &Wong, 2012), and more recent studies examine how Chinese users bypass the GFW for seeking information seeking, socializing and entertainment (Yang & Liu, 2014). Chinese Internet users' adoption of anti-censorship tools is predicated on an array of factors, including attitude towards censorship, willingness to self-censor, political and media trust, and digital literacy (Mou, Wu, &Atkin, 2014).…”
Section: Internet Censorship In China: Grassroots Adaptation and Actimentioning
confidence: 99%
“…IP address blacklisting is the most basic technique used by many censors [30]. A natural way to circumvent the filter is to access blacklisted destinations via a proxy, e.g., Psiphon [40].…”
Section: Related Workmentioning
confidence: 99%
“…There is a wide variety of censorship technologies [30]. Most of them exploit the fact that circumvention traffic is easy to recognize and block at the network level.…”
Section: Introductionmentioning
confidence: 99%