The “Snowden leaks” and censorship methods used during the Arab Spring have brought warranted attention to technologically supported censorship and surveillance (Bauman et al. 2014; Deibert and Crete-Nishihata 2012, 344). The public is now aware how digital tools and information are prone to tracing, interception, and suppression. Processes of eavesdropping and information collection (i.e., surveillance) are often interrelated with processes of removal, displacement, and restriction of material or speech (i.e., censorship). Both are often enshrouded in secrecy, leaving censorship and surveillance techniques open to abuses (Setty 2015).
Journal of Global Security Studies (2016)
censorship, surveillance, cryptography, encryption, academic freedom, Internet
[@journal{ author = "Leonie Maria Tanczer and Ryan McConville and Peter Maynard", title = "Censorship and Surveillance in the Digital Age: The Technological Challenges for Academics", journal = "Journal of Global Security Studies", year = "2016", doi = "http://dx.doi.org/10.1093/jogss/ogw016" }