<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>URL:
https://digitalsocietyproject.org/data/, accessed:</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Digital Authoritarianism: ICT-enabled Repression Across Regime Types⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Lucaccini Martina</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Sapienza Università di Roma</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Luiss Guido Carli</string-name>
        </contrib>
      </contrib-group>
      <pub-date>
        <year>2015</year>
      </pub-date>
      <volume>202</volume>
      <issue>21</issue>
      <fpage>4</fpage>
      <lpage>12</lpage>
      <abstract>
        <p>Digital authoritarianism uses Information and Communication Technologies (ICTs) to sustain autocratic stability through surveillance, censorship, cyberattacks and social manipulation. While this phenomenon is central to modern autocracies, the borderless nature of cyberspace has enabled democratically elected states to adopt similar practices under certain conditions. Drawing on data from the Digital Society Project (DSP) and cross-national time-series analysis on the Digital Repression Index (DRI), this study reveals significant diferences in the digital authoritarian toolkit across regime types. Closed regimes predominantly utilize tactics such as surveillance, social manipulation, and internet shutdowns, whereas democracies, despite possessing greater digital repression capacities, generally exercise restraint. However, when governed by illiberal leaders, democracies exhibit patterns of digital repression similar to their autocratic counterparts, challenging assumptions about the normative divide between regime types.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;cyber politics</kwd>
        <kwd>geopolitics</kwd>
        <kwd>authoritarianism</kwd>
        <kwd>technologies</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
    </sec>
    <sec id="sec-2">
      <title>2. Defining Digital Authoritarianism</title>
      <sec id="sec-2-1">
        <title>Challenges</title>
        <sec id="sec-2-1-1">
          <title>1. Autocracies</title>
        </sec>
        <sec id="sec-2-1-2">
          <title>2. Transnational</title>
        </sec>
        <sec id="sec-2-1-3">
          <title>3. Export</title>
        </sec>
        <sec id="sec-2-1-4">
          <title>4. Democracies</title>
          <p>
            as well as to leverage this technology for political gain. First-generation controls of the Internet were
based on establishing national cyber-borders (e.g., examples include China, Iran, Pakistan, Saudi
Arabia, Bahrain, Yemen, and Vietnam) and on filtering activities on keywords, servers, domains, and IP
addresses to censor political and security-related content [
            <xref ref-type="bibr" rid="ref20">20</xref>
            ]. Second-generation controls extended
through laws, regulations, and requirements imposed on privately owned networks (e.g., backdoor
functionalities and deep packet inspections; banning anonymizing tools and VPNs). Often referred to
as "just-in-time", they also granted dynamic Internet access management and plausible deniability [
            <xref ref-type="bibr" rid="ref21">21</xref>
            ].
Third-generation controls are ofensive and undermine the networking advantages that civil society
might otherwise gain from digital media by actively manipulating information (e.g., China’s fifty-centers,
Venezuela’s communicational guerrillas, the Egyptian Cyber Army, the Syrian Electronic Army; the
pro-Putin bloggers of Russia; Kenya’s director of digital media, Saudi Arabia’s ethical hackers) [
            <xref ref-type="bibr" rid="ref22">22</xref>
            ].
Fourth generation controls introduce an assertive international dimension of digital authoritarianism; in
this context, the digital authoritarian toolkit is used for strategic competition among great powers.
2.1. Perpetual Agendas and Global Challenges
The stabilization strategies of authoritarian regimes have been convincingly theorized based on
legitimacy, repression, and cooptation [23]. Authoritarian regimes adapt their perpetual agenda to the
dynamics of cyberspace to a) obtain perfect information about their subjects and b) influence behaviour
and beliefs so that their rule appears legitimate [
            <xref ref-type="bibr" rid="ref1 ref8">8, 1</xref>
            ]. Figure 1 illustrates how the three pillars of
authoritarian stability are adapted in the digital age. Digital repression (i.e., influencing strategies for
controlling the information environment) and digital cooptation (i.e., manipulation of potential sources
of opposition) ensure citizens’ compliant participation in society influencing their behaviors through
positive incentives (e.g., social credit scores), sanctions (e.g., deplatforming, shadowbanning, hacking)
or controlling the information environment (e.g., Denial of Service attacks and slowing access to the
Internet) [
            <xref ref-type="bibr" rid="ref20">20</xref>
            ]. Regimes can also rely on covert practices when they attempt deception (i.e., through
cooperation with Internet Service Providers to remove contents or use algorithms) or target specific
individuals and organizations using spyware [24]. To control narratives and shape their subjects’
beliefs, the autocrat’s goal is to strengthen their legitimation and create a façade of participation and
responsiveness to the dictators’ rule. Dictators rely on information channelling (i.e., redirecting or
influencing attention) and employ social media bots and trolls to spread pro-regime narratives (i.e.,
advanced by patriotic hackers or automated through bots and algorithms), disinformation (i.e., the
dissemination of false, inaccurate, or misleading information) and flooding (i.e., promoting competing
or distracting information that overwhelms legitimate information sources) [
            <xref ref-type="bibr" rid="ref10 ref20">20, 10, 25</xref>
            ].
          </p>
          <p>Disaggregating Figure 1 to understand the digital authoritarian toolkit ofers further insights. I defined
a taxonomy that distinguishes between four practices reinforcing the classical pillars of authoritarian
stability (i.e., surveillance, censorship, cyberattacks, disinformation) and two practices acting as tools of
great power (i.e., digital infrastructure and sovereignty). Each of them draws from a unique set of tools
to perform its objectives.</p>
          <p>Surveillance has become faster to implement in the digital age. The availability of big data from both
public and private sources, along with advances in algorithmic sophistication and artificial intelligence,</p>
        </sec>
      </sec>
      <sec id="sec-2-2">
        <title>Censorship</title>
      </sec>
      <sec id="sec-2-3">
        <title>Authoritarian Internet</title>
        <p>Government social media monitoring of political content (v2smgovsmmon[43, 44])
Internet filtering in practice (v2mgovfilprc[43, 44]))
Social media censorship of political content in practice (v2mgovsncebprc[43, 44]))
Social media censorship of political content in capacity (v2mgovfilcap[43, 44]))
Governmental dissemination of false information on social media (v2mgovsmcenprc[43, 44]))
Party dissemination of false information on social media (v2govdom[43, 44]))
Governments’capacity to regulate online content using existing laws (v2mregcap[43, 44]))
Governments’ social media shutdowns in practice (v2mgovsm[43, 44])
Governments’ social media shutdowns in capacity (v2mgovshutcap[43, 44])
Internet shutdowns in practice (v2mgovshut[43, 44])
Targeted persecutions of online users (v2smarrest[43, 44])</p>
        <p>
          Governments’ cybersecurity capacity (v2smgovcapsec[43, 44])
visions of the Internet [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ]. Fourthly, digital authoritarianism practices are becoming pervasive in
democratic societies at the expense of public trust, personal privacy, and civil liberties. While the XX century
experienced waves of democratic liberalization, the emergence of digital authoritarianism reflects an
opposite trend, afecting both autocratic and democratic regimes [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ].
        </p>
        <p>Table 1 summarizes the digital authoritarian toolkit and highlights which strategies within the
taxonomy advance the four challenges listed above.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Research design and data</title>
      <p>
        My empirical investigation provides a descriptive analysis to assess how practices of digital
authoritarianism are utilized across diferent regime types. I refer to Feldstein’s (2019) Digital Repression
Index (DRI) and Digital Repression Capacity Index (DRCI) [36]. Both indexes assume values between -5
and 5, with 0 representing the approximate mean for all country years in the sample, and countries
with negative scores generally perform below the mean. I rely on expert-coded data from the Digital
Society Project (DSP) data set, incorporating survey data from 2003 to 2022 [
        <xref ref-type="bibr" rid="ref13">13, 37</xref>
        ]. This version of the
variables presents country-year point estimates resulting in a probability distribution for each score on
a standardized interval scale [38]). These scores resemble a normal score, typically ranging from -5 to 5,
with 0 representing the mean across all country-years in the sample. As dependent variables, I selected
the indicators listed in Table 2 as proxies for the components of the digital authoritarian taxonomy (see
Table 1). Operationalization of the independent variable (i.e., regime type) is performed referring to
the Varieties of Democracy (V-Dem) [39] (i.e., v2x_polyarchy, electoral democracy index; v2x_libdem,
liberal democracy index) and the Regime of the World (RoW) classification [ 40] (i.e., v2x_regime,
distinguishing between Closed/Electoral autocracies and Liberal/Electoral democracies). In this paper,
I answer the following research question: How does the digital authoritarian toolkit vary in its use
between autocracies and democracies?
      </p>
    </sec>
    <sec id="sec-4">
      <title>4. Descriptive insights</title>
      <p>
        4.1. Digital Authoritarianism Across Regime types
Scholars have used digital authoritarianism to describe what Feldstein (2019) [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ] designates as digital
repression. Unlike digital authoritarianism, this designation does not imply a bias toward a specific
regime type. Democracies frequently employ digital repression techniques for a variety of reasons,
even when there is no explicit intention to transition toward authoritarian governance models.
      </p>
      <p>In line with existing scholarship, countries with poor human rights records show the highest global
0.00 0.25 CivilLibertiesI0n.d5e0x(v2x_civlib) 0.75 Pearson Correlation:1−.000.9
Figure 2: Linear Relationship, v2x_clpol and</p>
      <sec id="sec-4-1">
        <title>Digital Repression Index (DRI) [45].</title>
        <p>0.00 0.25 LiberalDemocracyIndex(0v.25x0_libdem) 0.7P5earson Correlation: −0.86
Figure 3: Linear Relationship, v2x_libdem and</p>
      </sec>
      <sec id="sec-4-2">
        <title>Digital Repression Index (DRI) [14, 43].</title>
        <p>levels of digital repression. Indeed, as civil liberties decline (v2x_civlib, an Index measuring restrictions
on expression, political pluralism, and civil society 2), the level of digital repression increases. Similarly,
there is a strong and statistically significant negative correlation (Pearson’s Coeficient = -0.86) between
the Liberal Democracy Index (v2x_libdem) and the DRI, suggesting that liberal democratic systems are
associated with lower levels of digital repression (Figure 3). Figure 7 in the Appendix provides a deeper
analysis of the correlation between DRI variables and V-Dem’s Democracy Indices.</p>
        <p>Figure 6 (see Appendix) provides an overview of the prevalence of digital repression across global
regions in 2022. The two regions with the highest levels of digital repression in 2022 were South
and Central Asia and the Middle East; in contrast, Europe and Eurasia and countries in the Western
Hemisphere showed the lowest digital repression scores but higher digital repression capacity. In 2022,
high-scoring countries in the DRI were exclusively closed or electoral autocracies (i.e., CA; EA) and
classified as "Not Free" by Freedom House’s Freedom of the Net (FOTN) Classification [ 46], except for
Nicaragua (Table 3). In two cases (e.g., Eritrea and South Sudan), digital repression capacity does not fully
align with digital repression scores. Low-scoring DRI countries in 2022 also align closely with regime
types as they all classify as electoral and liberal democracies (i.e., ED; LD). There are inconsistencies
(e.g., Finland) when countries possess advanced repression capabilities but choose limited deployment.
Several countries with strong ED rankings have unexpectedly high digital repression scores (e.g., India
and Brazil) due to their high levels of state-sponsored Internet Shutdowns and political party-driven
disinformation [36]. Notably, electoral democracies and democracies ruled by illiberal leaders (e.g.,
iiilIItr()ssxnenpeodeagDRDR−01
−2
4.2. Comparing Digital Repression Capacity and Practice
The rising tendencies of digital repression capacity and enactment are not unexpected, as dissent has
moved online and digital tools have become cheaper. Findings highlight the linear relationship between
digital repression capacity and democracy levels (Figure 4). Liberal and electoral democracies have
high capacities for digital repression but refrain from using it. At the same time, closed autocracies
and electoral autocracies exhibit rising digital repression tendencies, with the toolkit’s deployment
consistently exceeding regimes’ capacities. Still, democracies with higher repressive capabilities often
have political safeguards to mitigate the risk of using these tools for political repression [47]. Diferently,
autocracies with lower repressive capacities usually bridge the digital repression gap by relying on
external suppliers (as highlighted by challenges (2) and (3) in Table 2).
4.3. Breaking down the digital authoritarian toolkit
Authoritarian regimes rely diferently on their digital authoritarian toolkit. Figure 8 displayed in the
paper’s Appendix provides a ranking of authoritarian regimes in terms of their reliance on digital
repression practices. I considered authoritarian regimes currently in power as of 2022. I plotted the
range of the minimum and maximum values reached by the DRI, the current value (2022), and the
mean value the DRI assumed between 2003 and 2022. Figure 5 depicts the evolution of key components
North Korea
Turkmenistan
Iran
Sudan
Tajikistan
Myanmar
Ethiopia
Eritrea
Russia
China
North Korea
Saudi Arabia
Cuba
Turkmenistan
Nicaragua
China
United Arab Emirates
Iran
Syria
Ethiopia
Russia
Turkmenistan
Nicaragua
Syria
Venezuela
Azerbaijan
North Korea
Myanmar
Hong Kong</p>
        <p>Brazil</p>
      </sec>
      <sec id="sec-4-3">
        <title>Internet Shutdown (v2mgovshut); Internet Shutdown capacity (v2mgovshutcap); Social media shutdown</title>
        <p>(v2smgovsm) and censorship (v2smgovsmcenprc); Internet filtering(v2smgovfilprc) and capacity (v2smgovfilcap);
Governmental (v2mgovsmcenprc) and Party dissemination of false information on social media (v2govdom) [45, 44].
of the digital authoritarian toolkit between 2003 and 2022, highlighting trends in state-led digital
repression strategies. The data reveals a consistent increase in practices such as government social
media monitoring, censorship, and the dissemination of false information, underscoring the growing
reliance on digital tools to control information and suppress dissent. While practices like Internet
ifltering and arrests for political content remain stable and prominent, more intermittent but significant
measures, such as social media and Internet shutdowns, reflect a selective use of extreme tactics.
In 2022, higher or moderate levels of Internet access did not equate to unrestricted online freedom
(Table 4), with governments (e.g., UAE, Syria and Qatar) imposing strict controls over social media
(v2smgovsmmon) and online users (v2smarrest) resulting in their shallow usage for organizing ofline
protests (v2smorgavact) [48].</p>
        <p>
          China’s relatively high internet penetration coexists with substantial government monitoring of
social media (v2smgovsmmon); additionally, while the DSP does not provide an analytic measurement
of physical surveillance measures [49], commercial spyware inventories confirm that China, Iran,
Saudi Arabia, and North Korea are leaders in commercial malware for surveillance, explicitly targeting
political opponents [
          <xref ref-type="bibr" rid="ref14">14, 35</xref>
          ]. Top censoring countries usually display lower Internet penetration levels,
as preventing online access is more eficient than controlling its content (Table 5).
        </p>
        <p>North Korea’s digital environment remains highly isolated, with its low Internet penetration
levels (Table 5) and its near-constant Internet shutdowns (v2smgovshut) and very limited access to global
online spaces. Despite its near-zero internet penetration, the regime efectively curates the content
that is accessible, relying on filtering practices ( v2smgovfilprc ; v2smgovfilcap ) to limit dissent. This
form of control is somewhat simpler to enforce due to the lack of external internet infrastructure,
which places fewer demands on the government’s capacity to enforce comprehensive censorship. In
contrast, China and Russia, with relatively high internet penetration, showcase more sophisticated
forms of repression. China displays strong reliance on internet filtering ( v2smgovfilprc ) while Russia has
strengthened its reliance on social media shutdowns and censorship (v2smgovsm and v2smgovsmcenprc).
Russia has also demonstrated a high capacity for manipulating public discourse through social media
shutdowns and reliance on state-driven misinformation campaigns aimed at domestic and international
audiences(v2smgovdom andv2smpardom). Internet shutdowns are often observed in countries with lower
DRI (e.g., India [50]) or with lower capacities for sophisticated censoring practices (e.g., Sudan, Ethiopia,
Eritrea). Previous studies have assessed how the COVID-19 pandemic exacerbated social manipulation
(i.e., disinformation) in China, Iran, Russia, and Turkey [51]. In 2022, Russia, exhibits significant values
in both social media censorship (v2smgovsm) and governmental dissemination of false information
(v2govdom), highlighting that despite higher internet penetration levels, the government manipulates
online narratives (Table 5). Finally, Brazil, while not traditionally seen as a digital authoritarian state,
reflects growing concerns over governmental and party-driven misinformation. With a lower level of
DRI compared to the aforementioned countries, Brazil’s government still engages in the dissemination
of false information on social media (v2govdom). Turkmenistan, instead, demonstrates extensive control
over information flow ( v2smgovsm; v2govdom), using the Internet for propaganda despite a small online
population.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Conclusions</title>
      <p>This paper conceptualized digital authoritarianism and analyzed how its toolkit reinforces the
conventional pillars of authoritarian stability of repression, cooptation, and liberalization. The theoretical
part of the paper argued that while digital authoritarian practices have become core characteristics in
modern autocracies, they are also applied by democratic governments to some extent. The empirical
part of the paper is a systematic descriptive analysis of digital authoritarianism’s difusion across regime
types and provides evidence of the increasing threats posed by digital authoritarianism globally.</p>
      <p>Autocracies tend to digitally repress beyond their inherent capabilities, resorting to lower-capacity
strategies (e.g., Internet shutdowns) or relying on external service providers. Democracies ruled by
illiberal leaders exhibit patterns more akin to their autocratic counterparts. The research reveals
significant variance among autocracies in selecting their digital authoritarian toolkit, with a bias
towards surveillance and social manipulation. Transnational challenges and targeted digital threats
against regime critics are rising, parallel to the use of social media to organize ofline action. Addressing
the global challenges posed by digital authoritarianism requires a nuanced, interdisciplinary approach
bridging political science and cybersecurity.</p>
    </sec>
    <sec id="sec-6">
      <title>6. Appendices</title>
      <p>EAP
SCA
2013
Year
2003
2013
2022
2003
2022
2003
2013
2022
Mean Digital Repression Capacity Index
Mean Digital Repression Index
v2x_civlib</p>
    </sec>
    <sec id="sec-7">
      <title>Declaration on Generative AI</title>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>E.</given-names>
            <surname>Frantz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Kendall-Taylor</surname>
          </string-name>
          , J. Wright, Digital repression in autocracies, Varieties of Democracy Institute Users Working Paper (
          <volume>27</volume>
          ) (
          <year>2020</year>
          )
          <fpage>1</fpage>
          -
          <lpage>22</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>M.</given-names>
            <surname>Castells</surname>
          </string-name>
          ,
          <article-title>The Internet galaxy: Reflections on the Internet, business, and society</article-title>
          , Oxford University Press,
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>M.</given-names>
            <surname>Lynch</surname>
          </string-name>
          ,
          <article-title>Digital activism and authoritarian adaptation in the middle east</article-title>
          ,
          <source>Digital Activism and Authoritarian Adaptation in the Middle East</source>
          <volume>43</volume>
          (
          <year>2021</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>S.</given-names>
            <surname>Gunitsky</surname>
          </string-name>
          ,
          <article-title>Corrupting the cyber-commons: Social media as a tool of autocratic stability</article-title>
          ,
          <source>Perspectives on politics 13</source>
          (
          <year>2015</year>
          )
          <fpage>42</fpage>
          -
          <lpage>54</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>R.</given-names>
            <surname>Deibert</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Rohozinski</surname>
          </string-name>
          ,
          <article-title>Liberation vs. control: The future of cyberspace</article-title>
          ,
          <source>Journal of democracy 21</source>
          (
          <year>2010</year>
          )
          <fpage>43</fpage>
          -
          <lpage>57</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>A.</given-names>
            <surname>Kendall-Taylor</surname>
          </string-name>
          , E. Frantz,
          <string-name>
            <surname>J. Wright,</surname>
          </string-name>
          <article-title>The digital dictators: How technology strengthens autocracy</article-title>
          ,
          <source>Foreign Af</source>
          .
          <volume>99</volume>
          (
          <year>2020</year>
          )
          <fpage>103</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>E. G.</given-names>
            <surname>Rød</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N. B.</given-names>
            <surname>Weidmann</surname>
          </string-name>
          ,
          <article-title>Empowering activists or autocrats? the internet in authoritarian regimes</article-title>
          ,
          <source>Journal of Peace Research</source>
          <volume>52</volume>
          (
          <year>2015</year>
          )
          <fpage>338</fpage>
          -
          <lpage>351</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>O.</given-names>
            <surname>Schlumberger</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Edel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Maati</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Saglam</surname>
          </string-name>
          ,
          <article-title>How authoritarianism transforms: A framework for the study of digital dictatorship</article-title>
          ,
          <source>Government and Opposition</source>
          <volume>59</volume>
          (
          <year>2024</year>
          )
          <fpage>761</fpage>
          -
          <lpage>783</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>E.</given-names>
            <surname>Keremoğlu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N. B.</given-names>
            <surname>Weidmann</surname>
          </string-name>
          ,
          <article-title>How dictators control the internet: a review essay</article-title>
          ,
          <source>Comparative Political Studies</source>
          <volume>53</volume>
          (
          <year>2020</year>
          )
          <fpage>1690</fpage>
          -
          <lpage>1703</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>M.</given-names>
            <surname>Michaelsen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Glasius</surname>
          </string-name>
          ,
          <article-title>Authoritarian practices in the digital age-introduction</article-title>
          ,
          <source>International Journal of Communication</source>
          <volume>12</volume>
          (
          <year>2018</year>
          )
          <article-title>7</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>S. F.</given-names>
            <surname>Maerz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Schulte</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Trinn</surname>
          </string-name>
          ,
          <article-title>Autocratization and political conflict</article-title>
          ,
          <source>in: The Routledge Handbook of Autocratization, Routledge</source>
          ,
          <year>2024</year>
          , pp.
          <fpage>441</fpage>
          -
          <lpage>454</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>M.</given-names>
            <surname>Glasius</surname>
          </string-name>
          , What authoritarianism is. . .
          <article-title>and is not: a practice perspective</article-title>
          ,
          <source>International afairs 94</source>
          (
          <year>2018</year>
          )
          <fpage>515</fpage>
          -
          <lpage>533</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>V.</given-names>
            <surname>Mechkova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Pemstein</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Seim</surname>
          </string-name>
          , S. Wilson,
          <source>Measuring Internet Politics: Digital Society Project (DSP) Annual Report v4, Technical Report</source>
          , V-dem
          <string-name>
            <surname>Democracy</surname>
          </string-name>
          ,
          <year>2022</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>S.</given-names>
            <surname>Feldstein</surname>
          </string-name>
          , Commercial spyware global inventory,
          <source>Mendeley Data</source>
          <volume>1</volume>
          (
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>J. J.</given-names>
            <surname>Linz</surname>
          </string-name>
          , Totalitarian and authoritarian regimes, Lynne Rienner Publishers,
          <year>2000</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>L.</given-names>
            <surname>Martino</surname>
          </string-name>
          ,
          <article-title>La quinta dimensione della conflittualità. l'ascesa del cyberspazio ei suoi efetti sulla politica internazionale</article-title>
          ,
          <source>Politica &amp; società 7</source>
          (
          <year>2018</year>
          )
          <fpage>61</fpage>
          -
          <lpage>76</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>G.</given-names>
            <surname>Giacomello</surname>
          </string-name>
          ,
          <article-title>National governments and control of the Internet: a digital challenge</article-title>
          ,
          <source>Routledge</source>
          ,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>A.</given-names>
            <surname>Shahbaz</surname>
          </string-name>
          ,
          <source>The rise of digital authoritarianism</source>
          ,
          <year>2018</year>
          . URL: https://freedomhouse.org/report/ freedom-net/
          <year>2018</year>
          /rise-digital-authoritarianism, accessed:
          <fpage>2024</fpage>
          -11-27.
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>R.</given-names>
            <surname>Deibert</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Rohozinski</surname>
          </string-name>
          ,
          <article-title>Liberation vs. control: The future of cyberspace</article-title>
          ,
          <source>Journal of democracy 21</source>
          (
          <year>2010</year>
          )
          <fpage>43</fpage>
          -
          <lpage>57</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>J.</given-names>
            <surname>Earl</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. V.</given-names>
            <surname>Maher</surname>
          </string-name>
          ,
          <string-name>
            <surname>J. Pan,</surname>
          </string-name>
          <article-title>The digital repression of social movements, protest, and activism: A synthetic review</article-title>
          ,
          <source>Science Advances</source>
          <volume>8</volume>
          (
          <year>2022</year>
          )
          <article-title>eabl8198</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>A. R.</given-names>
            <surname>Gohdes</surname>
          </string-name>
          , Repression technology:
          <article-title>Internet accessibility and state violence</article-title>
          ,
          <source>American Journal of Political Science</source>
          <volume>64</volume>
          (
          <year>2020</year>
          )
          <fpage>488</fpage>
          -
          <lpage>503</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>D.</given-names>
            <surname>Conduit</surname>
          </string-name>
          ,
          <article-title>Digital authoritarianism and the devolution of authoritarian rule: examining syria's patriotic hackers</article-title>
          ,
          <source>Democratization</source>
          <volume>31</volume>
          (
          <year>2024</year>
          )
          <fpage>979</fpage>
          -
          <lpage>997</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>