Abstract

The “Snowden leaks” and censorship methods used during the Arab Spring have brought warranted attention to technologically supported censorship and surveillance (Bauman et al. 2014; Deibert and Crete-Nishihata 2012, 344). The public is now aware how digital tools and information are prone to tracing, interception, and suppression. Processes of eavesdropping and information collection (i.e., surveillance) are often interrelated with processes of removal, displacement, and restriction of material or speech (i.e., censorship). Both are often enshrouded in secrecy, leaving censorship and surveillance techniques open to abuses (Setty 2015). Digital censorship and surveillance may also constitute a threat to academic freedom. Technologically supported censorship and surveillance impinge upon scholars’ ability to conduct unobstructed inquiry. The increasing reliance on the Internet and other information and communication technologies (ICT) to collect data or distribute findings has only exacerbated this threat. Digital tools and data allow for: (1) the easier confiscation or destruction of research (Cyranoski 2008, 871; Gellman 2015); (2) the manipulation of information; or (3) the control and prevention of access to information (Fishman 2010). Digital surveillance creates a securitized climate and leads to chilling effects. The field of security studies is certainly not immune to these effects.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.