Understanding the use of circumvention tools to bypass online censorship

Circumvention tools designed to bypass online censorship—such as simple web proxies, virtual private network service, and so on—are frequently used in countries whose governments impose heavy Internet censorship. Around 18 million Internet users in China are currently using those tools to bypass the Great Firewall and access unblocked online content. In a pioneering empirical investigation of unblocked information seeking in China’s censored online environment, the present study systematically examines a wide range of macro-social and micro-individual factors which affect the use of circumvention tools to bypass Internet censorship under the guidance of the interactive communication technology adoption model. The results reveal that, with the exception of social trust, macro-social factors have only a modest influence on the use of circumvention tools. In contrast, micro-individual-level variables—including perceived technology fluidity, gratifications, and selected demographic variables—play a much larger role in our multivariate model. Theoretical and practical implications are discussed.

[1]  M. Lynne Markus,et al.  Toward a “Critical Mass” Theory of Interactive Media , 1987 .

[2]  Carolyn A. Lin Exploring personal computer adoption dynamics , 1998 .

[3]  Yongnian Zheng,et al.  China's Information and Communications Technology Revolution: Social changes and state responses , 2012 .

[4]  E. Noelle-Neumann The Spiral of Silence A Theory of Public Opinion , 1974 .

[5]  R. LaRose,et al.  Getting Hooked on News: Uses and Gratifications and the Formation of News Habits Among College Students in an Internet Environment , 2006 .

[6]  Mun Y. Yi,et al.  Predicting Computer Task Performance: Personal Goal and Self-Efficacy , 2004, J. Organ. End User Comput..

[7]  Corey Leigh Ballard “WHAT’S HAPPENING” @TWITTER: A USES AND GRATIFICATIONS APPROACH , 2011 .

[8]  William J. Gonzenbach,et al.  Homosexuals and the Military: An Analysis of the Spiral of Silence , 1999 .

[9]  Stéphane Reissfelder,et al.  Social information and political participation on the internet: an experiment , 2011, European Political Science Review.

[10]  James M. Fallows Postcards from Tomorrow Square: Reports from China , 2008 .

[11]  P. Calvert Access Contested: Security, Identity, and Resistance in Asian Cyberspace , 2012 .

[12]  Richard G. Niemi,et al.  Political efficacy and trust: A report on the NES pilot study items , 1990 .

[13]  A. Bandura Social Foundations of Thought and Action , 1986 .

[14]  Carolyn A. Lin An Interactive Communication Technology Adoption Model , 2003 .

[15]  Sohee Koo,et al.  Perceived Effects of Sexually Explicit Internet Content: The Third-Person Effect in Singapore , 2001 .

[16]  Albert Bandura,et al.  Self-Efficacy Determinants of Anticipated Fears and Calamities , 1983 .

[17]  Ralph E. Anderson,et al.  Human Behavior in the Social Environment: A Social Systems Approach , 1974 .

[18]  S. Utz,et al.  Is the medium the message? Perceptions of and reactions to crisis communication on twitter, blogs and traditional media , 2011 .

[19]  Brian S. Butler,et al.  Power distribution as a catalyst and consequence of decentralized technology diffusion , 1998 .

[20]  Archana Krishnan,et al.  The Influence of Computer-Mediated Communication Apprehension on Motives for Facebook Use , 2012 .

[21]  Yi Mou,et al.  The influence of online forum and SNS use on online political discussion in China: Assessing "Spirals of Trust" , 2013, Telematics Informatics.

[22]  Carolyn A. Lin Satellite Radio Adoption Demand: Consumer Beliefs, Attitudes and Intentions , 2010 .

[23]  P. Leeflang,et al.  Opinion Leaders' Role in Innovation Diffusion: A Simulation Study , 2011 .

[24]  D. Atkin,et al.  Predicting Political Discussion in a Censored Virtual Environment , 2011 .

[25]  James Shanahan,et al.  Willingness to Self-Censor: A Construct and Measurement Tool for Public Opinion Research , 2005 .

[26]  Thomas P. Van Dyke,et al.  Development and validation of an Internet self-efficacy scale , 2001, Behav. Inf. Technol..

[27]  Ang Peng Hwa,et al.  PUBLIC PERCEPTIONS OF TELEVISION INFLUENCE AND OPINIONS ABOUT CENSORSHIP IN SINGAPORE , 1996 .

[28]  Zhongyi Hu,et al.  Exploring Gender Differences on General and Specific Computer Self-Efficacy in Mobile Learning Adoption , 2013, ArXiv.

[29]  A. Weil,et al.  Diffusion of Innovation , 2020, The International Encyclopedia of Media Psychology.

[30]  A. Rubin,et al.  Predictors of Internet Use , 2000 .

[31]  Katie Bonebrake College Students' Internet Use, Relationship Formation, and Personality Correlates , 2002, Cyberpsychology Behav. Soc. Netw..

[32]  Paul M. Haridakis,et al.  YouTube Users Watching and Sharing the News: A Uses and Gratifications Approach , 2008 .

[33]  李 永刚 我们的防火墙 : 网络时代的表达与监管 = Our great firewall : expression and governance in the era of the internet , 2009 .

[34]  Phyllis Schumacher,et al.  Gender, Internet and computer attitudes and experiences , 2001, Comput. Hum. Behav..

[35]  R. Kay,et al.  Gender Differences in the use of Laptops in Higher Education: A Formative Analysis , 2011 .

[36]  J. Brehm,et al.  Psychological Reactance: A Theory of Freedom and Control , 1981 .