Digital Iran Reloaded: Gamer Mitigation Tactics of IRI Information Controls
- URL: http://arxiv.org/abs/2509.09063v1
- Date: Thu, 11 Sep 2025 00:05:31 GMT
- Title: Digital Iran Reloaded: Gamer Mitigation Tactics of IRI Information Controls
- Authors: Melinda Cohoon,
- Abstract summary: This report presents findings from a mixed-methods study of 660 Iranian internet users.<n>Results show that while younger users report higher confidence with circumvention, peer networks, rather than formal training, are the strongest predictors of resilience.<n>Gaming communities, particularly those active on platforms such as Discord and Telegram, serve as hubs for sharing tactics and lowering barriers to adoption.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Internet censorship in the Islamic Republic of Iran restricts access to global platforms and services, forcing users to rely on circumvention technologies such as VPNs, proxies, and tunneling tools. This report presents findings from a mixed-methods study of 660 Iranian internet users, with a focus on gamers as a digitally literate and socially networked community. Survey data are combined with network measurements of latency and VPN performance to identify both technical and social strategies of circumvention. Results show that while younger users report higher confidence with circumvention, peer networks, rather than formal training, are the strongest predictors of resilience. Gaming communities, particularly those active on platforms such as Discord and Telegram, serve as hubs for sharing tactics and lowering barriers to adoption. These findings extend existing work on usable security and censorship circumvention by highlighting the intersection of infrastructural conditions and social learning. The study concludes with design and policy implications for developers, researchers, and funders working on digital rights and information controls.
Related papers
- Analysing Multidisciplinary Approaches to Fight Large-Scale Digital Influence Operations [5.775409982627445]
Crime as a Service has evolved from isolated criminal incidents to a broad spectrum of illicit activities.<n>This article analyses how threat actors exploit specialised infrastructures to orchestrate large-scale opinion manipulation.<n>In parallel, it examines key strategies for detecting, attributing, and mitigating such campaigns.
arXiv Detail & Related papers (2025-12-17T19:31:24Z) - 'Teens Need to Be Educated on the Danger': Digital Access, Online Risks, and Safety Practices Among Nigerian Adolescents [0.0]
This study investigates the online experiences of 409 secondary school adolescents in Nigeria's Federal Capital Territory (FCT)<n>Using self-administered surveys, we found that while most adolescents reported moderate access to online technology and connectivity, those who encountered risks frequently reported exposure to inappropriate content and online scams.<n>Parents emerged as the primary support network, though monitoring practices and communication varied widely.
arXiv Detail & Related papers (2025-07-11T15:39:01Z) - Mapping Trafficking Networks: A Data-Driven Approach to Disrupt Human Trafficking Post Russia-Ukraine Conflict [0.0]
This study proposes a prototype for locating important individuals and financial exchanges in networks of people trafficking.<n>It focuses on the role of digital platforms, cryptocurrencies, and the dark web in facilitating these operations.
arXiv Detail & Related papers (2025-04-23T18:59:23Z) - Promoting Security and Trust on Social Networks: Explainable Cyberbullying Detection Using Large Language Models in a Stream-Based Machine Learning Framework [5.635300481123079]
Social media platforms have given rise to negative behaviors in the online community, the so-called cyberbullying.<n>We propose an innovative and real-time solution for cyberbullying detection using stream-based Machine Learning (ML) models and Large Language Models (LLMS)<n>Results on experimental data report promising performance close to 90 % in all evaluation metrics and surpassing those obtained by competing works in the literature.
arXiv Detail & Related papers (2025-04-07T15:57:37Z) - A Systematic Review of Security Communication Strategies: Guidelines and Open Challenges [47.205801464292485]
We identify user difficulties including information overload, technical comprehension, and balancing security awareness with comfort.<n>Our findings reveal consistent communication paradoxes: users require technical details for credibility yet struggle with jargon and need risk awareness without experiencing anxiety.<n>This work contributes to more effective security communication practices that enable users to recognize and respond to cybersecurity threats appropriately.
arXiv Detail & Related papers (2025-04-02T20:18:38Z) - DisTrack: a new Tool for Semi-automatic Misinformation Tracking in Online Social Networks [46.38614083502535]
DisTrack is designed to combat the spread of misinformation through a combination of Natural Language Processing (NLP) Social Network Analysis (SNA) and graph visualization.
The tool is tailored to capture and analyze the dynamic nature of misinformation spread in digital environments.
arXiv Detail & Related papers (2024-08-01T15:17:33Z) - Effective Intrusion Detection in Heterogeneous Internet-of-Things Networks via Ensemble Knowledge Distillation-based Federated Learning [52.6706505729803]
We introduce Federated Learning (FL) to collaboratively train a decentralized shared model of Intrusion Detection Systems (IDS)
FLEKD enables a more flexible aggregation method than conventional model fusion techniques.
Experiment results show that the proposed approach outperforms local training and traditional FL in terms of both speed and performance.
arXiv Detail & Related papers (2024-01-22T14:16:37Z) - A Study of China's Censorship and Its Evasion Through the Lens of Online
Gaming [12.227095608806696]
China has increasingly restricted the access of minors to online games using addiction prevention systems (APSes)
This paper studies how these restrictions impact young online gamers, and their evasion efforts.
arXiv Detail & Related papers (2023-08-05T22:16:40Z) - Countering Malicious Content Moderation Evasion in Online Social
Networks: Simulation and Detection of Word Camouflage [64.78260098263489]
Twisting and camouflaging keywords are among the most used techniques to evade platform content moderation systems.
This article contributes significantly to countering malicious information by developing multilingual tools to simulate and detect new methods of evasion of content.
arXiv Detail & Related papers (2022-12-27T16:08:49Z) - Detecting fake accounts through Generative Adversarial Network in online social media [0.0]
This paper proposes a novel method using user similarity measures and the Generative Adversarial Network (GAN) algorithm to identify fake user accounts in the Twitter dataset.<n>Despite the problem's complexity, the method achieves an AUC rate of 80% in classifying and detecting fake accounts.
arXiv Detail & Related papers (2022-10-25T10:20:27Z) - Relational Graph Neural Networks for Fraud Detection in a Super-App
environment [53.561797148529664]
We propose a framework of relational graph convolutional networks methods for fraudulent behaviour prevention in the financial services of a Super-App.
We use an interpretability algorithm for graph neural networks to determine the most important relations to the classification task of the users.
Our results show that there is an added value when considering models that take advantage of the alternative data of the Super-App and the interactions found in their high connectivity.
arXiv Detail & Related papers (2021-07-29T00:02:06Z) - Quantifying the Vulnerabilities of the Online Public Square to Adversarial Manipulation Tactics [43.98568073610101]
We use a social media model to quantify the impacts of several adversarial manipulation tactics on the quality of content.
We find that the presence of influential accounts, a hallmark of social media, exacerbates the vulnerabilities of online communities to manipulation.
These insights suggest countermeasures that platforms could employ to increase the resilience of social media users to manipulation.
arXiv Detail & Related papers (2019-07-13T21:12:08Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.