Search This Blog

Tuesday, October 4, 2022

Digital preservation

From Wikipedia, the free encyclopedia
https://en.wikipedia.org/wiki/Digital_preservation

In library and archival science, digital preservation is a formal endeavor to ensure that digital information of continuing value remains accessible and usable. It involves planning, resource allocation, and application of preservation methods and technologies, and it combines policies, strategies and actions to ensure access to reformatted and "born-digital" content, regardless of the challenges of media failure and technological change. The goal of digital preservation is the accurate rendering of authenticated content over time. The Association for Library Collections and Technical Services Preservation and Reformatting Section of the American Library Association, defined digital preservation as combination of "policies, strategies and actions that ensure access to digital content over time." According to the Harrod's Librarian Glossary, digital preservation is the method of keeping digital material alive so that they remain usable as technological advances render original hardware and software specification obsolete.

The need for digital preservation mainly arises because of the relatively short lifespan of digital media. Widely used hard drives can become unusable in a few years due to a variety of reasons such as damaged spindle motors, and flash memory (found on SSDs, phones, USB flash drives, and in memory cards such as SD, microSD, and CompactFlash cards) can start to lose data around a year after its last use, depending on its storage temperature and how much data has been written to it during its lifetime. Currently, 5D optical data storage has the potential to store digital data for thousands of years. Archival disc-based media is available, but it is only designed to last for 50 years and it is a proprietary format, sold by just two Japanese companies, Sony and Panasonic. M-DISC is a DVD-based format that claims to retain data for 1,000 years, but writing to it requires special optical disc drives and reading the data it contains requires increasingly uncommon optical disc drives, in addition the company behind the format went bankrupt. Data stored on LTO tapes require periodic migration, as older tapes cannot be read by newer LTO tape drives. RAID arrays could be used to protect against failure of single hard drives, although care needs to be taken to not mix the drives of one array with those of another.

Fundamentals

Appraisal

Archival appraisal (or, alternatively, selection) refers to the process of identifying records and other materials to be preserved by determining their permanent value. Several factors are usually considered when making this decision. It is a difficult and critical process because the remaining selected records will shape researchers' understanding of that body of records, or fonds. Appraisal is identified as A4.2 within the Chain of Preservation (COP) model created by the InterPARES 2 project. Archival appraisal is not the same as monetary appraisal, which determines fair market value.

Archival appraisal may be performed once or at the various stages of acquisition and processing. Macro appraisal, a functional analysis of records at a high level, may be performed even before the records have been acquired to determine which records to acquire. More detailed, iterative appraisal may be performed while the records are being processed.

Appraisal is performed on all archival materials, not just digital. It has been proposed that, in the digital context, it might be desirable to retain more records than have traditionally been retained after appraisal of analog records, primarily due to a combination of the declining cost of storage and the availability of sophisticated discovery tools which will allow researchers to find value in records of low information density. In the analog context, these records may have been discarded or only a representative sample kept. However, the selection, appraisal, and prioritization of materials must be carefully considered in relation to the ability of an organization to responsibly manage the totality of these materials.

Often libraries, and to a lesser extent, archives, are offered the same materials in several different digital or analog formats. They prefer to select the format that they feel has the greatest potential for long-term preservation of the content. The Library of Congress has created a set of recommended formats for long-term preservation. They would be used, for example, if the Library was offered items for copyright deposit directly from a publisher.

Identification (identifiers and descriptive metadata)

In digital preservation and collection management, discovery and identification of objects is aided by the use of assigned identifiers and accurate descriptive metadata. An identifier is a unique label that is used to reference an object or record, usually manifested as a number or string of numbers and letters. As a crucial element of metadata to be included in a database record or inventory, it is used in tandem with other descriptive metadata to differentiate objects and their various instantiations.

Descriptive metadata refers to information about an object's content such as title, creator, subject, date etc... Determination of the elements used to describe an object are facilitated by the use of a metadata schema. Extensive descriptive metadata about a digital object helps to minimize the risks of a digital object becoming inaccessible.

Another common type of file identification is the filename. Implementing a file naming protocol is essential to maintaining consistency and efficient discovery and retrieval of objects in a collection, and is especially applicable during digitization of analog media. Using a file naming convention, such as the 8.3 filename or the Warez standard naming, will ensure compatibility with other systems and facilitate migration of data, and deciding between descriptive (containing descriptive words and numbers) and non-descriptive (often randomly generated numbers) file names is generally determined by the size and scope of a given collection. However, filenames are not good for semantic identification, because they are non-permanent labels for a specific location on a system and can be modified without affecting the bit-level profile of a digital file.

Integrity

The cornerstone of digital preservation, "data integrity" refers to the assurance that the data is "complete and unaltered in all essential respects"; a program designed to maintain integrity aims to "ensure data is recorded exactly as intended, and upon later retrieval, ensure the data is the same as it was when it was originally recorded".

Unintentional changes to data are to be avoided, and responsible strategies put in place to detect unintentional changes and react as appropriately determined. However, digital preservation efforts may necessitate modifications to content or metadata through responsibly-developed procedures and by well-documented policies. Organizations or individuals may choose to retain original, integrity-checked versions of content and/or modified versions with appropriate preservation metadata. Data integrity practices also apply to modified versions, as their state of capture must be maintained and resistant to unintentional modifications.

The integrity of a record can be preserved through bit-level preservation, fixity checking, and capturing a full audit trail of all preservation actions performed on the record. These strategies can ensure protection against unauthorised or accidental alteration.

Fixity

File fixity is the property of a digital file being fixed, or unchanged. File fixity checking is the process of validating that a file has not changed or been altered from a previous state. This effort is often enabled by the creation, validation, and management of checksums.

While checksums are the primary mechanism for monitoring fixity at the individual file level, an important additional consideration for monitoring fixity is file attendance. Whereas checksums identify if a file has changed, file attendance identifies if a file in a designated collection is newly created, deleted, or moved. Tracking and reporting on file attendance is a fundamental component of digital collection management and fixity.

Characterization

Characterization of digital materials is the identification and description of what a file is and of its defining technical characteristics often captured by technical metadata, which records its technical attributes like creation or production environment.

Sustainability

Digital sustainability encompasses a range of issues and concerns that contribute to the longevity of digital information. Unlike traditional, temporary strategies, and more permanent solutions, digital sustainability implies a more active and continuous process. Digital sustainability concentrates less on the solution and technology and more on building an infrastructure and approach that is flexible with an emphasis on interoperability, continued maintenance and continuous development. Digital sustainability incorporates activities in the present that will facilitate access and availability in the future. The ongoing maintenance necessary to digital preservation is analogous to the successful, centuries-old, community upkeep of the Uffington White Horse (according to Stuart M. Shieber) or the Ise Grand Shrine (according to Jeffrey Schnapp).

Renderability

Renderability refers to the continued ability to use and access a digital object while maintaining its inherent significant properties.

Physical media obsolescence

Physical media obsolescence can occur when access to digital content requires external dependencies that are no longer manufactured, maintained, or supported. External dependencies can refer to hardware, software, or physical carriers. For example, DLT tape was used for backups and data preservation, but is no longer used.

Format obsolescence

File format obsolescence can occur when adoption of new encoding formats supersedes use of existing formats, or when associated presentation tools are no longer readily available.

While the use of file formats will vary among archival institutions given their capabilities, there is documented acceptance among the field that chosen file formats should be "open, standard, non-proprietary, and well-established" to enable long-term archival use. Factors that should enter consideration when selecting sustainable file formats include disclosure, adoption, transparency, self-documentation, external dependencies, impact of patents, and technical protection mechanisms. Other considerations for selecting sustainable file formats include "format longevity and maturity, adaptation in relevant professional communities, incorporated information standards, and long-term accessibility of any required viewing software". For example, the Smithsonian Institution Archives considers uncompressed TIFFs to be "a good preservation format for born-digital and digitized still images because of its maturity, wide adaptation in various communities, and thorough documentation".

Formats proprietary to one software vendor are more likely to be affected by format obsolescence. Well-used standards such as Unicode and JPEG are more likely to be readable in future.

Significant properties

Significant properties refer to the "essential attributes of a digital object which affect its appearance, behavior, quality and usability" and which "must be preserved over time for the digital object to remain accessible and meaningful."

"Proper understanding of the significant properties of digital objects is critical to establish best practice approaches to digital preservation. It assists appraisal and selection, processes in which choices are made about which significant properties of digital objects are worth preserving; it helps the development of preservation metadata, the assessment of different preservation strategies and informs future work on developing common standards across the preservation community."

Authenticity

Whether analog or digital, archives strive to maintain records as trustworthy representations of what was originally received. Authenticity has been defined as ". . . the trustworthiness of a record as a record; i.e., the quality of a record that is what it purports to be and that is free from tampering or corruption". Authenticity should not be confused with accuracy; an inaccurate record may be acquired by an archives and have its authenticity preserved. The content and meaning of that inaccurate record will remain unchanged.

A combination of policies, security procedures, and documentation can be used to ensure and provide evidence that the meaning of the records has not been altered while in the archives' custody.

Access

Digital preservation efforts are largely to enable decision-making in the future. Should an archive or library choose a particular strategy to enact, the content and associated metadata must persist to allow for actions to be taken or not taken at the discretion of the controlling party.

Preservation metadata

Preservation metadata is a key enabler for digital preservation, and includes technical information for digital objects, information about a digital object's components and its computing environment, as well as information that documents the preservation process and underlying rights basis. It allows organizations or individuals to understand the chain of custody. Preservation Metadata: Implementation Strategies (PREMIS), is the de facto standard that defines the implementable, core preservation metadata needed by most repositories and institutions. It includes guidelines and recommendations for its usage, and has developed shared community vocabularies.

Intellectual foundations

Preserving Digital Information (1996)

The challenges of long-term preservation of digital information have been recognized by the archival community for years. In December 1994, the Research Libraries Group (RLG) and Commission on Preservation and Access (CPA) formed a Task Force on Archiving of Digital Information with the main purpose of investigating what needed to be done to ensure long-term preservation and continued access to the digital records. The final report published by the Task Force (Garrett, J. and Waters, D., ed. (1996). "Preserving digital information: Report of the task force on archiving of digital information.") became a fundamental document in the field of digital preservation that helped set out key concepts, requirements, and challenges.

The Task Force proposed development of a national system of digital archives that would take responsibility for long-term storage and access to digital information; introduced the concept of trusted digital repositories and defined their roles and responsibilities; identified five features of digital information integrity (content, fixity, reference, provenance, and context) that were subsequently incorporated into a definition of Preservation Description Information in the Open Archival Information System Reference Model; and defined migration as a crucial function of digital archives. The concepts and recommendations outlined in the report laid a foundation for subsequent research and digital preservation initiatives.

OAIS

To standardize digital preservation practice and provide a set of recommendations for preservation program implementation, the Reference Model for an Open Archival Information System (OAIS) was developed, and published in 2012. OAIS is concerned with all technical aspects of a digital object's life cycle: ingest, archival storage, data management, administration, access and preservation planning. The model also addresses metadata issues and recommends that five types of metadata be attached to a digital object: reference (identification) information, provenance (including preservation history), context, fixity (authenticity indicators), and representation (formatting, file structure, and what "imparts meaning to an object's bitstream").

Trusted Digital Repository Model

In March 2000, the Research Libraries Group (RLG) and Online Computer Library Center (OCLC) began a collaboration to establish attributes of a digital repository for research organizations, building on and incorporating the emerging international standard of the Reference Model for an Open Archival Information System (OAIS). In 2002, they published "Trusted Digital Repositories: Attributes and Responsibilities." In that document a "Trusted Digital Repository" (TDR) is defined as "one whose mission is to provide reliable, long-term access to managed digital resources to its designated community, now and in the future." The TDR must include the following seven attributes: compliance with the reference model for an Open Archival Information System (OAIS), administrative responsibility, organizational viability, financial sustainability, technological and procedural suitability, system security, procedural accountability. The Trusted Digital Repository Model outlines relationships among these attributes. The report also recommended the collaborative development of digital repository certifications, models for cooperative networks, and sharing of research and information on digital preservation with regard to intellectual property rights.

In 2004 Henry M. Gladney proposed another approach to digital object preservation that called for the creation of "Trustworthy Digital Objects" (TDOs). TDOs are digital objects that can speak to their own authenticity since they incorporate a record maintaining their use and change history, which allows the future users to verify that the contents of the object are valid.

InterPARES

International Research on Permanent Authentic Records in Electronic Systems (InterPARES) is a collaborative research initiative led by the University of British Columbia that is focused on addressing issues of long-term preservation of authentic digital records. The research is being conducted by focus groups from various institutions in North America, Europe, Asia, and Australia, with an objective of developing theories and methodologies that provide the basis for strategies, standards, policies, and procedures necessary to ensure the trustworthiness, reliability, and accuracy of digital records over time.

Under the direction of archival science professor Luciana Duranti, the project began in 1999 with the first phase, InterPARES 1, which ran to 2001 and focused on establishing requirements for authenticity of inactive records generated and maintained in large databases and document management systems created by government agencies. InterPARES 2 (2002–2007) concentrated on issues of reliability, accuracy and authenticity of records throughout their whole life cycle, and examined records produced in dynamic environments in the course of artistic, scientific and online government activities. The third five-year phase (InterPARES 3) was initiated in 2007. Its goal is to utilize theoretical and methodological knowledge generated by InterPARES and other preservation research projects for developing guidelines, action plans, and training programs on long-term preservation of authentic records for small and medium-sized archival organizations.

Challenges

Society's heritage has been presented on many different materials, including stone, vellum, bamboo, silk, and paper. Now a large quantity of information exists in digital forms, including emails, blogs, social networking websites, national elections websites, web photo albums, and sites which change their content over time. With digital media it is easier to create content and keep it up-to-date, but at the same time there are many challenges in the preservation of this content, both technical and economic.

Unlike traditional analog objects such as books or photographs where the user has unmediated access to the content, a digital object always needs a software environment to render it. These environments keep evolving and changing at a rapid pace, threatening the continuity of access to the content. Physical storage media, data formats, hardware, and software all become obsolete over time, posing significant threats to the survival of the content. This process can be referred to as digital obsolescence.

In the case of born-digital content (e.g., institutional archives, websites, electronic audio and video content, born-digital photography and art, research data sets, observational data), the enormous and growing quantity of content presents significant scaling issues to digital preservation efforts. Rapidly changing technologies can hinder digital preservationists' work and techniques due to outdated and antiquated machines or technology. This has become a common problem and one that is a constant worry for a digital archivist—how to prepare for the future.

Digital content can also present challenges to preservation because of its complex and dynamic nature, e.g., interactive Web pages, virtual reality and gaming environments, learning objects, social media sites. In many cases of emergent technological advances there are substantial difficulties in maintaining the authenticity, fixity, and integrity of objects over time deriving from the fundamental issue of experience with that particular digital storage medium and while particular technologies may prove to be more robust in terms of storage capacity, there are issues in securing a framework of measures to ensure that the object remains fixed while in stewardship.

For the preservation of software as digital content, a specific challenge is the typically non-availability of the source code as commercial software is normally distributed only in compiled binary form. Without the source code an adaption (Porting) on modern computing hardware or operating system is most often impossible, therefore the original hardware and software context needs to be emulated. Another potential challenge for software preservation can be the copyright which prohibits often the bypassing of copy protection mechanisms (Digital Millennium Copyright Act) in case software has become an orphaned work (Abandonware). An exemption from the United States Digital Millennium Copyright Act to permit to bypass copy protection was approved in 2003 for a period of 3 years to the Internet Archive who created an archive of "vintage software", as a way to preserve them. The exemption was renewed in 2006, and as of 27 October 2009, has been indefinitely extended pending further rulemakings "for the purpose of preservation or archival reproduction of published digital works by a library or archive". The GitHub Archive Program has stored all of GitHub's open source code in a secure vault at Svalbard, on the frozen Norwegian island of Spitsbergen, as part of the Arctic World Archive, with the code stored as QR codes.

Another challenge surrounding preservation of digital content resides in the issue of scale. The amount of digital information being created along with the "proliferation of format types"  makes creating trusted digital repositories with adequate and sustainable resources a challenge. The Web is only one example of what might be considered the "data deluge". For example, the Library of Congress currently amassed 170 billion tweets between 2006 and 2010 totaling 133.2 terabytes and each Tweet is composed of 50 fields of metadata.

The economic challenges of digital preservation are also great. Preservation programs require significant up front investment to create, along with ongoing costs for data ingest, data management, data storage, and staffing. One of the key strategic challenges to such programs is the fact that, while they require significant current and ongoing funding, their benefits accrue largely to future generations.

Layers of archiving

The various levels of security may be represented as three layers: the "hot" (accessible online repositories) and "warm" (e.g. Internet Archive) layers both have the weakness of being founded upon electronics - both would be wiped out in a repeat of the powerful 19th-century geomagnetic storm known as the "Carrington Event". The Arctic World Archive, stored on specially developed film coated with silver halide with a lifespan of 500+ years, represents more secure snapshot of data, with archiving intended at five-year intervals.

Strategies

In 2006, the Online Computer Library Center developed a four-point strategy for the long-term preservation of digital objects that consisted of:

  • Assessing the risks for loss of content posed by technology variables such as commonly used proprietary file formats and software applications.
  • Evaluating the digital content objects to determine what type and degree of format conversion or other preservation actions should be applied.
  • Determining the appropriate metadata needed for each object type and how it is associated with the objects.
  • Providing access to the content.

There are several additional strategies that individuals and organizations may use to actively combat the loss of digital information.

Refreshing

Refreshing is the transfer of data between two types of the same storage medium so there are no bitrot changes or alteration of data. For example, transferring census data from an old preservation CD to a new one. This strategy may need to be combined with migration when the software or hardware required to read the data is no longer available or is unable to understand the format of the data. Refreshing will likely always be necessary due to the deterioration of physical media.

Migration

Migration is the transferring of data to newer system environments (Garrett et al., 1996). This may include conversion of resources from one file format to another (e.g., conversion of Microsoft Word to PDF or OpenDocument) or from one operating system to another (e.g., Windows to Linux) so the resource remains fully accessible and functional. Two significant problems face migration as a plausible method of digital preservation in the long terms. Due to the fact that digital objects are subject to a state of near continuous change, migration may cause problems in relation to authenticity and migration has proven to be time-consuming and expensive for "large collections of heterogeneous objects, which would need constant monitoring and intervention. Migration can be a very useful strategy for preserving data stored on external storage media (e.g. CDs, USB flash drives, and 3.5" floppy disks). These types of devices are generally not recommended for long-term use, and the data can become inaccessible due to media and hardware obsolescence or degradation.

Replication

Creating duplicate copies of data on one or more systems is called replication. Data that exists as a single copy in only one location is highly vulnerable to software or hardware failure, intentional or accidental alteration, and environmental catastrophes like fire, flooding, etc. Digital data is more likely to survive if it is replicated in several locations. Replicated data may introduce difficulties in refreshing, migration, versioning, and access control since the data is located in multiple places.

Understanding digital preservation means comprehending how digital information is produced and reproduced. Because digital information (e.g., a file) can be exactly replicated down to the bit level, it is possible to create identical copies of data. Exact duplicates allow archives and libraries to manage, store, and provide access to identical copies of data across multiple systems and/or environments.

Emulation

Emulation is the replicating of functionality of an obsolete system. According to van der Hoeven, "Emulation does not focus on the digital object, but on the hard- and software environment in which the object is rendered. It aims at (re)creating the environment in which the digital object was originally created." Examples are having the ability to replicate or imitate another operating system. Examples include emulating an Atari 2600 on a Windows system or emulating WordPerfect 1.0 on a Macintosh. Emulators may be built for applications, operating systems, or hardware platforms. Emulation has been a popular strategy for retaining the functionality of old video game systems, such as with the MAME project. The feasibility of emulation as a catch-all solution has been debated in the academic community. (Granger, 2000)

Raymond A. Lorie has suggested a Universal Virtual Computer (UVC) could be used to run any software in the future on a yet unknown platform. The UVC strategy uses a combination of emulation and migration. The UVC strategy has not yet been widely adopted by the digital preservation community.

Jeff Rothenberg, a major proponent of Emulation for digital preservation in libraries, working in partnership with Koninklijke Bibliotheek and Nationaal Archief of the Netherlands, developed a software program called Dioscuri, a modular emulator that succeeds in running MS-DOS, WordPerfect 5.1, DOS games, and more.

Another example of emulation as a form of digital preservation can be seen in the example of Emory University and the Salman Rushdie's papers. Rushdie donated an outdated computer to the Emory University library, which was so old that the library was unable to extract papers from the harddrive. In order to procure the papers, the library emulated the old software system and was able to take the papers off his old computer.

Encapsulation

This method maintains that preserved objects should be self-describing, virtually "linking content with all of the information required for it to be deciphered and understood". The files associated with the digital object would have details of how to interpret that object by using "logical structures called "containers" or "wrappers" to provide a relationship between all information components that could be used in future development of emulators, viewers or converters through machine readable specifications. The method of encapsulation is usually applied to collections that will go unused for long periods of time.

Persistent archives concept

Developed by the San Diego Supercomputer Center and funded by the National Archives and Records Administration, this method requires the development of comprehensive and extensive infrastructure that enables "the preservation of the organisation of collection as well as the objects that make up that collection, maintained in a platform independent form". A persistent archive includes both the data constituting the digital object and the context that the defines the provenance, authenticity, and structure of the digital entities. This allows for the replacement of hardware or software components with minimal effect on the preservation system. This method can be based on virtual data grids and resembles OAIS Information Model (specifically the Archival Information Package).

Metadata attachment

Metadata is data on a digital file that includes information on creation, access rights, restrictions, preservation history, and rights management. Metadata attached to digital files may be affected by file format obsolescence. ASCII is considered to be the most durable format for metadata because it is widespread, backwards compatible when used with Unicode, and utilizes human-readable characters, not numeric codes. It retains information, but not the structure information it is presented in. For higher functionality, SGML or XML should be used. Both markup languages are stored in ASCII format, but contain tags that denote structure and format.

Preservation repository assessment and certification

A few of the major frameworks for digital preservation repository assessment and certification are described below. A more detailed list is maintained by the U.S. Center for Research Libraries.

Specific tools and methodologies

TRAC

In 2007, CRL/OCLC published Trustworthy Repositories Audit & Certification: Criteria & Checklist (TRAC), a document allowing digital repositories to assess their capability to reliably store, migrate, and provide access to digital content. TRAC is based upon existing standards and best practices for trustworthy digital repositories and incorporates a set of 84 audit and certification criteria arranged in three sections: Organizational Infrastructure; Digital Object Management; and Technologies, Technical Infrastructure, and Security.

TRAC "provides tools for the audit, assessment, and potential certification of digital repositories, establishes the documentation requirements required for audit, delineates a process for certification, and establishes appropriate methodologies for determining the soundness and sustainability of digital repositories".

DRAMBORA

Digital Repository Audit Method Based On Risk Assessment (DRAMBORA), introduced by the Digital Curation Centre (DCC) and DigitalPreservationEurope (DPE) in 2007, offers a methodology and a toolkit for digital repository risk assessment. The tool enables repositories to either conduct the assessment in-house (self-assessment) or to outsource the process.

The DRAMBORA process is arranged in six stages and concentrates on the definition of mandate, characterization of asset base, identification of risks and the assessment of likelihood and potential impact of risks on the repository. The auditor is required to describe and document the repository's role, objectives, policies, activities and assets, in order to identify and assess the risks associated with these activities and assets and define appropriate measures to manage them.

European Framework for Audit and Certification of Digital Repositories

The European Framework for Audit and Certification of Digital Repositories was defined in a memorandum of understanding signed in July 2010 between Consultative Committee for Space Data Systems (CCSDS), Data Seal of Approval (DSA) Board and German Institute for Standardization (DIN) "Trustworthy Archives – Certification" Working Group.

The framework is intended to help organizations in obtaining appropriate certification as a trusted digital repository and establishes three increasingly demanding levels of assessment:

  1. Basic Certification: self-assessment using 16 criteria of the Data Seal of Approval (DSA).
  2. Extended Certification: Basic Certification and additional externally reviewed self-audit against ISO 16363 or DIN 31644 requirements.
  3. Formal Certification: validation of the self-certification with a third-party official audit based on ISO 16363 or DIN 31644.

nestor catalogue of criteria

A German initiative, nestor (the Network of Expertise in Long-Term Storage of Digital Resources) sponsored by the German Ministry of Education and Research, developed a catalogue of criteria for trusted digital repositories in 2004. In 2008 the second version of the document was published. The catalogue, aiming primarily at German cultural heritage and higher education institutions, establishes guidelines for planning, implementing, and self-evaluation of trustworthy long-term digital repositories.

The nestor catalogue of criteria conforms to the OAIS reference model terminology and consists of three sections covering topics related to Organizational Framework, Object Management, and Infrastructure and Security.

PLANETS Project

In 2002 the Preservation and Long-term Access through Networked Services (PLANETS) project, part of the EU Framework Programmes for Research and Technological Development 6, addressed core digital preservation challenges. The primary goal for Planets was to build practical services and tools to help ensure long-term access to digital cultural and scientific assets. The Open Planets project ended May 31, 2010. The outputs of the project are now sustained by the follow-on organisation, the Open Planets Foundation. On October 7, 2014 the Open Planets Foundation announced that it would be renamed the Open Preservation Foundation to align with the organization's current direction.

PLATTER

Planning Tool for Trusted Electronic Repositories (PLATTER) is a tool released by DigitalPreservationEurope (DPE) to help digital repositories in identifying their self-defined goals and priorities in order to gain trust from the stakeholders.

PLATTER is intended to be used as a complementary tool to DRAMBORA, NESTOR, and TRAC. It is based on ten core principles for trusted repositories and defines nine Strategic Objective Plans, covering such areas as acquisition, preservation and dissemination of content, finance, staffing, succession planning, technical infrastructure, data and metadata specifications, and disaster planning. The tool enables repositories to develop and maintain documentation required for an audit.

ISO 16363

A system for the "audit and certification of trustworthy digital repositories" was developed by the Consultative Committee for Space Data Systems (CCSDS) and published as ISO standard 16363 on 15 February 2012. Extending the OAIS reference model, and based largely on the TRAC checklist, the standard was designed for all types of digital repositories. It provides a detailed specification of criteria against which the trustworthiness of a digital repository can be evaluated.

The CCSDS Repository Audit and Certification Working Group also developed and submitted a second standard, defining operational requirements for organizations intending to provide repository auditing and certification as specified in ISO 16363. This standard was published as ISO 16919 – "requirements for bodies providing audit and certification of candidate trustworthy digital repositories" – on 1 November 2014.

Best practices

Although preservation strategies vary for different types of materials and between institutions, adhering to nationally and internationally recognized standards and practices is a crucial part of digital preservation activities. Best or recommended practices define strategies and procedures that may help organizations to implement existing standards or provide guidance in areas where no formal standards have been developed.

Best practices in digital preservation continue to evolve and may encompass processes that are performed on content prior to or at the point of ingest into a digital repository as well as processes performed on preserved files post-ingest over time. Best practices may also apply to the process of digitizing analog material and may include the creation of specialized metadata (such as technical, administrative and rights metadata) in addition to standard descriptive metadata. The preservation of born-digital content may include format transformations to facilitate long-term preservation or to provide better access.

No one institution can afford to develop all of the software tools needed to ensure the accessibility of digital materials over the long term. Thus the problem arises of maintaining a repository of shared tools. The Library of Congress has been doing that for years, until that role was assumed by the Community Owned Digital Preservation Tool Registry.

Audio preservation

Various best practices and guidelines for digital audio preservation have been developed, including:

  • Guidelines on the Production and Preservation of Digital Audio Objects IASA-TC 04 (2009), which sets out the international standards for optimal audio signal extraction from a variety of audio source materials, for analogue to digital conversion and for target formats for audio preservation
  • Capturing Analog Sound for Digital Preservation: Report of a Roundtable Discussion of Best Practices for Transferring Analog Discs and Tapes (2006), which defined procedures for reformatting sound from analog to digital and provided recommendations for best practices for digital preservation
  • Digital Audio Best Practices (2006) prepared by the Collaborative Digitization Program Digital Audio Working Group, which covers best practices and provides guidance both on digitizing existing analog content and on creating new digital audio resources
  • Sound Directions: Best Practices for Audio Preservation (2007) published by the Sound Directions Project, which describes the audio preservation workflows and recommended best practices and has been used as the basis for other projects and initiatives
  • Documents developed by the International Association of Sound and Audiovisual Archives (IASA), the European Broadcasting Union (EBU), the Library of Congress, and the Digital Library Federation (DLF).

The Audio Engineering Society (AES) also issues a variety of standards and guidelines relating to the creation of archival audio content and technical metadata.

Moving image preservation

The term "moving images" includes analog film and video and their born-digital forms: digital video, digital motion picture materials, and digital cinema. As analog videotape and film become obsolete, digitization has become a key preservation strategy, although many archives do continue to perform photochemical preservation of film stock.

"Digital preservation" has a double meaning for audiovisual collections: analog originals are preserved through digital reformatting, with the resulting digital files preserved; and born-digital content is collected, most often in proprietary formats that pose problems for future digital preservation.

There is currently no broadly accepted standard target digital preservation format for analog moving images. The complexity of digital video as well as the varying needs and capabilities of an archival institution are reasons why no "one-size-fits-all" format standard for long-term preservation exists for digital video like there is for other types of digital records "(e.g., word-processing converted to PDF/A or TIFF for images)".

Library and archival institutions, such as the Library of Congress and New York University, have made significant efforts to preserve moving images; however, a national movement to preserve video has not yet materialized". The preservation of audiovisual materials "requires much more than merely putting objects in cold storage". Moving image media must be projected and played, moved and shown. Born-digital materials require a similar approach".

The following resources offer information on analog to digital reformatting and preserving born-digital audiovisual content.

  • The Library of Congress tracks the sustainability of digital formats, including moving images.
  • The Digital Dilemma 2: Perspectives from Independent Filmmakers, Documentarians and Nonprofit Audiovisual Archives (2012). The section on nonprofit archives reviews common practices on digital reformatting, metadata, and storage. There are four case studies.
  • Federal Agencies Digitization Guidelines Initiative (FADGI). Started in 2007, this is a collaborative effort by federal agencies to define common guidelines, methods, and practices for digitizing historical content. As part of this, two working groups are studying issues specific to two major areas, Still Image and Audio Visual.
  • PrestoCenter publishes general audiovisual information and advice at a European level. Its online library has research and white papers on digital preservation costs and formats.
  • The Association of Moving Image Archivists (AMIA) sponsors conferences, symposia, and events on all aspects of moving image preservation, including digital. The AMIA Tech Review contains articles reflecting current thoughts and practices from the archivists' perspectives. Video Preservation for the Millennia (2012), published in the AMIA Tech Review, details the various strategies and ideas behind the current state of video preservation.
  • The National Archives of Australia produced the Preservation Digitisation Standards which set out the technical requirements for digitisation outputs produced under the National Digitisation Plan. This includes video and audio formats, as well as non-audiovisual formats.
  • The Smithsonian Institution Archives published guidelines regarding file formats used for the long-term preservation of electronic records, which are regarded as open, standard, non-proprietary, and well-established. The guidelines are used for video and audio formats, and other non-audiovisual materials.

Codecs and containers

Moving images require a codec for the decoding process; therefore, determining a codec is essential to digital preservation. In "A Primer on Codecs for Moving Image and Sound Archives: 10 Recommendations for Codec Selection and Management" written by Chris Lacinak and published by AudioVisual Preservation Solutions, Lacinak stresses the importance of archivists choosing the correct codec as this can "impact the ability to preserve the digital object". Therefore, the codec selection process is critical, "whether dealing with born digital content, reformatting older content, or converting analog materials". Lacinak's ten recommendations for codec selection and management are the following: adoption, disclosure, transparency, external dependencies, documentation and metadata, pre-planning, maintenance, obsolescence monitoring, maintenance of the original, and avoidance of unnecessary trans-coding or re-encoding. There is a lack of consensus to date among the archival community as to what standard codec should be used for the digitization of analog video and the long-term preservation of digital video nor is there a single "right" codec for a digital object; each archival institution must "make the decision as part of an overall preservation strategy".

A digital container format or wrapper is also required for moving images and must be chosen carefully just like the codec. According to an international survey conducted in 2010 of over 50 institutions involved with film and video reformatting, "the three main choices for preservation products were AVI, QuickTime (.MOV) or MXF (Material Exchange Format)". These are just a few examples of containers. The National Archives and Records Administration (NARA) has chosen the AVI wrapper as its standard container format for several reasons including that AVI files are compatible with numerous open source tools such as VLC.

Uncertainty about which formats will or will not become obsolete or become the future standard makes it difficult to commit to one codec and one container." Choosing a format should "be a trade off for which the best quality requirements and long-term sustainability are ensured."

Considerations for content creators

By considering the following steps, content creators and archivists can ensure better accessibility and preservation of moving images in the long term:

  • Create uncompressed video if possible. While this does create large files, their quality will be retained. Storage must be considered with this approach.
  • If uncompressed video is not possible, use lossless instead of lossy compression. The compressed data gets restored while lossy compression alters data and quality is lost.
  • Use higher bit rates (This affects resolution of the image and size of file.)
  • Use technical and descriptive metadata.
  • Use containers and codecs that are stable and widely used within the archival and digital preservation communities.

Email preservation

Email poses special challenges for preservation: email client software varies widely; there is no common structure for email messages; email often communicates sensitive information; individual email accounts may contain business and personal messages intermingled; and email may include attached documents in a variety of file formats. Email messages can also carry viruses or have spam content. While email transmission is standardized, there is no formal standard for the long-term preservation of email messages.

Approaches to preserving email may vary according to the purpose for which it is being preserved. For businesses and government entities, email preservation may be driven by the need to meet retention and supervision requirements for regulatory compliance and to allow for legal discovery. (Additional information about email archiving approaches for business and institutional purposes may be found under the separate article, Email archiving.) For research libraries and archives, the preservation of email that is part of born-digital or hybrid archival collections has as its goal ensuring its long-term availability as part of the historical and cultural record.

Several projects developing tools and methodologies for email preservation have been conducted based on various preservation strategies: normalizing email into XML format, migrating email to a new version of the software and emulating email environments: Memories Using Email (MUSE), Collaborative Electronic Records Project (CERP), E-Mail Collection And Preservation (EMCAP), PeDALS Email Extractor Software (PeDALS), XML Electronic Normalizing of Archives tool (XENA).

Some best practices and guidelines for email preservation can be found in the following resources:

  • Curating E-Mails: A Life-cycle Approach to the Management and Preservation of E-mail Messages (2006) by Maureen Pennock.
  • Technology Watch Report 11-01: Preserving Email (2011) by Christopher J Prom.
  • Best Practices: Email Archiving by Jo Maitland.

Video game preservation

In 2007 the Keeping Emulation Environments Portable (KEEP) project, part of the EU Framework Programmes for Research and Technological Development 7, developed tools and methodologies to keep digital software objects available in their original context. Digital software objects as video games might get lost because of digital obsolescence and non-availability of required legacy hardware or operating system software; such software is referred to as abandonware. Because the source code is often not available any longer, emulation is the only preservation opportunity. KEEP provided an emulation framework to help the creation of such emulators. KEEP was developed by Vincent Joguin, first launched in February 2009 and was coordinated by Elisabeth Freyre of the French National Library.

A community project, MAME, aims to emulate any historic computer game, including arcade games, console games and the like, at a hardware level, for future archiving.

In January 2012 the POCOS project funded by JISC organised a workshop on the preservation of gaming environments and virtual worlds.

Personal archiving

There are many things consumers and artists can do themselves to help care for their collections at home.

  • The Software Preservation Society is a group of computer enthusiasts that is concentrating on finding old software disks (mostly games) and taking a snapshot of the disks in a format that can be preserved for the future.
  • "Resource Center: Caring For Your Treasures" by American Institute for Conservation of Historic and Artistic Works details simple strategies for artists and consumers to care for and preserve their work themselves.

The Library of Congress also hosts a list for the self-preserver which includes direction toward programs and guidelines from other institutions that will help the user preserve social media, email, and formatting general guidelines (such as caring for CDs). Some of the programs listed include:

  • HTTrack: Software tool which allows the user to download a World Wide Web site from the Internet to a local directory, building recursively all directories, getting HTML, images, and other files from the server to their computer.
  • Muse: Muse (short for Memories Using Email) is a program that helps users revive memories, using their long-term email archives, run by Stanford University.

Scientific research

In 2020, researchers reported in a preprint that they found "176 Open Access journals that, through lack of comprehensive and open archives, vanished from the Web between 2000-2019, spanning all major research disciplines and geographic regions of the world" and that in 2019 only about a third of the 14,068 DOAJ-indexed journals ensured the long-term preservation of their content. Some of the scientific research output is not located at the scientific journal's website but on other sites like source-code repositories such as GitLab. The Internet Archive archived many – but not all – of the lost academic publications and makes them available on the Web. According to an analysis by the Internet Archive "18 per cent of all open access articles since 1945, over three million, are not independently archived by us or another preservation organization, other than the publishers themselves". Sci-Hub does academic archiving outside the bounds of contemporary copyright law and also provides access to academic works that do not have an open access license.

Digital Building Preservation

"The creation of a 3D model of a historical building needs a lot of effort." Recent advances in technology have led to developments of 3-D rendered buildings in virtual space. Traditionally the buildings in video games had to be rendered via code, and many game studios have done highly detailed renderings (see Assassin's Creed). But due to most preservationist not being highly capable teams of professional coders, Universities have begun developing methods by doing 3-D laser scanning. Such work was attempted by the National Taiwan University of Science and Technology in 2009. Their goal was "to build as-built 3D computer models of a historical building, the Don Nan-Kuan House, to fulfill the need of digital preservation." To rather great success, they were capable of scanning the Don Nan-Kuan House with bulky 10 kg (22 lbs.) cameras and with only minor touch-ups where the scanners were not detailed enough. More recently in 2018 in Calw, Germany, a team conducted a scanning of the historic Church of St. Peter and Paul by collecting data via laser scanning and photogrammetry. "The current church's tower is about 64 m high, and its architectonic style is neo-gothic of the late nineteenth century. This church counts with a main nave, a chorus and two lateral naves in each side with tribunes in height. The church shows a rich history, which is visible in the different elements and architectonic styles used. Two small windows between the choir and the tower are the oldest parts preserved, which date to thirteenth century. The church was reconstructed and extended during the sixteenth (expansion of the nave) and seventeenth centuries (construction of tribunes), after the destruction caused by the Thirty Years' War (1618-1648). However, the church was again burned by the French Army under General Mélac at the end of the seventeenth century. The current organ and pulpit are preserved from this time. In the late nineteenth century, the church was rebuilt and the old dome Welsch was replaced by the current neo-gothic tower. Other works from this period are the upper section of the pulpit, the choir seats and the organ case. The stained-glass windows of the choir are from the late nineteenth and early twentieth centuries, while some of the nave's windows are from middle of the twentieth century. Second World War having ended, some neo-gothic elements were replaced by pure gothic ones, such as the altar of the church, and some drawings on the walls and ceilings." With this much architectural variance it presented a challenge and a chance to combine different technologies in a large space with the goal of high-resolution. The results were rather good and are available to view online.

Education

The Digital Preservation Outreach and Education (DPOE), as part of the Library of Congress, serves to foster preservation of digital content through a collaborative network of instructors and collection management professionals working in cultural heritage institutions. Composed of Library of Congress staff, the National Trainer Network, the DPOE Steering Committee, and a community of Digital Preservation Education Advocates, as of 2013 the DPOE has 24 working trainers across the six regions of the United States. In 2010 the DPOE conducted an assessment, reaching out to archivists, librarians, and other information professionals around the country. A working group of DPOE instructors then developed a curriculum  based on the assessment results and other similar digital preservation curricula designed by other training programs, such as LYRASIS, Educopia Institute, MetaArchive Cooperative, University of North Carolina, DigCCurr (Digital Curation Curriculum) and Cornell University-ICPSR Digital Preservation Management Workshops. The resulting core principles are also modeled on the principles outlined in "A Framework of Guidance for Building Good Digital Collections" by the National Information Standards Organization (NISO).

In Europe, Humboldt-Universität zu Berlin and King's College London offer a joint program in Digital Curation that emphasizes both digital humanities and the technologies necessary for long term curation. The MSc in Information Management and Preservation (Digital) offered by the HATII at the University of Glasgow has been running since 2005 and is the pioneering program in the field.

Examples of initiatives

A number of open source products have been developed to assist with digital preservation, including Archivematica, DSpace, Fedora Commons, OPUS, SobekCM and EPrints. The commercial sector also offers digital preservation software tools, such as Ex Libris Ltd.'s Rosetta, Preservica's Cloud, Standard and Enterprise Editions, CONTENTdm, Digital Commons, Equella, intraLibrary, Open Repository and Vital.

Large-scale initiatives

Many research libraries and archives have begun or are about to begin large-scale digital preservation initiatives (LSDIs). The main players in LSDIs are cultural institutions, commercial companies such as Google and Microsoft, and non-profit groups including the Open Content Alliance (OCA), the Million Book Project (MBP), and HathiTrust. The primary motivation of these groups is to expand access to scholarly resources.

Approximately 30 cultural entities, including the 12-member Committee on Institutional Cooperation (CIC), have signed digitization agreements with either Google or Microsoft. Several of these cultural entities are participating in the Open Content Alliance and the Million Book Project. Some libraries are involved in only one initiative and others have diversified their digitization strategies through participation in multiple initiatives. The three main reasons for library participation in LSDIs are: access, preservation, and research and development. It is hoped that digital preservation will ensure that library materials remain accessible for future generations. Libraries have a responsibility to guarantee perpetual access for their materials and a commitment to archive their digital materials. Libraries plan to use digitized copies as backups for works in case they go out of print, deteriorate, or are lost and damaged.

Arctic World Archive

The Arctic World Archive is a facility for data preservation of historical and cultural data from several countries, including open source code.

Dictatorship

From Wikipedia, the free encyclopedia

A dictatorship is a form of government characterized by an unelected leader or group of leaders that hold government power with few to no limitations. The leader of a dictatorship is called a dictator. Politics in a dictatorship take place between the dictator, the inner circle, and the opposition, which may be peaceful or violent. Dictatorships can be formed by a military coup that overthrows the previous government through force or by a self-coup in which elected leaders make their rule permanent. Dictatorships can be classified as military dictatorships, one-party dictatorships, personalist dictatorships, or absolute monarchies.

The term dictatorship originates from its use in Roman Republic. Early military dictatorships developed in the post-classical era, particularly in Shogun-era Japan. Modern dictatorships developed in the 19th century as caudillos seized power in Latin America. Fascist states and Communist states emerged in Europe the 1920s and 1930s. Fascism was eradicated in the aftermath of World War II, while Communism spread to other continents. Personalist dictatorships in Africa and military dictatorships in Latin America became prominent in the 1960s and 1970s. Many dictatorships fell during the end of the Cold War and the third wave of democratisation. Many dictatorships still exist, particularly in Africa and Asia.

Dictatorships often hold elections to establish legitimacy or to provide incentives for members of the ruling party, but these elections are not competitive for the opposition. Stability in a dictatorship is maintained through coercion, which involves the restriction of information, tracking of political opposition, and acts of violence. Strong opposition groups can result in the collapse of a dictatorship through a coup or a revolution.

Etymology

The word dictator comes from the Latin language word dictātor, agent noun from dictare (dictāt-, past participial stem of dictāre dictate v. + -or -or suffix). In Latin use, a dictator was a judge in the Roman Republic temporarily invested with absolute power. Typically, in a dictatorial regime, the leader of the country is identified with the title of dictator; although, their formal title may more closely resemble something similar to leader.

Structure

The leader of a dictatorship is called a dictator. The power structures of dictatorships vary, and different definitions of dictatorship consider different elements of this structure. Political scientists such as Juan José Linz and Samuel P. Huntington identify key attributes that define the power structure of a dictatorship, including a single leader or a small group of leaders, the exercise of power with few limitations, limited political pluralism, and limited mass mobilization. Dictatorship may also be defined as a lack of democracy.

The dictator exercises broad power over the government and society, but other individuals are necessary to carry out the dictator's rule. These individuals form an inner circle, making up a class of elites that hold a degree of power within the dictatorship and receive benefits in exchange for their support. They may be military officers, party members, or friends and family of the dictator. Elites are also the primary political threats of a dictator, as they can leverage their power to influence or overthrow the dictatorship. The inner circle's support is necessary for a dictator's orders to be carried out, causing elites to serve as a check on the dictator's power. To enact policy, a dictator must either appease the regime's elites or attempt to replace them. Elites must also compete to wield more power than one another, but the amount of power held by elites also depends on their unity. Factions or divisions among the elites will mitigate their ability to bargain with the dictator, resulting in the dictator having more unrestrained power. A unified inner circle has the capacity to overthrow a dictator, and the dictator must make greater concessions to the inner circle to stay in power. This is particularly true when the inner circle is made up of military officers that have the resources to carry out a military coup.

The opposition to a dictatorship represents all of the factions that are not part of the dictatorship and anyone that does not support the regime. Organized opposition is a threat to the stability of a dictatorship, as it seeks to undermine public support for the dictator and calls for regime change. A dictator may address the opposition by repressing it through force, modifying laws to restrict its power, or appeasing it with limited benefits. The opposition can be an external group, or it can also include current and former members of the dictator's inner circle.

Totalitarianism is a variation of dictatorship characterized by the presence of a single political party and more specifically, by a powerful leader who imposes personal and political prominence. Power is enforced through a steadfast collaboration between the government and a highly developed ideology. A totalitarian government has "total control of mass communications and social and economic organizations". Political philosopher Hannah Arendt describes totalitarianism as a new and extreme form of dictatorship composed of "atomized, isolated individuals" in which ideology plays a leading role in defining how the entire society should be organized. According to Linz, the distinction between an authoritarian regime and a totalitarian one is that an authoritarian regime seeks to suffocate politics and political mobilization while totalitarianism seeks to control and utilize them.

Formation

SEATO leaders, including dictators Nguyen Cao Ky from South Vietnam (first from left), Park Chung-Hee from South Korea (third from left), Ferdinand Marcos from the Philippines (fourth from the left), and Thanom Kittikachorn from Thailand (second from the right)

A dictatorship is formed when a specific group seizes power. The composition of this group affects how power is seized and how the eventual dictatorship will rule. The seizure group may be military or political, it may be organized or disorganized, and it may disproportionately represent a certain demographic. After power is seized, the group must determine what positions its members will hold in the new government and how this government will operate, sometimes resulting in disagreements that split the group. Members of the group will typically make up the elites in a dictator's inner circle at the beginning of a new dictatorship, though the dictator may remove them as a means to gain additional power. Unless they have undertaken a self-coup, seizure groups typically have little governmental experience and do not have a detailed policy plan before taking power. After a dictator seizes power, a political party may be formed to create a mechanism to reward supporters and to concentrate power in the hands of allies instead of armed supporters.

Most dictatorships are formed through military means or through a political party. Nearly half of dictatorships start as a military coup, though others have been started by foreign intervention, elected officials ending competitive elections, insurgent takeovers, popular uprisings by citizens, or a rule-change by autocratic elites to take power within their government. Between 1946 and 2010, 42% of dictatorships began by overthrowing a different dictatorship, and 26% began by declaring independence from a foreign government.

Several theories exist as to why dictatorships form. Mancur Olson suggests that dictatorships are an alternative to "roving bandits"; rather than moving from place to place and extracting wealth, dictators can monopolize banditry in one place while providing an illusion of security to increase productivity. Peter Alter suggests a value system perspective based on cultural & political nation, national consciousness, and nation-building.

Types

Political scientist Barbara Geddes describes three types of dictatorship. Military dictatorships are controlled by military officers, single-party dictatorships are controlled by the members of a political party, and personalist dictatorships are controlled by a single individual. Monarchies are also considered dictatorships in some circumstances if they hold significant political power. Hybrid dictatorships are regimes that have a combination of these classifications. Dictatorships can also be defined by the degree of authoritarianism, the use of loyalty or repression, how they interact with the organization that brought them to power.

Military dictatorships

Thailand's Prime Minister Prayut Chan-o-cha in 2014

Military dictatorships are regimes in which one or more military officers holds power, determines who will lead the country, and exercises influence over policy. They are most common in developing nations in Africa, Asia, and Latin America. They are often unstable, and the average duration of a military dictatorship is only five years, but they are often followed by additional military coups and military dictatorships. While common in the 20th century, the prominence of military dictatorships declined in the 1970s and 1980s.

Military dictatorships are typically formed by a military coup in which one or more senior officers uses the military to overthrow the government. In democracies, the threat of a military coup is associated with the period immediately after a democracy's creation but prior to large-scale military reforms. In oligarchies, the threat of a military coup comes from the strength of the military weighed against the concessions made to the military. Other factors associated with military coups include extensive natural resources, limited use of the military internationally, and use of the military as an oppressive force domestically. Military coups do not necessarily result in military dictatorships, as power may then be passed to an individual or the military may allow democratic elections to take place. Military dictatorships in the past have been significantly more common in Latin America.

Military dictatorships often have traits in common due to the shared background of military dictators. These dictators may view themselves as impartial in their oversight of a country due to their nonpartisan status, and they may view themselves as "guardians of the state". The predominance of violent force in military training manifests in an acceptance of violence as a political tool and the ability to organize violence on a large scale. Military dictators may also be less trusting or diplomatic and underestimate the use of bargaining and compromise in politics.

One-party dictatorships

One-party dictatorships are governments in which a single political party dominates politics. Single-party dictatorships are one-party states in which only the party in power is legalized and all opposition parties are banned. Dominant-party dictatorships or electoral authoritarian dictatorships are one-party states in which opposition parties are nominally legal but cannot meaningfully influence government. Single-party dictatorships were more common during the Cold War, but dominant-party dictatorships replaced them after the fall of the Soviet Union. One-party dictatorships are distinct from political parties that were created to serve a dictator; the ruling party in a one-party dictatorship permeates every level of society. One-party dictatorships became prominent in Asia and Eastern Europe during the Cold War as Communist governments were installed in several countries.

One-party dictatorships are more stable than other forms of authoritarian rule, as they are less susceptible to insurgency and see higher economic growth. Ruling parties allow a dictatorship to more broadly influence the populace and facilitate political agreement between party elites. Between 1950 and 2016, one-party dictatorships made up 57% of authoritarian regimes in the world. Due to the structure of their leadership, one-party dictatorships are significantly less likely to face civil conflict, insurgency, or terrorism than other forms of dictatorship. The use of ruling parties also provides more legitimacy to its leadership and elites than other forms of dictatorship.

A ruling party in a one-party dictatorship may rule under any ideology or it may have no guiding ideology. One-party states ruled by Marxist political parties are sometimes distinguished from other types of one-party dictatorship, but they are distinct in ideology rather than function. When a one-party dictatorship develops gradually through legal means, in can result in conflict between the party organization and the state apparatus and civil service as the party rules in parallel and increasingly appoints its own members to positions of power. Parties that take power through violence are often able to implement larger changes in a shorter period of time.

Personalist dictatorships

Alexander Lukashenko, President of Belarus

Personalist dictatorships are regimes in which all power lies in the hands of a single individual. They differ from other forms of dictatorships in their access to key political positions, other fruits of office, and depend much more on the discretion of the dictator. Personalist dictators may be members of the military or leaders of a political party, but neither the military nor the party exercises power independently from the dictator. In personalist dictatorships, the elite corps are usually made up of close friends or family members of the dictator, who typically handpicks these individuals to serve their posts. These dictatorships often emerge either from loosely organized seizures of power, giving the leader opportunity to consolidate power, or from democratically-elected leaders in countries with weak institutions, giving the leader opportunity to change the constitution. Personalist dictatorships are more common in Sub-Saharan Africa due to less established institutions in the region.

Personalist dictators typically favor loyalty over competence in their governments and have a general distrust of intelligentsia. Elites in personalist dictatorships often do not have a professional political career and are unqualified for positions they are given. A personalist dictator will manage these appointees by segmenting the government so that they cannot collaborate. The result is that such regimes have no internal checks and balances, and are thus unrestrained when exerting repression on their people, making radical shifts in foreign policy, or starting wars with other countries. Due to the lack of accountability and the smaller group of elites, personalist dictatorships are more prone to corruption than other forms of dictatorship. According to a 2019 study, personalist dictatorships are more repressive than other forms of dictatorship. Personalist dictatorships often collapse with the death of the dictator. They are more likely to end in violence and less likely to democratize than other forms of dictatorship.

The shift in the power relation between the dictator and its inner circle has severe consequences for the behavior of such regimes as a whole. Many scholars have identified ways in which personalist regimes diverge from other regimes when it comes to their longevity, methods of breakdown, levels of corruption, and proneness to conflicts. Personalist dictatorships on average last twice as long as military dictatorships but not as long as single-party dictatorships. Personalist dictatorships also experience growth differently, as they often lack the institutions or qualified leadership to sustain an economy. Without any checks and balances to their rule, such dictators are domestically unopposed when it comes to unleashing repression, or even starting wars.

Absolute monarchies

An absolute monarchy is a monarchy in which the monarch rules without legal limitations. This makes it distinct from constitutional monarchy and ceremonial monarchy. In an absolute monarchy, power is limited to the royal family, and legitimacy is established by historical factors. In the modern era, absolute monarchies are most common in the Middle East. Montesquieu made a distinction between despots that ruled unrestrained and monarchs that ruled within the laws of a kingdom. Political parties are relatively rare in monarchic dictatorships compared to military or civilian dictatorships. Monarchies may be dynastic, in which the royal family serves as a ruling institution similar to a political party in a one-party state, or they may be non-dynastic, in which the monarch rules independently of the royal family as a personalist dictator. Monarchies allow for strict rules of succession that produce a peaceful transfer of power on the monarch's death, but this can also result in succession disputes if multiple members of the royal family claim a right to succeed.

History

Dictators in the Roman Empire

During the Republican phase of Ancient Rome, a Roman dictator was the special magistrate who held well defined powers, normally for six months at a time, usually in combination with a consulship. These powers were granted during times of crisis in which a single leader was needed to command and restore stability. At least 85 such dictators were chosen over the course of the Roman Republic, the last of which was chosen to wage the Second Punic War. The dictatorship was revived 120 years later through a populist movement led by Sulla, and 33 years after that by Julius Caesar, under whose dictatorship the Roman Republic became the Roman Empire.

Post-classical and early modern dictatorships

Japan and Korea saw several military dictatorships during the post-classical era. During the early stages of the Goguryeo–Tang War in 642, Yeon Gaesomun organized a coup in the Goguryeo Kingdom and established himself as a military dictator. A coup took place in the Goryeo Kingdom in 1170, establishing the Goryeo military regime for the next century. Shogun was the title of the military dictators of Japan beginning with the Kamakura shogunate in 1185 and continuing through other shogunates for over six hundred years. While Shoguns nominally operated under the control of the Emperor of Japan, they served as de facto rulers of Japan and the Japanese military.

The Commonwealth of England under Oliver Cromwell, formed in 1649 after the Second English Civil War, has been described as a military dictatorship by its contemporary opponents and by some modern academics. Maximilien Robespierre has been similarly described as a military dictator while he controlled the National Convention in France and carried out the Reign of Terror in 1793 and 1794.

19th century dictatorships

Antonio López de Santa Anna wearing a Mexican military uniform

Dictatorship developed as a major form of government in the 19th century, though in Europe it was often thought of in terms of Bonapartism and Caesarism. The concept of dictatorship was not universally seen pejoratively at the time, with both a tyrannical concept and a quasi-constitutional concept of dictatorship understood to exist. The Spanish American wars of independence took place in the early-19th century, creating many new Latin American governments. Many of these governments fell under the control of caudillos, or personalist strongmen dictators. Most caudillos came from a military background, and their rule was typically associated with pageantry and glamor. Caudillos were often nominally constrained by a constitution, but the caudillo had the power to draft a new constitution as he wished. Many are noted for their cruelty, while others are honored as national heroes.

Many Latin American countries experienced dictatorships by caudillos shortly after their formation in the early-19th century. Juan Manuel de Rosas was a major figure in the formation of Argentina, ruling as dictator from 1829 to 1852. In Guatemala, Rafael Carrera ruled as dictator from 1839 to 1865. In Venezuela, José Antonio Páez ruled in the decades following the country's founding. José Gaspar Rodríguez de Francia ruled Paraguay from its founding until 1840. President Antonio López de Santa Anna of Mexico established himself as a military dictator, and he gave himself the title of His Serene Highness in 1853. He was overthrown and exiled in 1855. President Porfirio Díaz of Mexico took power in 1876 and served as the military dictator until the Mexican Revolution in a period known as the Porfiriato.

Dictatorships of the World Wars

European dictatorships of the World Wars

Benito Mussolini (left) and Adolf Hitler (right)

Dictatorship expanded in early-20th century Europe through a combination of far-left and far-right takeovers. The aftermath of World War I resulted in a major shift in European government, establishing new governments, facilitating internal change in other governments, and redrawing the boundaries between countries. These changes provided opportunities for extremist far-left and far-right political movements to take power.

Vladimir Lenin established Soviet Russia in 1917 as a dictatorship of the proletariat. The Bolshevik government during the Russian Civil War had democratic elements, but following poor electoral performance, Lenin dissolved the Constituent Assembly. The Soviet Union was formed as a dictatorship in 1922 under the control of Lenin and the other Bolsheviks, whose power was enforced through secret police organizations such as the Cheka. Following Lenin's death in 1924, the party chose Joseph Stalin to be its next leader, and Stalin gained total control by 1929. In the following decades, Stalin carried out a totalitarian rule in which all threats to his power were eliminated through purges, eliminating democracy even within the one party system. A Soviet government was briefly established in Hungary in 1919, but it fell the same year.

Benito Mussolini was the first fascist dictator. He carried out the March on Rome in 1922, forcing King Victor Emmanuel III to appoint him as Prime Minister of Italy. In 1925, he began implementing his system of fascism, based on totalitarianism, fealty to the state, expansionism, corporatism, and anti-communism, though its application varied and was often inconsistent. Adolf Hitler was appointed chancellor of the Weimar Republic in 1933, his rise to power coinciding with weakening democracy in the country. Over the following six months, Hitler and the Nazi Party obtained absolute power through a combination of electoral victory, violence, and emergency powers, assuming the office of president in addition to chancellor and taking the title of Führer. Austria briefly underwent a period of dictatorship under Engelbert Dollfuss and Kurt Schuschnigg before being annexed by Germany.

Miguel Primo de Rivera was appointed Prime Minister of Spain in 1923 following a military coup, and he ruled as a dictator. By 1930, Primo de Rivera had alienated every major faction of Spanish politics and was convinced to step down. His government was replaced by the Second Spanish Republic. In 1926, Manuel Gomes da Costa led a military coup and established the Ditadura Nacional in Portugal. His successor, Óscar Carmona, chose to give control of finances to economics professor António de Oliveira Salazar. Salazar became Prime Minister of Portugal in 1932 and established the Estado Novo. Francisco Franco took power in Spain after leading the Nationalist faction to victory in the Spanish Civil War and became a dictator in 1939.

The Baltic states all became dictatorships between the World Wars. Antanas Smetona took power in Lithuania in 1926, Konstantin Päts took power in Estonia in 1934, and Kārlis Ulmanis took power in Latvia in 1934. The dictatorships in the Baltic states were considered to be milder than those in other European countries, with private enterprise and the press being relatively free. These dictatorships ended after they were occupied in World War II.

Several right-wing dictatorships also emerged in the Balkans during the interwar period. Bulgaria underwent a period of several dictatorships following a military coup in 1923. Ahmed Zogu overthrew the government in Albania in 1924, and he proclaimed himself King Zog I in 1928. He was dictator until Albania was occupied in World War II. King George II of Greece appointed Ioannis Metaxas as Prime Minister of Greece in 1936, and Metaxas ruled as a dictator until his death in 1941. In 1940, King Michael I of Romania granted Ion Antonescu dictatorial powers, and Antonescu declared himself the Conducător of Romania.

During World War II, Germany and Italy occupied several European countries and established fascist client states. These include Albania, Belgium, the Czech lands, Denmark, France, Greece, Hungary, the Netherlands, Poland, Norway, the Slovak Republic, Yugoslavia and The Soviet Union. Poland was occupied by both Germany and the Soviet Union. Allied victory in Europe and the fall of Nazi Germany resulted in the liberation of Nazi-occupied territories and the dissolving of fascist governments.

Latin American dictatorships of the World Wars

Augusto B. Leguía ruled as a dictator in Peru from 1919 to 1930. Juan Vicente Gómez ruled Venezuela as a dictator from 1908 until his death in 1935. Rafael Trujillo took power as a "nearly totalitarian" dictator of the Dominican Republic in the 1930s and ruled for 30 years. The 1930 Argentine coup d'état was the first in a series of coups and military dictatorships that would affect the country for decades. Jorge Ubico took power in Guatemala in 1931 and ruled until he was deposed by a pro-democracy uprising in 1944. In 1931, a coup was organized against the government of Arturo Araujo, causing the period of military dictatorship in El Salvador, starting with the Civic Directory. The government committed several crimes against humanity, such as those of La Matanza. The dictatorship ended with the 1979 Salvadoran coup d'état and the start of the Salvadoran Civil War. President Tiburcio Carías Andino carried out a self-coup in Honduras after the election of 1932 and served as a dictator until 1949. A self-coup in Uruguay established Gabriel Terra as dictator in 1933. Getúlio Vargas led a coup in 1937 that established him as a dictator in Brazil under an Estado Novo system. In Paraguay, Higinio Morínigo established himself as a military dictator in 1940 and ruled until 1948.

Dictatorships of the Cold War

African dictatorships of the Cold War

Mobutu Sese Seko, Zaire's longtime dictator

Many dictatorships formed in Africa, with most forming after countries gained independence during decolonisation. Mobutu Sese Seko ruled the Democratic Republic of the Congo as a dictator for decades, renaming it Zaire. Teodoro Obiang Nguema Mbasogo has ruled Equatorial Guinea as a dictator since he led a military coup in 1979. In 1973, King Sobhuza II of Swaziland suspended the constitution and ruled as an absolute monarch. Samuel Doe established a military dictatorship in Liberia in the 1980s. Libya was ruled by Muammar Gaddafi for several decades following a military coup. Moussa Traoré ruled as a dictator in Mali. Habib Bourguiba ruled as a dictator in Tunisia until he was deposed by a coup led by Zine El Abidine Ben Ali in 1987, who in turn ruled as a dictator until the Tunisian Revolution in 2011. Robert Mugabe ruled as a dictator in Zimbabwe.

Early socialist dictatorships in Africa mainly developed as personalist dictatorships, in which a single socialist would take power instead of a ruling party. Later in the Cold War, the Soviet Union increased its influence in Africa as Marxist-Leninist dictatorships developed in several African countries. One-party Marxist states in Africa included Angola under the MPLA, Benin under Mathieu Kérékou, Cape Verde under the PAICV, the Congo under the Congolese Party of Labour, Ethiopia under the Workers' Party of Ethiopia, Madagascar under AREMA, Mozambique under FRELIMO, and Somalia under Siad Barre.

Many African countries underwent several military coups that installed a series of military dictatorships throughout the Cold War. These include Benin, Burkina Faso, Burundi, the Central African Republic, Comoros, the Democratic Republic of the Congo, Ethiopia, Ghana, Mauritania, Niger, Nigeria, Sierra Leone, Sudan, and Uganda, each undergoing at least three successful military coups between 1959 and 2001.

Some leaders of African countries abolished opposition parties, establishing one-party dictatorships. These include the National Liberation Front in Algeria, the Chadian Progressive Party under François Tombalbaye in Chad, the Gabonese Democratic Party under Omar Bongo in Gabon, the Democratic Party under Ahmed Sékou Touré in Guinea, the Malawi Congress Party under Hastings Banda in Malawi, the MNSD under Ali Saibou in Niger, MRND under Juvénal Habyarimana in Rwanda, the Socialist Party under Léopold Sédar Senghor in Senegal, Julius Nyerere in Tanzania, the RPT under Gnassingbé Eyadéma in Togo, and the United National Independence Party under Kenneth Kaunda in Zambia. The KANU in Kenya ruled under a de facto one-party state.

Asian dictatorships of the Cold War

Mao Zedong established the People's Republic of China as a one-party Communist state at the end of the Chinese Civil War in 1949, removing the Nationalist Chinese government from power. Mao implemented his governing ideology of Maoism. The country maintained a strained relationship with the Soviet Union, and relations deteriorated as the Soviet Union underwent de-Stalinization in the late-1950s. In the 1960s, amid fear that he would lose control of the Communist Party, Mao initiated the Cultural Revolution, which involved the destruction of any elements of capitalism in China while also establishing relations with Japan and the United States. Deng Xiaoping took power as the de facto leader of China after Mao's death and implemented reforms to restore stability following the Cultural Revolution and reestablish free market economics. Chiang Kai-shek continued to rule as dictator of the National government's rump state in Taiwan until his death in 1975.

North Korea and South Korea both emerged from World War II as dictatorships. North Korea was established under Soviet influence, and Kim Il-sung led the country as a one-party Marxist state. South Korea was under the dictatorship of Syngman Rhee in the 1950s, but his rule ended following the April Revolution. The country became a military dictatorship under Chun Doo-hwan in the 1980s, but the June Democratic Struggle in 1987 led to democratization. In Southern Asia, Ayub Khan established himself as a military dictator of Pakistan during the 1958 coup, and Muhammad Zia-ul-Haq established himself as a military dictator in the 1977 coup. Hussain Muhammad Ershad took power in Bangladesh in a 1982 military coup and ruled until 1991. Nepal was an absolute monarchy until the 1990 Nepalese revolution created a constitutional monarchy.

Southeast Asia was influenced by China during the Cold War, and three Communist dictatorships were formed in the region: North Vietnam, Laos, and Kampuchea. North Vietnam conquered South Vietnam at the end of the Vietnam War, and the two merged into a single Communist country. Anti-Communist dictators also ruled in the region. Suharto became dictator in Indonesia, taking power in 1967 until a violent unrest in 1998 forced him to resign. Ngo Dinh Diem ruled South Vietnam as a dictator until the 1963 military coup. Ferdinand Marcos ruled Philippines as a dictator until the People Power Revolution in 1986. A socialist military dictatorship was also created separately from the Communist governments in Burma until it was overthrown in 1988 and replaced by a new military dictatorship.

The Middle East was decolonized during the Cold War, and many nationalist movements gained strength post-independence. A 1953 coup overseen by the American and British governments restored Mohammad Reza Pahlavi as the absolute monarch of Iran, who in turn was overthrown during the Iranian Revolution of 1979 that established Ruhollah Khomeini as Supreme Leader of Iran under an Islamist government. Several Middle Eastern countries were the subject of military coups in the 1950s and 1960s, including Iraq, Syria, North Yemen, and South Yemen. Afghanistan became a one-party dictatorship after the 1973 coup, and it became a Marxist dictatorship after the Saur Revolution in 1978.

European dictatorships of the Cold War

Josip Broz Tito, President of Yugoslavia

During World War II, the countries of Central and Eastern Europe had been occupied by the Soviet Union. When the war ended, these countries were incorporated into the Soviet sphere of influence, and the Soviet Union exercised control over their governments. Soviet occupation of Bulgaria and Poland allowed for the immediate establishment of a new government. The Soviet occupation of East Germany resulted in the creation of a new one-party state controlled by the Socialist Unity Party of Germany. The Czechoslovak government was replaced by the Ninth-of-May Constitution, which maintained a facade of democracy while the Communist Party of Czechoslovakia held authority. Following the liberation of Hungary, Communists gained influence in the country by infiltrating its government and carrying out a Communist takeover, implementing a new constitution to implement one party rule. The Soviet government pressured King Michael I of Romania to appoint Petru Groza as Prime Minister of Romania, and Groza's government enacted a new constitution to implement Communist rule.

Josip Broz Tito declared a Communist government in Yugoslavia during World War II, and Soviet occupation established this government as the sole authority in the country. Tito's government was initially aligned with the Soviet Union, but relations between the countries were strained by Soviet attempts to influence Yugoslavia. Albania was established as a Communist dictatorship under Enver Hoxha in 1944. It was initially aligned with Yugoslavia, but its alignment shifted throughout the Cold War between Yugoslavia, the Soviet Union, and China. The stability of the Soviet Union weakened in the 1980s. The Soviet economy became unsustainable, and Communist governments lost the support of intellectuals. In 1989, the Soviet Union was dissolved, and Communism was abandoned by the countries of Central and Eastern Europe. Of the new and reformed governments created by the fall of Communism in Europe, only Belarus remained a dictatorship, under the control of Alexander Lukashenko.

Latin American dictatorships of the Cold War

Jean-Claude "Baby Doc" Duvalier succeeded his father François "Papa Doc" Duvalier as the ruler of Haiti after his death in 1971.

Military dictatorships remained prominent in Latin America during the Cold War, though the number of coups declined starting in the 1980s. Between 1967 and 1991, Haiti and Honduras both underwent three military coups, and Bolivia underwent eight. Argentina, Chile, Ecuador, El Salvador, Guatemala, Panama, Paraguay, Peru, and Uruguay also underwent at least one military coup during the same period.

In the Caribbean, former President of Cuba Fulgencio Batista carried out a 1952 military coup in Cuba after he determined that he was not going to win the upcoming presidential election. Batista ruled until the Cuban Revolution overthrew his government and established a one-party Marxist state led by Fidel Castro. Jean-Claude Duvalier consolidated his power as a dictator in Haiti during his presidency in the 1970s, and upon his death in 1971, he passed his position to his son Jean-Claude Duvalier, who would rule until 1986.

In Central America, Carlos Castillo Armas took power in Guatemala with a 1954 coup with American-trained troops and held power until his assassination in 1957, which in turn resulted in a series of dictatorships during the Guatemalan Civil War. Omar Torrijos took power in Panama with a 1968 military coup until his death in 1981. Several military dictators briefly held power in Panama until Manuel Noriega took power in 1983, but he was deposed by the United States invasion of Panama in 1989. The Somoza family ruled Nicaragua either directly or indirectly until they were overthrown during the Nicaraguan Revolution in 1979.

In South America, a 1948 military coup in Venezuela established the dictatorship of Marcos Pérez Jiménez who ruled until 1958. Gustavo Rojas Pinilla took power in a 1953 coup and ruled until 1957. Alfredo Stroessner carried out a 1954 military coup in Paraguay that established the El Stronato military dictatorship until 1989. A 1964 coup established a military dictatorship in Brazil that lasted until 1985. A 1968 military coup established a military dictatorship in Peru until 1980, and in 1992, Alberto Fujimori carried out a self-coup in Peru. Hugo Banzer was the military dictator of Bolivia from 1971 to 1978, and he would later go on to be the country's democratically elected president two decades later. In 1972, Guillermo Rodríguez established a dictatorial government in Ecuador and called his government the "Nationalist Revolution". It entered OPEC in 1973 and also imposed agrarian reforms. In 1973, Augusto Pinochet carried out a coup and established a military dictatorship in Chile that lasted until 1990.

Operation Condor was a secret intelligence agreement developed by Chilean dictator Augusto Pinochet with his secret police and intelligence organizations. It included the governments of military dictatorships in Argentina, Bolivia, Brazil, Chile, Ecuador, Uruguay, Paraguay, and Peru. Under this organization, these governments were able to collaborate with one another in the elimination of political enemies. Operation Condor received tacit and sometimes explicit support from the United States in exchange for support against Communist dictators, and the United States declassified information on Operation Condor after the Cold War.

21st century dictatorships

Russian President Vladimir Putin with Libyan leader Muammar Gaddafi in 2008

The nature of dictatorship changed in much of the world at the onset of the 21st century. Between the 1990s and the 2000s, most dictators moved away from being "larger-than-life figures" that controlled the populace through terror and isolated themselves from the global community. This was replaced by a trend of developing a positive public image to maintain support among the populace and moderating rhetoric to integrate with the global community.

Only a small number of one-party states exist in the 21st century. As of 2022, China, Cuba, Laos, North Korea, and Vietnam are Communist one-party states, and Eritrea is a nationalist one-party state. Opposition parties were legalized in Syria and Turkmenistan, but they are still de facto one-party states as of 2022. Other countries with dominant-party systems also exist. Iraq was a one-party state until the 2003 invasion of Iraq. As of 2022, Brunei, Eswatini, Oman, Saudi Arabia, and Vatican City are absolute monarchies, and the United Arab Emirates is a federation of monarchies. Bhutan was an absolute monarchy until the 2008 Bhutanese National Assembly election. Tonga was an absolute monarchy until the 2010 Tongan general election. Belarus under the rule of Alexander Lukashenko has been described as "the last European dictatorship", though the rule of Vladimir Putin in Russia has also been described as a dictatorship.

Measurement

Democracy Index by the Economist Intelligence Unit, 2020. Green countries are democratic, yellow are hybrid regimes, and red are authoritarian governments.

One of the tasks in political science is to measure and classify regimes as either dictatorships or democracies. Freedom House, the Polity data series, and the Democracy-Dictatorship Index are three of the most used data series by political scientists. Generally, two research approaches exist: the minimalist approach, which focuses on whether a country has continued elections that are competitive, and the substantive approach, which expands the concept of democracy to include human rights, freedom of the press, and the rule of law. The Democracy-Dictatorship Index is seen as an example of the minimalist approach, whereas the Polity data series is more substantive.

Economics

Most dictatorships exist in countries with high levels of poverty. Poverty has a destabilizing effect on government, causing democracy to fail and regimes to fall more often. The form of government does not correlate with the amount of economic growth, and dictatorships on average grow at the same rate as democracies, though dictatorships have been found to have larger fluctuations. Dictators are more likely to implement long-term investments into the country's economy if they feel secure in their power. Exceptions to the pattern of poverty in dictatorships include oil-rich Middle Eastern dictatorships and the East Asian Tigers during their periods of dictatorship.

The type of economy in a dictatorship can affect how it functions. Economies based on natural resources allow dictators more power, as they can easily extract rents without strengthening or cooperating with other institutions. More complex economies require additional cooperation between the dictator and other groups. The economic focus of a dictatorship often depends on the strength of the opposition, as a weaker opposition allows a dictator to extract additional wealth from the economy through corruption.

Legitimacy and stability

Several factors determine the stability of a dictatorship. They must maintain some degree of popular support to prevent resistance groups from growing. This may be ensured through incentives, such as distribution of financial resources or promises of security, or it may be through repression, in which failing to support the regime is punished. Stability can be weakened when opposition groups grow and unify or when elites are not loyal to the regime. One-party dictatorships are generally more stable and last longer than military or personalist dictatorships.

A dictatorship may fall because of a military coup, foreign intervention, negotiation, or popular revolution. A military coup is often carried out when a regime is threatening the country's stability or during periods of societal unrest. Foreign intervention takes place when another country seeks to topple a regime by invading the country or supporting the opposition. A dictator may negotiate the end of a regime if it has lost legitimacy or if a violent removal seems likely. Revolution takes place when the opposition group grows large enough that elites in the regime cannot suppress it or choose not to. Negotiated removals are more likely to end in democracy, while removals by force are more likely to result in a new dictatorial regime. A dictator that has concentrated significant power is more likely to be exiled, imprisoned, or killed after ouster, and accordingly they are more likely to refuse negotiation and cling to power.

Dictatorships are typically more aggressive than democracy when in conflict with other nations, as dictators do not have to fear electoral costs of war. Military dictatorships are more prone to conflict due to the inherent military strength associated with such a regime, and personalist dictatorships are more prone to conflict due to the weaker institutions to check the dictator's power. In the 21st century, dictatorships have moved toward greater integration with the global community and increasingly attempt to present themselves as democratic. Dictatorships are often recipients of foreign aid on the condition that they make advances toward democratization. A study found that dictatorships that engage in oil drilling are more likely to remain in power, with 70.63% of the dictators who engage in oil drilling still being in power after 5 years of dictatorship, while only 59.92% of the non-oil producing dictators survive the first 5 years.

Elections

An electoral slip in the 1936 German parliamentary election. Adolf Hitler and his inner circle are the only option.

Most dictatorships hold elections to maintain legitimacy and stability, but these elections are typically uncompetitive and the opposition is not permitted to win. Elections allow a dictatorship to exercise some control over the opposition by setting the terms under which the opposition challenges the regime. Elections are also used to control elites within the dictatorship by requiring them to compete with one another and incentivizing them to build support with the populace, allowing the most popular and most competent elites to be promoted in the regime. Elections also support the legitimacy of a dictatorship by presenting the image of a democracy, establishing plausible deniability of its status as a dictatorship for both the populace and foreign governments. Should a dictatorship fail, elections also permit dictators and elites to accept defeat without fearing violent recourse. Dictatorships may influence the results of an election through electoral fraud, intimidation or bribing of candidates and voters, use of state resources such as media control, manipulation of electoral laws, restricting who may run as a candidate, or disenfranchising demographics that may oppose the dictatorship.

Before 1990, most dictatorships held elections in which voters could only choose to support the dictatorship. Since the end of the Cold War, more dictatorships have established "semi-competitive" elections in which opposition parties are allowed to participate but they are not allowed to win. This may be done by preventing the opposition from campaigning, banning more popular opposition parties, preventing opposition members from forming a party, or requiring that candidates be a member of the ruling party. Dictatorships may hold semi-competitive elections to qualify for foreign aid or to incentivize the party to expand its information-gathering capacity, particularly at the local level. Semi-competitive elections also have the effect of incentivizing members of the ruling party to provide better treatment of citizens so they will be chosen as party nominees due to their popularity.

Violence

Violence is used in dictatorships to coerce any opposition to the dictator's rule, often through institutions such as military or police forces. The use of violence by a dictator is often most severe in the first few years of a dictatorship, as the regime has not yet solidified its rule and more detailed information for targeted coercion is not yet available. As the dictatorship becomes more established, it moves away from violence toward other coercive measures, such as restriction of information and tracking of political opposition. Institutions that coerce the opposition through violence may serve different roles or be used to counterbalance one another to prevent one from growing too powerful. Secret police are used to gather information on and carry out targeted acts of violence against specific political opponents, and paramilitary forces defend the regime from coups, and formal militaries defend the dictatorship during foreign invasion and major civil conflicts.

Terrorism is less common in dictatorships. Allowing the opposition to have representation in the regime, such as through a legislature, further reduces the likelihood of terrorist attacks in a dictatorship. Military and one-party dictatorships are more likely to experience terrorism than personalist dictatorships, as these regimes are under more pressure to undergo institutional change in response to terrorism.

Inhalant

From Wikipedia, the free encyclopedia https://en.wikipedia.org/w...