Интернет как иллюзия. Обратная сторона сети - Евгений Морозов
Шрифт:
Интервал:
Buchstein, H. Bytes That Bite: The Internet and Deliberative De-mocracy // Constellations 4, no. 2 (1997): 248–263.
Burrell, J. Problematic Empowerment: West African Internet Scams as Strategic Misrepresentation // Information Technologies and In-ternational Development 4, no. 4 (2008): 15–30.
Burton, Matthew On the Weaponization of the Collabora-tive Web. Personal Democracy Forum, June 16, 2009. personal-democracy.com/blog-entry/weaponization-collaborative-web.
Carr, M. Slouching Towards Dystopia: The New Military Futurism // Race & Class 51, no. 3 (2010): 13.
Carr, Nicholas Is Google Making Us Stupid? // Atlantic, August 2008.
Cavelty, M. D. Cyber-Terror – Looming Threat or Phantom Me-nace? The Framing of the US Cyber-Threat Debate // Journal of Information Technology & Politics 4, no. 1 (2007): 19–36.
Clarke, Richard A., and Robert Knake Cyber War: The Next Threat to National Security and What to Do About It. New York: HarperCollins, 2010.
Clinton, Hillary Remarks on Internet Freedom. The Newseum, Washington, DC, January 21, 2010.
Clinton, Hillary Speech to Kaiser Family Foundation. March 8, 2005. Cowie, James The Proxy Fight for Iranian Democracy // Renesys
Blog, June 22, 2009. www.renesys.com/blog/2009/06/the-proxy-fight-for-iranian-de.shtml.
Curtin, M. Beyond the Vast Wasteland: The Policy Discourse of Global Television and the Politics of American Empire // Journal of Broad-casting & Electronic Media 37, no. 2 (1993): 127–145.
Dahlberg, L. Democracy via Cyberspace: Mapping the Rhetorics and Practices of Three Prominent Camps // New Media & Society 3, no. 2 (2001): 157.
Damm, J. The Internet and the Fragmentation of Chinese Society // Critical Asian Studies 39, no. 2 (2007): 273–294.
Deibert, R. J., and R. Rohozinski Risking Security: Policies and Paradoxes of Cyberspace Security // International Political Socio-logy 4, no. 1 (2010): 15–32.
Dobson, William J. Computer Programmer Takes On the World’s Despots // Newsweek, August 6, 2010.
El-Khairy, O. “Freedom’s a Lifestyle Choice”: US Cultural Diploma-cy, Empire’s Soundtrack, and Middle Eastern “Youth” in our Con-
temporary Global Infowar // Middle East Journal of Culture and Communication 2, no. 1 (2009): 115–135.
Elmusa, S. S. Faust Without the Devil? The Interplay of Technology and Culture in Saudi Arabia // Middle East Journal 51, no. 3 (1997): 345–357.
Facebook Deletes Hong Kong Groups That Oppose Pro-Beijing Party //
BBC Monitoring International Reports, February 5, 2010. Falvey, Christian Minister’s Web Monitoring Tool Off to Rocky
Start // Radio Prague, February 12, 2010.
Fandy, M. Information Technology, Trust, and Social Change in the Arab World // Middle East Journal (2000): 378–394.
Fletcher, Owen Apple Censors Dalai Lama iPhone Apps in China // IDG News Service, December 30, 2009.
Fox, J. The Uncertain Relationship Between Transparency and Account-ability // Development in Practice 17, no. 4 (2007): 663–671.
Franzese, P. W. Sovereignty in Cyberspace: Can It Exist? // Air Force Law Review 64 (2009): 1.
Fuchs, C. Some Reflections on Manuel Castells’ Book “Communication Power” // Triple C: Cognition, Communication, Co-operation 7, no. 1 (2009): 94.
Garnham, N. The Mass Media, Cultural Identity, and the Public
Sphere in the Modern World // Public Culture 5, no. 2 (1993): 251. Gilboa, E. The CNN Effect: The Search for a Communication Theory of International Relations // Political Communication 22, no. 1 (2005): 27–44.
Gilboa, E. Global Communication and Foreign Policy // Journal of Communication 52, no. 4 (2002): 731–748.
Glassman, James K., and Michael Doran How to Help
Iran’s Green Revolution // Wall Street Journal, January 21, 2010. Glenny, Misha BlackBerry is but a Skirmish in the Battle for the
Web // Financial Times, August 6, 2010.
Goldsmith, J. L., and T. Wu Digital Borders // Legal Affairs (2006): 40.
Goldsmith, J. L., and T. Wu Who Controls the Internet: Illu-sions of a Borderless World. New York: Oxford University Press, 2006.
Gunaratne, S. A. De-Westernizing Communication/Social Science Research: Opportunities and Limitations // Media, Culture & Soci-ety 32, no. 3 (2010): 473.
Guynn, J. Twitter Hires Obama Administration’s Katie Stanton // Los Angeles Times, July 10, 2010.
Hardy, M. In-Q-Tel, Google Invest in Recorded Future // Government Computer News, July 29, 2010. gcn.com/articles/2010/ 07/29/inqtel-google-fund-web-analysis-firm.aspx.
Hawkins, V. The Other Side of the CNN Factor: The Media and Con-flict // Journalism Studies 3, no. 2 (2002): 225–240.
Himma, K. E. Hacking as Politically Motivated Digital Civil Disobedience: Is Hacktivism Morally Justified? // Internet Security: Hacking, Counterhacking, and Society (2007): 73.
Hindman, M. The Myth of Digital Democracy. Princeton, NJ: Princeton University Press, 2009.
Hofmann, J. The Libertarian Origins of Cybercrime: Unintended Side-Effects of a Political Utopia // ESRC Research Centre Discus-sion Paper no. 62, 2010. w.lse.ac.uk/collections/CARR/pdf/DPs/ Disspaper62.pdf.
Holmes, A. Defining Transparency // Nextgov, September 3, 2009. www.nextgov.com/nextgov/ng_20090903_7217.php.
Holmes, A. The Risks of Open Government // Nextgov, September 14, 2009. www.nextgov.com/nextgov/ng_20090914_3118.php.
Howe, J. P. Obama and Crowdsourcing: A Failed Relationship? // Wired Epicenter Blog, April 1, 2009. www.wired.com/epicenter/ 2009/04/obama-and-crowd/.
Ibahrine, M. Mobile Communication and Sociopolitical Change in the Arab World // Quaderns de la Mediterránia 11 (2009): 51–60.
Interview with Indira Lakshmanan of Bloomberg TV. U. S. Department of State, March 19, 2010.
Issa, A. Palestine: Twitter Accused of Silencing Gaza Tribute // Global Voices, December 29, 2009. globalvoicesonline.org/2009/12/29/ palestine-twitter-accused-of-silencing-gaza-tribute/.
Jaeger, P. T., Lin, J., Grimes, J. M., and S. N. Simmons Where Is the Cloud? Geography, Economics, Environment, and Jurisdiction in Cloud Computing // First Monday 14, no. 5 (2009).
Jakobsen, P. V. Focus on the CNN Effect Misses the Point: The Real Media Impact on Conflict Management Is Invisible and Indirect // Journal of Peace Research 37, no. 2 (2000): 131.
Поделиться книгой в соц сетях:
Обратите внимание, что комментарий должен быть не короче 20 символов. Покажите уважение к себе и другим пользователям!