-
2
-
-
84894799242
-
ITU Estimates Two Billion People Online by En 2010 Access to Mobile Networks Available to Over 90% of World Population; 143 Countries Offer 3G Services
-
International Telecommunication Union (ITU) October 19, 2010
-
International Telecommunication Union (ITU), " ITU Estimates Two Billion People Online by End 2010: Access to Mobile Networks Available to Over 90% of World Population; 143 Countries Offer 3G Services, " October 19, 2010, http://www.itu.int/net/pressoffi ce/press_releases/2010/39. aspx.
-
-
-
-
3
-
-
84894718418
-
Internet Indicators: Subscribers, Users and Broadband Subscribers
-
International Telecommunication Union (ITU)
-
International Telecommunication Union (ITU), " Internet Indicators: Subscribers, Users and Broadband Subscribers, " 2009 Figures, http://www.itu.int/ITU-D/icteye/Reporting/ ShowReportFrame.aspx?ReportName=/WTI/InformationTechnologyPublic & ReportFormat=HTM L4.0 & RP_intYear=2009 & RP_intLanguageID=1 & RP_bitLiveData=False.
-
-
-
-
4
-
-
84894765724
-
The Economic Impact of Shutting Down Internet and Mobile Phone Services in Egypt
-
Organization for Economic Cooperation and Development (OECD)
-
Organization for Economic Cooperation and Development (OECD), " The Economic Impact of Shutting Down Internet and Mobile Phone Services in Egypt, " February 4, 2011, http://www.oecd.org/document/19/0,3746,en_2649_33703_47056659_1_1_1_1,00.html.
-
(2011)
-
-
-
5
-
-
84894780619
-
Clients
-
Noor, " Clients, " http://www.noor.net/Clients.aspx.
-
-
-
Noor1
-
6
-
-
84881093154
-
Egypt's Net on Life Support
-
Renesys Blog, January 31
-
Earl Zmijewski, " Egypt's Net on Life Support, " Renesys Blog, January 31, 2011, http://www.renesys.com/blog/2011/01/egypts-net-on -life-support.shtml.
-
(2011)
-
-
Zmijewski, E.1
-
7
-
-
84859940663
-
Intermediary Censorship
-
ed. Ronald Deibert, John Palfrey, Rafal Rohozinski, and Jonathan Zittrain (Cambridge, MA: MIT Press
-
Ethan Zuckerman, " Intermediary Censorship, " in Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace, ed. Ronald Deibert, John Palfrey, Rafal Rohozinski, and Jonathan Zittrain (Cambridge, MA: MIT Press, 2010), 71 - 85.
-
(2010)
Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace
, pp. 71-85
-
-
Zuckerman, E.1
-
8
-
-
84894864203
-
Will Google Stand Up to France and Italy, Too?
-
January 13, 2010
-
Rebecca MacKinnon, " Will Google Stand Up to France and Italy, Too? " The Guardian, January 13, 2010, http://www.guardian.co.uk/commentisfree/libertycentral/2010/jan/13/google-china -western-internet-freedom.
-
The Guardian
-
-
MacKinnon, R.1
-
9
-
-
84876691367
-
Larger Threat Is Seen in Google Case
-
February 24
-
Rachel Donadio, " Larger Threat Is Seen in Google Case, " New York Times, February 24, 2010, http://www.nytimes.com/2010/02/25/technology/companies/25google.html.
-
(2010)
New York Times
-
-
Donadio, R.1
-
10
-
-
84894774331
-
Shackling the Net
-
April 12
-
Yamini Lohia, " Shackling the Net, " Times of India, April 12, 2010, http://timesofi ndia.indiatimes.com/home/opinion/edit-page/Shackling-The-Net/articleshow/5784887.cms.
-
(2010)
Times of India
-
-
Lohia, Y.1
-
11
-
-
78650192221
-
Key Global Telecom Indicators for the World Telecommunication Service Sector
-
International Telecommunication Union (ITU)
-
International Telecommunication Union (ITU), " Key Global Telecom Indicators for the World Telecommunication Service Sector, " 2010 Figures, http://www.itu.int/ITU-D/ict/statistics/ at_glance/KeyTelecom.html.
-
(2010)
-
-
-
12
-
-
84894703124
-
Statements - Vodafone Egypt
-
Vodafone, February 3
-
Vodafone, " Statements - Vodafone Egypt, " February 3, 2011, http://www.vodafone.com/ content/index/press/press_statements/statement_on_egypt.html.
-
(2011)
-
-
-
13
-
-
84894792047
-
BlackBerry Filters out Porn Sites in Response to Government ' s Demand
-
Reporters Without Borders
-
Reporters Without Borders, " BlackBerry Filters out Porn Sites in Response to Government ' s Demand, " January 20, 2011, http://en.rsf.org/indonesia-blackberry-fi lters-out-porn-sites-20-01 -2011,39371.html.
-
(2011)
-
-
-
14
-
-
84894692237
-
Cyberspace Confi dential
-
August 6
-
Ronald Deibert, " Cyberspace Confi dential, " Globe and Mail, August 6, 2010, http://www.theglobeandmail.com/news/opinions/cyberspace-confi dential/article1665125.
-
(2010)
Globe and Mail
-
-
Ronald Deibert, R.1
-
15
-
-
0003954001
-
-
(New York: Ace Books, 1984)
-
William Gibson, Neuromancer (New York: Ace Books, 1984)
-
Neuromancer
-
-
Gibson, W.1
-
16
-
-
77958589131
-
Liberation vs. Control: The Future of Cyberspac
-
October 2010
-
Ronald Deibert and Rafal Rohozinski, " Liberation vs. Control: The Future of Cyberspace, " Journal of Democracy, 24, no. 1 (October 2010): 43 - 57.
-
" Journal of Democracy
, vol.24
, Issue.1
, pp. 43-57
-
-
Deibert, R.1
Rohozinski, R.2
-
17
-
-
43849106403
-
World Internet Usage and Population Statistics
-
Internet World Stats June 30
-
Internet World Stats, " World Internet Usage and Population Statistics, " June 30, 2010, http:// www.internetworldstats.com/stats.htm.
-
(2010)
-
-
-
18
-
-
84894726645
-
China - Key Statistics, Telecom Market, Regulatory Overview and Forecasts
-
July 7, 2010.Paul Budde Communication Pty Ltd
-
Paul Budde Communication Pty Ltd. " China - Key Statistics, Telecom Market, Regulatory Overview and Forecasts, " July 7, 2010.
-
-
-
-
19
-
-
84855777450
-
ITU Estimates Two Billion People Online by End 2010
-
International Telecommunication Union October 19
-
International Telecommunication Union, " ITU Estimates Two Billion People Online by End 2010, " October 19, 2010, http://www.itu.int/net/pressoffi ce/press_releases/2010/39.aspx.
-
(2010)
-
-
-
20
-
-
80054838563
-
The Internet Big Picture: World Internet Users and Population Stats
-
Internet World Stats accessed February 18, 2011
-
Internet World Stats, " The Internet Big Picture: World Internet Users and Population Stats, " 2010, http://www.internetworldstats.com/stats.htm, accessed February 18, 2011.
-
(2010)
-
-
-
21
-
-
84894851819
-
Chinese: The New Dominant Language of the Internet [Infographic]
-
The Next Web, December 21
-
Alex Wilhelm, " Chinese: The New Dominant Language of the Internet [Infographic], " The Next Web, December 21, 2010, http://thenextweb.com/asia/2010/12/21/chinese-the-new -dominant-language-of-the-internet-infographic.
-
(2010)
-
-
Wilhelm, A.1
-
22
-
-
84894785101
-
China and Global Internet Governance: A Tiger by the Tail
-
chapter 9 in this volume
-
Milton Mueller, " China and Global Internet Governance: A Tiger by the Tail, " chapter 9 in this volume
-
-
-
Mueller, M.1
-
23
-
-
79951758149
-
Security Threat Report: Mid-yea
-
White Paper
-
Sophos, " Security Threat Report: Mid-year 2010, " White Paper, 24, https://secure.sophos.com/sophos/docs/eng/papers/sophos-security-threat-report-midyear-2010-wpna.pdf.
-
(2010)
, pp. 24
-
-
Sophos1
-
24
-
-
78449232020
-
-
(New York: Public Affairs, 2010)
-
Joseph Menn, Fatal System Error (New York: Public Affairs, 2010)
-
Fatal System Error
-
-
Menn, J.1
-
26
-
-
84866263523
-
Information Warfare Monitor and Shadowserver Foundation
-
April 6
-
Information Warfare Monitor and Shadowserver Foundation, Shadows in the Cloud: An Investigation into Cyber Espionage 2.0, April 6, 2010, http:// shadows-in-the-cloud.net/
-
(2010)
Shadows in the Cloud: An Investigation into Cyber Espionage 2.0
-
-
-
27
-
-
84894839077
-
Websites of Three Burmese News Agencies in Exile under Attack
-
September 17, 2008
-
" Websites of Three Burmese News Agencies in Exile under Attack, " Mizzima News, September 17, 2008, http://www.mizzima.com/news/regional/1052-websites-of -three-burmese-news-agencies-in-exile-under-attack.html
-
Mizzima News
-
-
-
28
-
-
80053003968
-
The Inside Story of How Facebook Responded to Tunisian Hacks
-
January 24, 2011
-
Alexis Madrigal, " The Inside Story of How Facebook Responded to Tunisian Hacks, " The Atlantic, January 24, 2011, http://www.theatlantic.com/technology/archive/2011/01/the-inside-story-of-how-facebook-responded-to -tunisian-hacks/70044
-
The Atlantic
-
-
Madrigal, A.1
-
29
-
-
84894743566
-
Most Sophisticated Malware Ever Targets Iran
-
September 22, 2010
-
Alexis Madrigal, " Most Sophisticated Malware Ever Targets Iran, " The Atlantic, September 22, 2010, http://www.theatlantic.com/technology/archive/2010/09/ most-sophisticated-malware-ever-targets-iran-possibly-state-backed/63420.
-
The Atlantic
-
-
Madrigal, A.1
-
30
-
-
79251616434
-
Stuxnet and the Future of Cyber Wa
-
James Farwell and Rafal Rohozinski, " Stuxnet and the Future of Cyber War, " Survival 53.1 (2011), 23 - 40.
-
(2011)
" Survival
, vol.53
, pp. 23-40
-
-
Farwell, J.1
Rohozinski, R.2
-
31
-
-
79959983463
-
Control and Subversion in Russian Cyberspace
-
ed. Ronald Deibert, John Palfrey, Rafal Rohozinski, and Jonathan Zittrain (Cambridge, MA: MIT Press, 2010)
-
Ronald Deibert and Rafal Rohozinski, " Control and Subversion in Russian Cyberspace, " in Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace, ed. Ronald Deibert, John Palfrey, Rafal Rohozinski, and Jonathan Zittrain (Cambridge, MA: MIT Press, 2010), 15 - 34.
-
Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace
, pp. 15-34
-
-
Deibert, R.1
Rohozinski, R.2
-
32
-
-
79956069297
-
U.S. State Department Speaks to Twitter over Iran
-
Reuters, June 16
-
Sue Pleming, " U.S. State Department Speaks to Twitter over Iran, " Reuters, June 16, 2009, http:// www.reuters.com/article/2009/06/16/us-iran-election-twitter-usa-idUSWBT01137420090616.
-
(2009)
-
-
Pleming, S.1
-
33
-
-
84894773897
-
Holding Nokia Responsible for Surveilling Dissidents in Iran
-
Electronic Frontier Foundation, October 13, 2010
-
Eddan Katz, " Holding Nokia Responsible for Surveilling Dissidents in Iran, " Electronic Frontier Foundation, October 13, 2010, http://www.eff.org/deeplinks/2010/10/saharkhiz-v-nokia.
-
-
-
Katz, E.1
-
34
-
-
84894862824
-
Iran: Cyber Islamic Militarism on the March
-
Global Voices, February 19, 2010
-
Hamid Tehrani, " Iran: Cyber Islamic Militarism on the March, " Global Voices, February 19, 2010, http://globalvoicesonline.org/2010/02/19/iran-cyber-islamic-militarism-on-the-march.
-
-
-
Tehrani, H.1
-
36
-
-
84894766828
-
Twitter Puts Spotlight on Secret F.B.I. Subpoenas
-
January 1, 2011
-
Noam Cohen, " Twitter Puts Spotlight on Secret F.B.I. Subpoenas, " New York Times, January 1, 2011, http://www.nytimes.com/2011/01/10/business/media/10link.html?_r=1&partner=rss &emc=rss.
-
New York Times
-
-
Cohen, N.1
-
37
-
-
84894874936
-
Censorship on Pro-NK Web Sites Tight
-
September 9, 2010
-
Lee Tae-hoon, " Censorship on Pro-NK Web Sites Tight, " Korea Times, September 9, 2010, http://www.koreatimes.co.kr/www/news/nation/2010/09/113_72788.html.
-
Korea Times
-
-
Tae-hoon, L.1
-
38
-
-
84866597248
-
Seeing the Internet as an " Information Weapon
-
National Public Radio, September 23, 2010
-
Tom Gjelten, " Seeing the Internet as an " Information Weapon, " National Public Radio, September 23, 2010, http://www.npr.org/templates/story/story.php?storyId=130052701&sc=fb&cc=fp.
-
-
-
Gjelten, T.1
-
39
-
-
84894787057
-
Arab Region Presses for Heightened Cybersecurity: Doha Declaration on Cybersecurity Adopted at ITU Forum
-
International Telecommunication Union
-
International Telecommunication Union, " Arab Region Presses for Heightened Cybersecurity: Doha Declaration on Cybersecurity Adopted at ITU Forum, " February 21, 2008, http://www. itu.int/newsroom/press_releases/2008/NP01.html
-
-
-
-
40
-
-
84894765028
-
Draft Meeting Report: ITU Regional Workshop on Frameworks for Cybersecurity and Critical Information Infrastructure Protection (CIIP) and Cybersecurity ForensicsWorkshop Doha, Qatar
-
ITU Regional Cybersecurity Forum (RWD/2008/01-E), February 21, 2008 2008, February 18 - 21
-
ITU Regional Cybersecurity Forum 2008, " Draft Meeting Report: ITU Regional Workshop on Frameworks for Cybersecurity and Critical Information Infrastructure Protection (CIIP) and Cybersecurity Forensics Workshop Doha, Qatar, February 18 - 21, 2008, " (RWD/2008/01-E), February 21, 2008, http://www.itu.int/ITU-D/cyb/ events/2008/doha/docs/doha-cybersecurity-forum-report-feb-08.pdf.
-
(2008)
-
-
-
41
-
-
84894719501
-
Cyber War: Indian Army Gearing Up
-
July 19, 2010
-
" Cyber War: Indian Army Gearing Up, " Times of India, July 19, 2010, http://timesofi ndia.indiatimes.com/tech/news/internet/Cyber-war-Indian-Army-gearing-up/articleshow/6187297.cms.
-
Times of India
-
-
-
42
-
-
84866250193
-
Spy Game: India Readies Cyber Army to Hack into Hostile Nations' Computer Systems
-
August 6, 2010
-
Joji Thomas Philip and Harsimran Singh, " Spy Game: India Readies Cyber Army to Hack into Hostile Nations' Computer Systems, " Economic Times, August 6, 2010, http://economictimes. indiatimes.com/news/news-by-industry/et-cetera/Spy-Game-India-readies-cyber-army-to-hack -into-hostile-nations-computer-systems/articleshow/6258977.cms.
-
Economic Times
-
-
Philip, J.T.1
Singh, H.2
-
43
-
-
84894718083
-
India Tells Mobile Firms to Delay Deals for Chinese Telecom Equipment
-
April 30, 2010
-
Heather Timmons, " India Tells Mobile Firms to Delay Deals for Chinese Telecom Equipment, " New York Times, April 30, 2010, http://www.nytimes.com/2010/05/01/business/global/01delhi.html.
-
New York Times
-
-
Timmons, H.1
-
44
-
-
84894741594
-
Google Asks N.S.A. to Investigate Cyberattacks
-
February 4, 2010
-
John Markoff, " Google Asks N.S.A. to Investigate Cyberattacks, " New York Times, February 4, 2010, http://www.nytimes.com/2010/02/05/science/05google.html?_r=1.
-
New York Times
-
-
Markoff, J.1
-
45
-
-
84894859341
-
Show of Strength Urged for Cyberwar
-
January 27, 2011
-
Bill Gertz, " Show of Strength Urged for Cyberwar, " Washington Times, January 27, 2011, http://www.washingtontimes.com/news/2011/jan/27/show-of-strength-urged-for-cyberwar/ ?page=1.
-
Washington Times
-
-
Gertz, B.1
-
46
-
-
84865438649
-
Politically Motivated Denial of Service Attacks
-
ed. Christian Czosseck and Kenneth Geers (Amsterdam: IOS Press, 2009)
-
Jose Nazario, " Politically Motivated Denial of Service Attacks, " in The Virtual Battlefi eld: Perspectives on Cyber Warfare, ed. Christian Czosseck and Kenneth Geers (Amsterdam: IOS Press, 2009), 163 - 181
-
The Virtual Battlefi eld: Perspectives on Cyber Warfare
, pp. 163-181
-
-
Nazario, J.1
-
47
-
-
84894774117
-
A Brief History of Operation Payback
-
Salon, December 9, 2010
-
Christopher R. Walker, " A Brief History of Operation Payback, " Salon, December 9, 2010, http://mobile.salon.com/news/feature/2010/12/09/0.
-
-
-
Christopher, R.W.1
-
48
-
-
81755167177
-
Anonymous vs. HBGary: The Aftermath
-
February 24, 2011, Ars Technica
-
Nate Anderson, " Anonymous vs. HBGary: The Aftermath, " February 24, 2011, Ars Technica, http://arstechnica.com/tech-policy/news/2011/02/anonymous-vs-hbgary-the-aftermath.ars.
-
-
-
Anderson, N.1
-
49
-
-
84894860998
-
Arms Makers Turn Focus from Bombs to Bytes
-
Reuters, September 10, 2010
-
Deepa Seetharaman, " Arms Makers Turn Focus from Bombs to Bytes, " Reuters, September 10, 2010, http://www.reuters.com/article/2010/09/10/us-aero-arms-summit-cybersecurity -idUSTRE6893EI20100910.
-
-
-
Seetharaman, D.1
-
50
-
-
84921899060
-
Middle East Censors Use Western Technologies to Block Viruses and Free Speech
-
OpenNet Initiative, July 27, 2009
-
Helmi Noman, " Middle East Censors Use Western Technologies to Block Viruses and Free Speech, " OpenNet Initiative, July 27, 2009, http://opennet.net/blog/2009/07/ middle-east-censors-use-western-technologies-block-viruses-and-free-speech.
-
-
-
Noman, H.1
-
51
-
-
84894803141
-
Narus Develops a Scary Sleuth for Social Media
-
IT World, March 3, 2010
-
Robert McMillan, " Narus Develops a Scary Sleuth for Social Media, " IT World, March 3, 2010, http://www.itworld.com/internet/98652/narus-develops-a-scary-sleuth-social-media.
-
-
-
McMillan, R.1
-
52
-
-
84894722220
-
Lawmaker Calls for Limits on Exporting Net-Spying Tools
-
February 11
-
Ryan Singel, " Lawmaker Calls for Limits on Exporting Net-Spying Tools, " Wired, February 11, 2011, http://www.wired.com/epicenter/2011/02/narus.
-
(2011)
Wired
-
-
Singel, R.1
-
53
-
-
85055815501
-
Should a Targeted Country Strike Back at the Cyber Attackers?
-
ZD Net, May 10, 2010
-
Dancho Danchev, " Should a Targeted Country Strike Back at the Cyber Attackers? " ZD Net, May 10, 2010, http://www.zdnet.com/blog/security/should-a-targeted-country-strike-back-at-the -cyber-attackers/6194.
-
-
-
Danchev, D.1
-
54
-
-
85055767533
-
Bollywood ' Recruits DDoS Hired Guns to Fight Movie Pirates, '
-
September 10, 2010
-
John Leydon, " Bollywood ' Recruits DDoS Hired Guns to Fight Movie Pirates, ' " The Register, September 10, 2010, http://www.theregister.co.uk/2010/09/10/bollywood_cyber_vigilantes_fight_movie_pirates.
-
The Register
-
-
Leydon, J.1
-
55
-
-
84894848801
-
Drumming Up More Addresses on the Internet
-
February 14, 2011
-
Laurie J. Flynn, " Drumming Up More Addresses on the Internet, " New York Times, February 14, 2011, http://www.nytimes.com/2011/02/15/technology/15internet.html?ref=technology.
-
New York Times
-
-
Laurie, J.F.1
-
56
-
-
84894795580
-
Russia Said to Be Developing National Search Engine - Vedomosti
-
Automated Trader, July 7, 2010
-
" Russia Said to Be Developing National Search Engine - Vedomosti, " Automated Trader, July 7, 2010, http://www.automatedtrader.net/real-time-dow-jones/3574/russia-said-to-be-developing -national-search-engine-_vedomosti.
-
-
-
-
57
-
-
85055852030
-
The Chinese State Enters Online Search
-
August 16, 2010
-
Owen Fletcher, " The Chinese State Enters Online Search, " Wall Street Journal, August 16, 2010, http://blogs.wsj.com/digits/2010/08/16/the-chinese-state-enters-online-search.
-
Wall Street Journal
-
-
Fletcher, O.1
-
58
-
-
84894791521
-
Oh Lord: Why Iran ' s National Search Engine Will Likely Fail
-
Radio Free Europe/Radio Liberty, August 29
-
" Oh Lord: Why Iran ' s National Search Engine Will Likely Fail, " Radio Free Europe/Radio Liberty, August 29, 2010, http://www.rferl.org/content/Oh_Lord_Why_Irans_National_Search _Engine_Will_Likely_Fail/2140725.html
-
(2010)
-
-
|