-
1
-
-
84957711796
-
-
Port Scanning /0 Using Insecure Embedded Devices, 2012, ac-cessed September 15, 2014
-
Internet Census 2012: Port Scanning /0 Using Insecure Embedded Devices, 2012, ac-cessed September 15, 2014, http://internetcensus2012.bitbucket.org/ paper.html.
-
(2012)
-
-
-
2
-
-
0004092009
-
The Theory of the growth of the firm
-
(Ox-ford: Oxford University Press, "Edith Penrose," Wikipedia, ac-cessed June 23, 2014
-
Edith Penrose and Christos Pitelis, The Theory of the Growth of the Firm (Ox-ford: Oxford University Press, 2009); "Edith Penrose," Wikipedia, ac-cessed June 23, 2014, http://en.wikipedia.org/wiki/Edith_Penrose.
-
(2009)
-
-
Edith, P.1
Christos, P.2
-
3
-
-
84957698245
-
-
Wikipedia, accessed June 15, "East India Company (En-glish Trading Company)," Encyclopedia Britannica, accessed June 16, 2014
-
"Hudson's Bay Company," Wikipedia, accessed June 15, 2014, http://en .wikipedia.org/wiki/Hudson's_Bay_Company; "East India Company (En-glish Trading Company)," Encyclopedia Britannica, accessed June 16, 2014, http://www.britannica.com/EBchecked/topic/176643/East-India -Company.
-
(2014)
-
-
-
4
-
-
84957688091
-
-
accessed June 16, 2014
-
"ITU: Committed to Connecting the World," accessed June 16, 2014, http://www.itu.int/.
-
-
-
-
5
-
-
84957694586
-
ternet World Stats: Usage and Population Sta-tistics
-
June 30, 2012
-
Internet Users in the World," Internet World Stats: Usage and Population Sta-tistics, June 30, 2012, http://www.internetworldstats.com/stats.htm.
-
-
-
-
6
-
-
84957631746
-
-
January 31, 2013, accessed September 30, 2014
-
"Hooking up," Economist, January 31, 2013, accessed September 30, 2014, http://www.economist.com/news/international/21571126-new-data -fiows-highlight-relative-decline-west-hooking-up.
-
-
-
-
7
-
-
2542629197
-
A new world order
-
Princeton: Princeton Univer-sity Press
-
Anne-Marie Slaughter, A New World Order (Princeton: Princeton Univer-sity Press, 2009).
-
(2009)
-
-
Slaughter, A.-M.1
-
8
-
-
84957619810
-
-
"Press Conference" (Regent Beverly Wilshire Ho-tel, April 19, 1994); Francis Fukuyama, The End of History and the Last Man (New York: Simon and Schuster, 2006); G. John Ikenberry, "The Myth of Post-Cold War Chaos," Foreign Affairs
-
World Affairs Council, "Press Conference" (Regent Beverly Wilshire Ho-tel, April 19, 1994); Francis Fukuyama, The End of History and the Last Man (New York: Simon and Schuster, 2006); G. John Ikenberry, "The Myth of Post-Cold War Chaos," Foreign Affairs 75, no. 3 (May 1996): 79-91.
-
(1996)
, vol.75
, Issue.3
, pp. 79-91
-
-
-
9
-
-
84957692508
-
Meet the seven people who hold the keys to worldwide in-ternet security
-
Guardian, February 28, 2014, accessed September 30 seven-people -keys-worldwide-internet-security-web; "Internet Society," accessed June 16, 2014
-
James Ball, "Meet the Seven People Who Hold the Keys to Worldwide In-ternet Security," Guardian, February 28, 2014, accessed September 30, 2014, http://www.theguardian.com/technology/2014/feb/28/ seven-people -keys-worldwide-internet-security-web; "Internet Society," accessed June 16, 2014, http://www.internetsociety.org/; "ICANN," accessed June 16, 2014, https://www.icann.org/.
-
(2014)
-
-
Ball, J.1
-
10
-
-
84957627212
-
-
(Lanham, MD: Rowman and Littlefield, 2007); Marshall McLuhan, The Gutenberg Galaxy: The Making of Typographic Man (Toronto: University of Toronto Press
-
Harold Adams Innis, Empire and Communications (Lanham, MD: Rowman and Littlefield, 2007); Marshall McLuhan, The Gutenberg Galaxy: The Making of Typographic Man (Toronto: University of Toronto Press, 2011).
-
(2011)
-
-
-
11
-
-
84957688090
-
-
Americas Quarterly, accessed Septem-ber 10
-
"Twitter Saves Lives in Mexico," Americas Quarterly, accessed Septem-ber 10, 2014, http://www.americasquarterly.org/node/2576.
-
(2014)
-
-
-
12
-
-
84957623065
-
-
accessed June 16
-
"Bloqueos," Google Maps, accessed June 16, 2014, https://maps.google .com/maps/ms?ie=UTF8&hl=en&msa=0&msid=117897461681645 229195.0004822dd7b250a595b99&ll=25.705578,-100.26947&spn=0.224894,0.308647&z=12&dg=feature.
-
(2014)
-
-
-
13
-
-
84957624233
-
-
"Superstorm Sandy: NYC," Google Maps, accessed June 16, 2014, http:// google.org/crisismap/2012-sandy-nyc?hl=en&llbox=40.8579,40 .5237,-73.9334,-74.3728&t=roadmap&layers=layer1,layer0,8,9,1330 918331511,5&promoted.
-
-
-
-
14
-
-
84957655348
-
-
Anecdotes from Kyrgyzstan," iRevolution, March 26, 2011, accessed June 30 Short Message Service (SMS) is a tool that allows for text messages be-tween telephones.
-
"How to Use Technology to Counter Rumors During Crises: Anecdotes from Kyrgyzstan," iRevolution, March 26, 2011, accessed June 30, 2014, http://irevolution.net/2011/03/26/technology-to-counter-rumors/. Short Message Service (SMS) is a tool that allows for text messages be-tween telephones.
-
(2014)
-
-
-
15
-
-
84957718727
-
-
accessed May 21
-
"Rassd News Network (RNN)," Wikipedia, accessed May 21, 2014, http://en.wikipedia.org/wiki/Rassd_News_Network_(RNN).
-
(2014)
-
-
-
16
-
-
84957670636
-
-
accessed Septem-ber 30, 2014
-
"WITNESS: Cameras Everywhere Report," 2011, accessed Septem-ber 30, 2014, http://www3.witness.org/cameras-everywhere/report -2011.
-
(2011)
-
-
-
17
-
-
84874824747
-
-
Andrés Monroy-Hernández et al., "The New War Correspondents: The Rise of Civic Media Curation in Urban Warfare," in Proceedings of the 2013 Conference on Computer Supported Cooperative Work (ACM, 2013), 1443-52, doi:10.1145/2441776.2441938, http://dl.acm.org/citation .cfm?id=2441938.
-
-
-
-
18
-
-
84957670990
-
Too many people with security clearances, but cuts could help some feds, hurt others
-
Washington Post, March 20, 2014, accessed September 30
-
Joe Davidson, "Too Many People with Security Clearances, but Cuts Could Help Some Feds, Hurt Others," Washington Post, March 20, 2014, accessed September 30, 2014, http://www.washingtonpost.com/ politics/ federal_government/too-many-people-with-security-clearances-but -cuts-could-help-some-feds-hurt-others/2014/03/20/1f1d011a-b05e -11e3-a49e-76adc9210f19_story.html.
-
(2014)
-
-
Davidson, J.1
-
19
-
-
84957689434
-
A hidden world, growing beyond control
-
Washington Post, 2010, accessed September 30
-
Dana Priest and William M. Arkin, "A Hidden World, Growing Beyond Control," Washington Post, 2010, accessed September 30, 2014, http:// projects.washingtonpost.com/top-secret-america/articles/a-hidden -world-growing-beyond-control/.
-
(2014)
-
-
Dana, P.1
William Arkin, M.2
-
20
-
-
84957659814
-
What exactly are the NSA's 'groundbreaking crypt-analytic capabilities
-
September 4, 2013, accessed Septem-ber 30
-
Michael Eisen, "What Exactly Are the NSA's 'Groundbreaking Crypt-analytic Capabilities'?" WIRED, September 4, 2013, accessed September 30, 2014, http://www.wired.com/2013/09/black-budget-what -exactly-are-the-nsas-cryptanalytic-capabilities/.
-
(2014)
WIRED
-
-
Eisen, M.1
-
21
-
-
84957625912
-
How the U.S. Forces net firms to cooperate on sur-veillance
-
July 12, 2013, accessed September 30
-
Declan McCullagh, "How the U.S. Forces Net Firms to Cooperate on Sur-veillance," CNET, July 12, 2013, accessed September 30, 2014, http:// www.cnet.com/news/how-the-u-s-forces-net-firms-to-cooperate-on -surveillance/.
-
(2014)
CNET
-
-
McCullagh, D.1
-
22
-
-
84957705860
-
Google takes on rare fight against national security let-ters
-
Wired, April 4, 2013, accessed September 30
-
Kim Zetter, "Google Takes on Rare Fight Against National Security Let-ters," Wired, April 4, 2013, accessed September 30, 2014, http://www .wired.com/2013/04/google-fights-nsl/.
-
(2014)
-
-
Zetter, K.1
-
23
-
-
84957679818
-
-
accessed June 16, 2014 "Silent Circle," accessed June 16
-
"Lavabit," accessed June 16, 2014, http://lavabit.com/; "Silent Circle," accessed June 16, 2014, http://silentcircle.com/.
-
(2014)
-
-
-
24
-
-
84957693227
-
Author's calculations based on the transparency reports available from Face book
-
accessed September 24, 2014), Google accessed September 24, 2014), and Twitter ac-cessed September 21
-
Author's calculations based on the transparency reports available from Face book (https://govtrequests.facebook.com/, accessed September 24, 2014), Google (http://www.google.com/transparencyreport/, accessed September 24, 2014), and Twitter (https://transparency.twitter.com, ac-cessed September 21, 2014).
-
(2014)
-
-
-
25
-
-
84957692650
-
-
"Spam Bots Flooding Twitter to Drown Info About #Syria Protests," Global Voices Advocacy, April 18, 2011, accessed Septem-ber 30spam-bots-flooding-twitter-to-drown-info-about-syria-protests/; Neal Ungerleider, "Behind the Mystery of Spam Tweets Clogging Syr-ian Protesters' Streams," Fast Company, April 21, 2011, accessed Sep-tember 30, 2014
-
Anas Qtiesh, "Spam Bots Flooding Twitter to Drown Info About #Syria Protests," Global Voices Advocacy, April 18, 2011, accessed Septem-ber 30, 2014, http://advocacy.globalvoicesonline.org/2011/04/18/ spam-bots-flooding-twitter-to-drown-info-about-syria-protests/; Neal Ungerleider, "Behind the Mystery of Spam Tweets Clogging Syr-ian Protesters' Streams," Fast Company, April 21, 2011, accessed Sep-tember 30, 2014, http://www.fastcompany.com/1748827/behind -mystery-spam-tweets-clogging-syrian-protesters-streams.
-
(2014)
-
-
Qtiesh, A.1
-
26
-
-
84957612869
-
-
"Who Is Using EGHNA Media Server," EGHNA Media Server, accessed September 30
-
"Who Is Using EGHNA Media Server," EGHNA Media Server, accessed September 30, 2014, http://media.eghna.com/success_stories.
-
(2014)
-
-
-
27
-
-
84957672992
-
-
"A Call to Harm: New Malware Attacks Target the Syrian Opposition," Citizen Lab, June 21, 2013, accessed September 30
-
"A Call to Harm: New Malware Attacks Target the Syrian Opposition," Citizen Lab, June 21, 2013, accessed September 30, 2014, https://citizenlab .org/2013/06/a-call-to-harm/.
-
(2014)
-
-
-
28
-
-
84957654363
-
side twitter: An in-depth look at the 5% of most active users
-
(Toronto: Sysomos, August 2009), accessed September 30
-
Alex Cheng and Mark Evans, Inside Twitter: An In-Depth Look at the 5% of Most Active Users (Toronto: Sysomos, August 2009), accessed September 30, 2014, http://www.sysomos.com/insidetwitter/mostactiveusers/.
-
(2014)
-
-
Alex, C.1
Mark, E.2
-
29
-
-
84957690133
-
-
"Twitter Bots Target Tibetan Protests," Krebs on Security, March 20, 2012, accessed September 30
-
Brian Krebs, "Twitter Bots Target Tibetan Protests," Krebs on Security, March 20, 2012, accessed September 30, 2014, http://krebsonsecurity .com/2012/03/twitter-bots-target-tibetan-protests/.
-
(2014)
-
-
Krebs, B.1
-
30
-
-
84957632037
-
-
"Twitter Mischief Plagues Mexico's Election," MIT Technol-ogy Review, June 21, 2012, accessed September 30
-
Mike Orcutt, "Twitter Mischief Plagues Mexico's Election," MIT Technol-ogy Review, June 21, 2012, accessed September 30, 2014, http://www .technologyreview.com/news/428286/twitter-mischief-plagues -mexicos-election/.
-
(2014)
-
-
Orcutt, M.1
-
31
-
-
84957656289
-
-
side Croydon, "Jasper Admits to Using Twitter Bots to Drive Election Bid," Inside Croydon, accessed September 30
-
Inside Croydon, "Jasper Admits to Using Twitter Bots to Drive Election Bid," Inside Croydon, accessed September 30, 2014, http://insidecroydon .com/2012/11/26/jasper-admits-to-using-twitter-bots-to-drive -election-bid/.
-
(2014)
-
-
-
32
-
-
84957677477
-
-
Al Jazeera, January 13, 2012, accessed September 30
-
Jillian C. York, "Dangerous Social Media Games," Al Jazeera, January 13, 2012, accessed September 30, 2014, http://www.aljazeera.com/ indepth/opinion/2012/01/2012 642310699.html.
-
(2014)
Dangerous Social Media Games
-
-
Jillian York, C.1
-
33
-
-
84957659928
-
-
Wikipedia, accessed June 20
-
"Joint Threat Research Intelligence Group," Wikipedia, accessed June 20, 2014, http://en.m.wikipedia.org/wiki/Joint_Threat_Research_Intelli gence:Group.
-
(2014)
-
-
-
34
-
-
84957630750
-
-
Associated Press, "US Secretly Created 'Cuban Twitter' to Stir Unrest and Undermine Government," Guardian, April 3, 2014, accessed Septem-ber 30
-
Associated Press, "US Secretly Created 'Cuban Twitter' to Stir Unrest and Undermine Government," Guardian, April 3, 2014, accessed Septem-ber 30, 2014, http://www.theguardian.com/world/2014/apr/03/us -cuban-twitter-zunzuneo-stir-unrest.
-
(2014)
-
-
-
35
-
-
84957650656
-
-
Wikipedia, accessed June 30
-
"Storm Botnet," Wikipedia, accessed June 30, 2014, http://en.wikipedia .org/wiki/Storm_botnet.
-
(2014)
-
-
-
36
-
-
84957686303
-
-
Wikipedia, accessed June 19
-
"Kraken Botnet," Wikipedia, accessed June 19, 2014, http://en.wikipedia .org/wiki/Kraken_botnet.
-
(2014)
-
-
-
37
-
-
84957651712
-
-
accessed June 20
-
"The Spamhaus Project," accessed June 20, 2014, http://www.spam haus.org/.
-
(2014)
-
-
-
38
-
-
84957648176
-
-
"Spamhaus Hit with 'Largest Publicly Announced DDoS Attack' Ever, Affecting Internet Users Worldwide," Huffington Post, March 27, 2013, accessed September 30
-
Raphael Satter, "Spamhaus Hit with 'Largest Publicly Announced DDoS Attack' Ever, Affecting Internet Users Worldwide," Huffington Post, March 27, 2013, accessed September 30, 2014, http://www.huffington post.com/2013/03/27/spamhaus-cyber-attack_n_2963632.html ?utm_hp_ref=tw.
-
(2014)
-
-
Satter, R.1
-
39
-
-
84957693302
-
-
"ITU" "ICANN" "IGF," Internet Governance Forum, accessed June 20
-
"ITU" "ICANN" "IGF," Internet Governance Forum, accessed June 20, 2014, http://www.intgovforum.org/cms/.
-
(2014)
-
-
-
40
-
-
84926097400
-
New media campaigns and the managed citizen
-
New York: Cambridge University Press
-
Philip N. Howard, New Media Campaigns and the Managed Citizen (New York: Cambridge University Press, 2005).
-
(2005)
-
-
Howard, P.N.1
-
41
-
-
84922410786
-
The MoveOn Effect: The unexpected transformation of American polit-ical advocacy
-
New York: Oxford University Press, 2012); Daniel Kreiss, Taking Our Country Back: The Crafting of Networked Politics from Howard Dean to Barack Obama (New York: Oxford University Press
-
David Karpf, The MoveOn Effect: The Unexpected Transformation of American Polit-ical Advocacy (New York: Oxford University Press, 2012); Daniel Kreiss, Taking Our Country Back: The Crafting of Networked Politics from Howard Dean to Barack Obama (New York: Oxford University Press, 2012).
-
(2012)
-
-
Karpf, D.1
-
42
-
-
84966922940
-
Concerned citizens and Bounty Hunters: The lebanese army has an app for you
-
September 6, 2013, accessed September 30
-
Mohamed El Dahshan, "Concerned Citizens and Bounty Hunters: The Lebanese Army Has an App for You," Foreign Policy Blogs, September 6, 2013, accessed September 30, 2014, http://transitions.foreignpolicy.com/posts/2013/09/06/concerned_citizens_and_bounty_hunters_ the_lebanese_army_has_an_app_for_you.
-
(2014)
Foreign Policy Blogs
-
-
Dahshan, M.E.1
-
43
-
-
84957706592
-
The secret financial market only Robots can see
-
Quartz, September 17, 2013, accessed September 30
-
Tim Fernholz, "The Secret Financial Market Only Robots Can See," Quartz, September 17, 2013, accessed September 30, 2014, http://qz.com/ 124721/the-secret-financial-market-only-robots-can-see/.
-
(2014)
-
-
Fernholz, T.1
-
44
-
-
84957649634
-
-
"The Internet of Things."
-
"The Internet of Things."
-
-
-
-
45
-
-
84957668120
-
-
"What Google Really Gets Out of Buying Nest for $3.2 Billion," Wired, January 14, 2014, accessed September 30, 2014
-
Marcus Wohlsen, "What Google Really Gets Out of Buying Nest for $3.2 Billion," Wired, January 14, 2014, accessed September 30, 2014, http://www.wired.com/2014/01/googles-3-billion-nest-buy-finally -make-internet-things-real-us/.
-
-
-
Marcus, W.1
-
46
-
-
84876117731
-
Democracy's fourth wave? Digital media and the Arab spring
-
New York: Oxford University Press
-
Philip N. Howard and Muzammil M. Hussain, Democracy's Fourth Wave? Digital Media and the Arab Spring (New York: Oxford University Press, 2013).
-
(2013)
-
-
Philip Howard, N.1
Muzammil Hussain, M.2
-
47
-
-
84883383222
-
Exposing one of China's cyber espionage units
-
(Alexandria, VA: Mandiant, March 2013), accessed September 30
-
Mandiant, APT1: Exposing One of China's Cyber Espionage Units (Alexandria, VA: Mandiant, March 2013), accessed September 30, 2014, http:// intelreport.mandiant.com/Mandiant_APT1_Report.pdf.
-
(2014)
-
-
-
48
-
-
84957661826
-
Researchers name three hackers tied to one of China's most active military intrusion teams
-
February 19, 2013, accessed September 30
-
Andy Greenberg, "Researchers Name Three Hackers Tied to One Of China's Most Active Military Intrusion Teams," Forbes, February 19, 2013, accessed September 30, 2014, http://www.forbes.com/sites/ andygreenberg/2013/02/19/researchers-name-three-hackers-tied-to -one-of-chinas-most-active-military-intrusion-teams/.
-
(2014)
Forbes
-
-
Greenberg, A.1
-
49
-
-
84957667507
-
-
"Getting Ugly: If China Wants Respect Abroad, It Must Rein In Its Hackers," Economist, February 21, 2013, accessed September 30
-
"Getting Ugly: If China Wants Respect Abroad, It Must Rein In Its Hackers," Economist, February 21, 2013, accessed September 30, 2014, http://www.economist.com/news/leaders/21572200-if-china-wants -respect-abroad-it-must-rein-its-hackers-getting-ugly.
-
(2014)
-
-
-
50
-
-
84957635797
-
Netizen Report: Tibetan internet users targeted with malware
-
April 9accessed September 30, 2014
-
Lisa Ferguson et al., "Netizen Report: Tibetan Internet Users Targeted with Malware," Global Voices Advocacy, April 9, 2013, accessed Septem- ber 30, 2014, http://advocacy.globalvoicesonline.org/2013/04/09/ netizen-report-tibetan-internet-users-targeted-with-malware/.
-
(2013)
Global Voices Advocacy
-
-
Lisa, F.1
-
51
-
-
84957663459
-
Cyberattacks abound yet companies tell SEC losses are few
-
April 3, 2013, accessed September 30
-
Chris Strom, Dave Michaels, and Eric Engleman, "Cyberattacks Abound Yet Companies Tell SEC Losses Are Few," Bloomberg, April 3, 2013, accessed September 30, 2014, http://www.bloomberg.com/ news/2013-04-04/cyberattacks-abound-yet-companies-tell-sec-losses -are-few.html.
-
(2014)
Bloomberg
-
-
Chris, S.1
Dave M.Eric, E.2
-
52
-
-
84957719019
-
-
February 21, 2013, accessed September 30
-
"Smoking Gun," Economist, February 21, 2013, accessed September 30, 2014, http://www.economist.com/news/china/21572228-evidence -mounting-chinas-government-sponsoring-cybertheft-western -corporate.
-
(2014)
-
-
-
53
-
-
84957650937
-
Snowden says NSA engages in industrial espio-nage
-
TV," Reuters, January 26, 2014, accessed September 30
-
Erik Kirschbaum, "Snowden Says NSA Engages in Industrial Espio-nage: TV," Reuters, January 26, 2014, accessed September 30, 2014, http://www.reuters.com/article/2014/01/26/us-security-snowden -germany-idUSBREA0P0DE20140126.
-
(2014)
-
-
Kirschbaum, E.1
-
54
-
-
84887074351
-
Cyberattack on Saudi oil firm disquiets U
-
October 24, 2012, accessed September 30
-
Nicole Perlroth, "Cyberattack on Saudi Oil Firm Disquiets U.S.," The New York Times, October 24, 2012, accessed September 30, 2014, http:// www.nytimes.com/2012/10/24/business/global/cyberattack-on -saudi-oil-firm-disquiets-us.html.
-
(2014)
The New York Times
-
-
Perlroth, N.1
-
55
-
-
84957696673
-
-
accessed June 30
-
"Stuxnet," Wikipedia, accessed June 30, 2014, http://en.wikipedia.org/ wiki/Stuxnet.
-
(2014)
-
-
-
56
-
-
84957629865
-
Virus seeking bank data is tied to attack on iran
-
Bits, August 9
-
Nicole Perlroth, "Virus Seeking Bank Data Is Tied to Attack on Iran," Bits, August 9, 2012, http://bits.blogs.nytimes.com/2012/08/09/ researchers-find-possible-state-sponsored-virus-in-mideast/.
-
(2012)
-
-
Perlroth, N.1
-
57
-
-
84957642610
-
Wanted by the FBI: Wang dong
-
accessed June 30
-
ederal Bureau of Investigation, "Wanted by the FBI: Wang Dong," FBI, accessed June 30, 2014, http://www.fbi.gov/wanted/cyber/wang -dong.
-
(2014)
FBI
-
-
-
58
-
-
84957683776
-
The dictator's learning curve: Inside the global battle for democracy
-
New York: Random House
-
William J. Dobson, The Dictator's Learning Curve: Inside the Global Battle for Democracy (New York: Random House, 2012).
-
(2012)
-
-
William Dobson, J.1
-
59
-
-
84957635668
-
-
BBC News, March 13, 2013, accessed September 30
-
"Obama Upbraids China on Hack Attacks," BBC News, March 13, 2013, accessed September 30, 2014, http://www.bbc.co.uk/news/world -us-canada-21772596.
-
(2014)
-
-
-
60
-
-
84957693492
-
-
"Corrupt Personalization," Social Media Collective, ac-cessed July 5, 2014 Jonathan Zittrain, "Facebook Could Decide an Election Without Anyone Ever Finding Out," New Republic, June 1, 2014, accessed September 30 article/117878/information-fiduciary-solution-facebook-digital -gerrymandering.
-
Christian Sandvig, "Corrupt Personalization," Social Media Collective, ac-cessed July 5, 2014, http://socialmediacollective.org/2014/06/26/ corrupt-personalization/; Jonathan Zittrain, "Facebook Could Decide an Election Without Anyone Ever Finding Out," New Republic, June 1, 2014, accessed September 30, 2014, http://www.newrepublic.com/ article/117878/information-fiduciary-solution-facebook-digital -gerrymandering.
-
(2014)
-
-
Sandvig, C.1
-
61
-
-
84957626337
-
-
Wikipedia, accessed June 30
-
"Anonymous (group)," Wikipedia, accessed June 30, 2014, http://en .wikipedia.org/wiki/Anonymous_(group).
-
(2014)
-
-
-
62
-
-
84957649441
-
Hackers take down world cup site in Brazil
-
Bits, June 20, 2014, accessed September 30
-
Nicole Perlroth, "Hackers Take Down World Cup Site in Brazil," Bits, June 20, 2014, accessed September 30, 2014, http://bits.blogs.nytimes .com/2014/06/20/hackers-take-down-world-cup-site-in-brazil/.
-
(2014)
-
-
Perlroth, N.1
-
63
-
-
84957649267
-
-
"Hack into Child Porn Sites Instead, DOJ Urges Hacktivists," GMA News Online, October 10 accessed September 30
-
"Hack into Child Porn Sites Instead, DOJ Urges Hacktivists," GMA News Online, October 10, 2012, accessed September 30, 2014, http://www .gmanetwork.com/news/story/277629/scitech/technology/hack -into-child-porn-sites-instead-doj-urges-hacktivists.
-
(2014)
-
-
-
64
-
-
84957667576
-
-
"Small Change," New Yorker, October 4, 2010, Ev-geny Morozov, "The Folly of Kindle Diplomacy," Slate, June 21, 2012Gina Neff and Peter Nagy, "Imagined Affordances: Reconstruct-ing a Keyword for Technology Studies," Center for Media, Data, and Society, Central European University, Working Paper 2014.2, Septem-ber 2014, accessed September 30
-
Malcolm Gladwell, "Small Change," New Yorker, October 4, 2010, http:// www.newyorker.com/magazine/2010/10/04/small-change-3; Ev-geny Morozov, "The Folly of Kindle Diplomacy," Slate, June 21, 2012, http://www.slate.com/articles/technology/future_tense/2012/06/ state_department_s_amazon_kindle_plan_won_t_help_dissidents_ .html; Gina Neff and Peter Nagy, "Imagined Affordances: Reconstruct-ing a Keyword for Technology Studies," Center for Media, Data, and Society, Central European University, Working Paper 2014.2, Septem-ber 2014, accessed September 30, 2014.
-
(2014)
-
-
Gladwell, M.1
-
65
-
-
84895901194
-
Civic engagement in a digital age
-
(Washington, DC: Pew Research, April 2013), accessed September 12
-
Aaron Smith, Civic Engagement in a Digital Age (Washington, DC: Pew Research, April 2013), accessed September 12, 2014, http://www .pewinternet.org/2013/04/25/civic-engagement-in-the-digital-age/.
-
(2014)
-
-
Smith, A.1
-
66
-
-
84957681441
-
-
"YouTube Reaches Billion Users Milestone," Financial Times, March 21, 2013, accessed September 30
-
Tim Bradshaw, "YouTube Reaches Billion Users Milestone," Financial Times, March 21, 2013, accessed September 30, 2014, http://www.ft .com/intl/cms/s/0/8f06331a-91ca-11e2-b4c9-00144feabdc0.html.
-
(2014)
-
-
Bradshaw, T.1
-
67
-
-
84957619456
-
-
"Syria Internet Usage and Telecommunications Report," Internet World Stats, accessed June 20
-
"Syria Internet Usage and Telecommunications Report," Internet World Stats, accessed June 20, 2014, http://www.internetworldstats.com/ me/sy.htm.
-
(2014)
-
-
-
68
-
-
84957623351
-
-
accessed September 24
-
Open Signal, Global Network Maps, accessed September 24, 2014, http://opensignal.com/networks/.
-
(2014)
-
-
-
69
-
-
84957635720
-
-
Global Mobile Data Traffic Forecast Up-date, 2013-2018 (San Jose, CA: Cisco, February 2014), accessed September 30
-
Cisco, Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Up-date, 2013-2018 (San Jose, CA: Cisco, February 2014), accessed September 30, 2014, http://cisco.com/c/en/us/solutions/collateral/service -provider/visual-networking-index-vni/white_paper_c11-520862 .html.
-
(2014)
-
-
-
70
-
-
77249103556
-
Why are there no Arab democracies
-
Larry Diamond, "Why Are There No Arab Democracies?" Journal of De-mocracy 21, no. 1 (2010): 93-112.
-
(2010)
Journal of De-mocracy
, vol.21
, Issue.1
, pp. 93-112
-
-
Diamond, L.1
-
72
-
-
84967413079
-
The end of history and the last man, reissue ed
-
New York: Free Press
-
Francis Fukuyama, The End of History and the Last Man, reissue ed. (New York: Free Press, 2006).
-
(2006)
-
-
Fukuyama, F.1
-
73
-
-
0004115797
-
The staples thesis, common property, and home-steading
-
Clive Southey, "The Staples Thesis, Common Property, and Home-steading," Canadian Journal of Economics 11, no. 3 (1978): 547-59, doi:10 .2307/134323.
-
(1978)
Canadian Journal of Economics
, vol.11
, Issue.3
, pp. 547-559
-
-
Southey, C.1
-
74
-
-
84957648373
-
-
Mobile Wallet (NFC, Digital Wallet) Market (Applications, Mode of Payment, Stakeholders, and Geography)-Global Share, Size, Industry Analysis, Trends, Opportunities, Growth, and Forecast, 2012-2020 (Portland, OR: Al-lied Market Research, November 2013), accessed September 30, 2014, Marion Williams, "The Regulatory Tension over Mobile Money," Australian Banking and Finance, February 17, 2014, accessed September 30
-
Lita Person, Mobile Wallet (NFC, Digital Wallet) Market (Applications, Mode of Payment, Stakeholders, and Geography)-Global Share, Size, Industry Analysis, Trends, Opportunities, Growth, and Forecast, 2012-2020 (Portland, OR: Al-lied Market Research, November 2013), accessed September 30, 2014, http://www.alliedmarketresearch.com/mobile-wallet-market; Marion Williams, "The Regulatory Tension over Mobile Money," Australian Banking and Finance, February 17, 2014, accessed September 30, 2014, http://www.australianbankingfinance.com/banking/the-regulatory -tension-over-mobile-money/.
-
(2014)
-
-
Person, L.1
-
75
-
-
84957631752
-
-
dia Today, January 22, 2014, accessed September 30
-
"University of Cumbria Becomes First in World to Accept Tuition Fees in Bitcoin," India Today, January 22, 2014, accessed September 30, 2014, http://indiatoday.intoday.in/story/british-university-to-accept -tuition-fees-in-bitcoin/1/339087.html.
-
(2014)
University of Cumbria Becomes First in World to Accept Tuition Fees in Bitcoin
-
-
-
76
-
-
67349248103
-
-
World Development
-
Philip N. Howard and Nimah Mazaheri, "Telecommunications Re-form, Internet Use, and Mobile Phone Adoption in the Developing World," World Development 37, no. 7 (2009): 1159-69, doi:10.1016/ j.worlddev.2008.12.005.
-
(2009)
Telecommunications Re-form, Internet Use, and Mobile Phone Adoption in the Developing World
, vol.37
, Issue.7
, pp. 1159-1169
-
-
Philip Howard, N.1
Nimah, M.2
-
77
-
-
84957619345
-
-
"The Big Mobile-Phone Reset," Economist, September 7, 2013, ac-cessed September 30
-
"The Big Mobile-Phone Reset," Economist, September 7, 2013, ac-cessed September 30, 2014, http://www.economist.com/news/ business/21585006-weeks-two-telecoms-deals-will-be-followed -others-industry-undergoes-big.
-
(2014)
-
-
-
78
-
-
84957661682
-
-
IDFSpokesperson, microblog, Twitter, November 14, 2012, accessed September 30
-
IDFSpokesperson, microblog, Twitter, November 14, 2012, accessed September 30, 2014, https://twitter.com/IDFSpokesperson/status/ 268722403989925888.
-
(2014)
-
-
-
79
-
-
84957654193
-
-
IDFSpokesperson, microblog, Twitter, November 14, 2012, accessed September 30
-
IDFSpokesperson, microblog, Twitter, November 14, 2012, accessed September 30, 2014, https://twitter.com/IDFSpokesperson/status/ 268780918209118208.
-
(2014)
-
-
-
80
-
-
84957704323
-
-
Philly.com, October 17, 2012, accessed September 30
-
John Timpane, "Israel vs. Hamas: The First Social-Media War," Philly.com, October 17, 2012, accessed September 30, 2014, http:// articles.philly.com/2012-11-17/news/35157659_1_hamas-tweets -alqassambrigade.
-
(2014)
"Israel vs. Hamas: The First Social-Media War
-
-
Timpane, J.1
-
81
-
-
84957699106
-
-
Wired UK, January 25, 2013, accessed September 30
-
Ian Steadman, "Big Data, Language and the Death of the Theorist," Wired UK, January 25, 2013, accessed September 30, 2014, http://www .wired.co.uk/news/archive/2013-01/25/big-data-end-of-theory.
-
(2014)
Big Data, Language and the Death of the Theorist
-
-
Steadman, I.1
-
82
-
-
84957652114
-
-
"With Drones and Satellites, U.S. Zeroed in on Bin Laden," Wired, May 3, 2011, accessed September 30
-
David Axe, "With Drones and Satellites, U.S. Zeroed in on Bin Laden," Wired, May 3, 2011, accessed September 30, 2014, http://www.wired .com/2011/05/with-drones-and-satellites-u-s-zeroed-in-on-bin -laden/.
-
(2014)
-
-
Axe, D.1
-
85
-
-
84957651527
-
-
accessed June 20
-
Yoani Sánchez, Generación Y, accessed June 20, 2014, http://generacion yen.wordpress.com/.
-
(2014)
-
-
Yoani, S.1
Generación, Y.2
-
86
-
-
79956254218
-
The digital disruption: Connectivity and the diffusion of power
-
November
-
Eric Schmidt and Jared Cohen, "The Digital Disruption: Connectivity and the Diffusion of Power," Foreign Affairs 89 (November 2010): 79.
-
(2010)
Foreign Affairs 89
, vol.79
-
-
Eric, S.1
Jared, C.2
-
87
-
-
84957611664
-
-
The New Westphalian Web," Foreign Policy, Febru-ary 25, 2013, accessed September 30
-
Katherine Maher, "The New Westphalian Web," Foreign Policy, Febru-ary 25, 2013, accessed September 30, 2014, http://www.foreignpolicy .com/articles/2013/02/25/the_new_westphalian_web.
-
(2014)
-
-
Maher, K.1
-
88
-
-
84957610116
-
-
December 3, 2012, accessed September 30
-
Bruce Schneier, "Feudal Security," Schneier on Security, December 3, 2012, accessed September 30, 2014, https://www.schneier.com/blog/ archives/2012/12/feudal_sec.html.
-
(2014)
"Feudal Security," Schneier on Security
-
-
Schneier, B.1
-
89
-
-
84957675991
-
-
Wikipedia, accessed June 18
-
"United Nations Stabilisation Mission in Haiti," Wikipedia, accessed June 18, 2014, http://en.wikipedia.org/wiki/United_Nations_Stabilisation _Mission_in_Haiti.
-
(2014)
-
-
-
90
-
-
84957672106
-
-
"The Rise of the Humanitarian Drone: Giving Content to an Emerg-ing Concept," iRevolution, June 30, 2014, accessed September 30
-
"The Rise of the Humanitarian Drone: Giving Content to an Emerg-ing Concept," iRevolution, June 30, 2014, accessed September 30, 2014, http://irevolution.net/2014/06/30/rise-of-humanitarian-uav/
-
(2014)
-
-
-
91
-
-
84975960784
-
Political leadership and regime formation: On the development of institutions in international society
-
Oran R. Young, "Political Leadership and Regime Formation: On the Development of Institutions in International Society," International Orga-nization 45, no. 03 (1991): 281-308, doi:10.1017/S0020818300033117.
-
(1991)
International Orga-nization
, vol.45
, Issue.3
, pp. 281-308
-
-
Oran Young, R.1
-
92
-
-
0348105353
-
The open door
-
Cairo: American University in Cairo Press
-
Latifa Al-Zayyat, The Open Door (Cairo: American University in Cairo Press, 2002).
-
(2002)
-
-
Al-Zayyat, L.1
-
93
-
-
84957714086
-
-
"Laila's Soft Screaming: A Discourse Analysis of Cyber-Feminist Resistance on the Egyptian Women Blogsphere," Ko-lena Laila, June 9, 2010, accessed September 30
-
Mohamed Hossam Ismail, "Laila's Soft Screaming: A Discourse Analysis of Cyber-Feminist Resistance on the Egyptian Women Blogsphere," Ko-lena Laila, June 9, 2010, accessed September 30, 2014, http://kolenalaila .com/en/.
-
(2014)
-
-
Ismail, M.H.1
-
95
-
-
84957643917
-
-
Facebook, accessed June 30, 2014 "Kony 2012," Know Your Meme, ac-cessed June 30
-
"Bring Back Our Girls," Facebook, accessed June 30, 2014, https://www .facebook.com/bringbackourgirls; "Kony 2012," Know Your Meme, ac-cessed June 30, 2014, http://knowyourmeme.com/memes/events/ kony-2012.
-
(2014)
-
-
-
96
-
-
84957709716
-
-
Washington, DC: Pew Research, March 15, 2012), accessed October 10
-
Lee Rainie et al., "The Viral Kony 2012 Video," Pew Research Internet Project (Washington, DC: Pew Research, March 15, 2012), accessed October 10, 2014, http://pewinternet.org/Reports/2012/Kony-2012 -Video/Main-report.aspx.
-
(2014)
The Viral Kony 2012 Video," Pew Research Internet Project
-
-
Lee, R.1
-
97
-
-
84967133879
-
1 Billion Live in Slums
-
October 8, 2003, accessed September 30, 2014
-
Jarrett Murphy, "1 Billion Live in Slums," CBS News, October 8, 2003, accessed September 30, 2014, http://www.cbsnews.com/news/1 -billion-live-in-slums/.
-
CBS News
-
-
Murphy, J.1
-
98
-
-
84957642640
-
-
Global Issues: Refugees," UN Global Issues, accessed June 20, 2014 Imogen Foulkes, "Global Refugee Figures Highest Since WW2, UN Says," News, June 20, 2014, accessed September 30, 2014
-
"Global Issues: Refugees," UN Global Issues, accessed June 20, 2014, http://www.un.org/en/globalissues/refugees/;
-
-
-
-
100
-
-
84958157646
-
Digital activism and non-violent confiict
-
(Seattle: Digital Activism Research Project, November 2013), accessed September 30, 2014
-
F. Edwards, Philip N. Howard, and Mary Joyce, Digital Activism and Non-Violent Confiict (Seattle: Digital Activism Research Project, November 2013), accessed September 30, 2014, http://digital-activism.org/2013/ 11/report-on-digital-activism-and-non-violent-confiict/.
-
-
-
Edwards, F.1
Philip Howard, N.2
Mary, J.3
-
101
-
-
84957682248
-
-
"Protesters Broaden Tactics as Belarus Cracks Down," Christian Science Monitor, July 12, 2011
-
Jason Motlagh, "Protesters Broaden Tactics as Belarus Cracks Down," Christian Science Monitor, July 12, 2011, http://www.csmonitor.com/World/ Europe/2011/0712/Protesters-broaden-tactics-as-Belarus-cracks-down.
-
-
-
Motlagh, J.1
-
102
-
-
84957691618
-
Ukrainians crowdfund to raise cash for 'people's drone' to help outgunned army
-
June 29, 2014, accessed September 30, 2014
-
Oksana Grytsenko, "Ukrainians Crowdfund to Raise Cash for 'People's Drone' to Help Outgunned Army," Guardian, June 29, 2014, accessed September 30, 2014, http://www.theguardian.com/world/2014/ jun/29/outgunned-ukrainian-army-crowdfunding-people-drone.
-
Guardian
-
-
Grytsenko, O.1
-
103
-
-
84957714345
-
-
"Map Kibera," accessed June 20, 2014
-
"Map Kibera," accessed June 20, 2014, http://mapkibera.org/.
-
-
-
-
104
-
-
84957630898
-
Slum tourism in kibera: Education or exploitation
-
July 13, 2010, accessed September 30, 2014
-
Brian Ekdale, "Slum Tourism in Kibera: Education or Exploitation?" Brian Ekdale's Blog, July 13, 2010, accessed September 30, 2014, http://www .brianekdale.com/slum-tourism-in-kibera-education-or-exploitation/.
-
Brian Ekdale's Blog
-
-
Ekdale, B.1
-
105
-
-
84957651478
-
The Hidden World of Shadow Cities
-
accessed September 30, 2014
-
Robert Neuwirth, The Hidden World of Shadow Cities, TEDGlobal, 2005, accessed September 30, 2014, http://www.ted.com/talks/robert _neuwirth_on_our_shadow_cities.
-
TEDGlobal, 2005
-
-
Robert, N.1
-
106
-
-
84957643765
-
-
"Spatial Collective," accessed June 20, 2014
-
"Spatial Collective," accessed June 20, 2014, http://spatialcollective .com/.
-
-
-
-
107
-
-
84957630876
-
The dictator's dead pool for 2013: Will China's investments pay off in political clout
-
Huffington Post, December 31, 2012, accessed September 30, 2014
-
Philip N. Howard, "The Dictator's Dead Pool for 2013: Will China's Investments Pay Off in Political Clout?" Huffington Post, December 31, 2012, accessed September 30, 2014, http://www.huffingtonpost.com/ philip-n-howard/the-dictators-dead-pool-for-2013-will-chinas -investments-pay-off-in-political-clout_b_2374668.html.
-
-
-
Philip Howard, N.1
-
108
-
-
84957687730
-
-
Carter Center, Study Mission to the October 7, 2012 Presidential Election in Venezuela (Atlanta: Carter Center, October 2012), accessed September 30, 2014
-
Carter Center, Study Mission to the October 7, 2012 Presidential Election in Venezuela (Atlanta: Carter Center, October 2012), accessed September 30, 2014, http://www.cartercenter.org/resources/pdfs/news/peace:publications/ election_reports/venezuela-2012-election-study-mission-final-rpt.pdf.
-
-
-
-
109
-
-
84942758042
-
From drug wars to criminal insurgency: Mexican cartels, crim-inal enclaves, and criminal insurgency in Mexico and Central America, and their implications for global Security
-
(Paris: Fondation Maison des sciences de l'homme, January 2012).
-
John P. Sullivan, From Drug Wars to Criminal Insurgency: Mexican Cartels, Crim-inal Enclaves, and Criminal Insurgency in Mexico and Central America, and Their Implications for Global Security (Paris: Fondation Maison des sciences de l'homme, January 2012).
-
-
-
John Sullivan, P.1
-
110
-
-
84942758042
-
From drug wars to criminal insurgency: Mexican cartels, crim-inal enclaves, and criminal insurgency in Mexico and Central America, and their implications for global Security
-
(Paris: Fondation Maison des sciences de l'homme, January 2012). Ibid
-
Ibid. John P. Sullivan, From Drug Wars to Criminal Insurgency: Mexican Cartels, Crim-inal Enclaves, and Criminal Insurgency in Mexico and Central America, and Their Implications for Global Security (Paris: Fondation Maison des sciences de l'homme, January 2012).
-
-
-
John Sullivan, P.1
-
111
-
-
84957711226
-
Opium market, revenue opportunities, and insurgency in afghanistan's provinces
-
Essex: University of Essex
-
Vincenzo Bove, "Opium Market, RevenueOpportunities, and Insurgency in Afghanistan's Provinces," Essex: University of Essex, 2011, 1-27.
-
(2011)
, pp. 1-27
-
-
Bove, V.1
-
112
-
-
84957718813
-
The simple economics of extortion: Evidence from trucking in aceh
-
(Washington, DC: National Bureau of Eco-nomic Research, June 2007), accessed September 30, 2014
-
Benjamin A. Olken and Patrick Barron, The Simple Economics of Extortion: Evidence from Trucking in Aceh (Washington, DC: National Bureau of Eco-nomic Research, June 2007), accessed September 30, 2014, http:// www.nber.org/papers/w13145.
-
-
-
Benjamin Olken, A.1
Patrick, B.2
-
113
-
-
84865146708
-
-
"Mafia States: Organized Crime Takes Office," Foreign Af-fairs 91 May
-
Moises Naim, "Mafia States: Organized Crime Takes Office," Foreign Af-fairs 91 (May 2012): 112.
-
(2012)
, pp. 112
-
-
Naim, M.1
-
114
-
-
84865146708
-
-
Ibid. "Mafia States: Organized Crime Takes Office," Foreign Af-fairs 91 May
-
Ibid. Moises Naim, "Mafia States: Organized Crime Takes Office," Foreign Af-fairs 91 (May 2012): 112.
-
(2012)
, pp. 112
-
-
Naim, M.1
-
115
-
-
84957704320
-
-
Symantec, Norton Report 2013: Cost per Cybercrime Victim Up 50 Percent (Mountain View, CA: Symantec, October 2013), accessed Septem-ber 30, 2014
-
Symantec, Norton Report 2013: Cost per Cybercrime Victim Up 50 Percent (Mountain View, CA: Symantec, October 2013), accessed Septem-ber 30, 2014, http://www.symantec.com/about/news/release/article .jsp?prid=20131001_01.
-
-
-
-
116
-
-
84957693620
-
-
"WikiLeaks Cables: Russian Government 'Using Mafia for Its Dirty Work,'" Guardian, December 1, 2010, accessed Septem-ber 30, 2014
-
Luke Harding, "WikiLeaks Cables: Russian Government 'Using Mafia for Its Dirty Work,'" Guardian, December 1, 2010, accessed Septem-ber 30, 2014, http://www.theguardian.com/world/2010/dec/01/ wikileaks-cable-spain-russian-mafia.
-
-
-
Harding, L.1
-
117
-
-
84957634300
-
Horizon 2025: Creative destruction in the aid industry
-
(London: Overseas Development Institute, July 2012), ac-cessed September 30, 2014
-
Homi Kharas and Andrew Rogerson, Horizon 2025: Creative Destruction in the Aid Industry (London: Overseas Development Institute, July 2012), ac-cessed September 30, 2014, http://www.aidmonitor.org.np/reports/ horizon%202012.pdf.
-
-
-
Homi, K.1
Andrew, R.2
-
118
-
-
79953651657
-
-
"Where Life Is Cheap and Talk Is Loose," Economist, March 17, 2011, accessed September 30, 2014
-
"Where Life Is Cheap and Talk Is Loose," Economist, March 17, 2011, accessed September 30, 2014, http://www.economist.com/node/18396240.
-
-
-
-
119
-
-
84957687446
-
-
"Hung, Drawn, and Quartered," Economist, November 10, 2012, ac-cessed September 30, 2014
-
"Hung, Drawn, and Quartered," Economist, November 10, 2012, ac-cessed September 30, 2014, http://www.economist.com/news/ international/21565927-better-deterrents-are-putting-somali-pirates -business-under-strain-hung-drawn-and.
-
-
-
-
120
-
-
84957668321
-
-
National Democratic Institute, "Election Stories Unfold on a Map," National Democratic Institute, Spring 2011, accessed September 30, 2014
-
National Democratic Institute, "Election Stories Unfold on a Map," National Democratic Institute, Spring 2011, accessed September 30, 2014, https://www.ndi.org/election-stories-unfold-on-a-map.
-
-
-
-
121
-
-
84957631252
-
-
Voter Fraud Clip, 2012, accessed September 30, 2014
-
Voter Fraud Clip, 2012, accessed September 30, 2014, http://youtu.be/ jxf-nRTDvGQ.
-
-
-
-
122
-
-
84957660528
-
-
"Crowdmap," Ushahidi, accessed June 30, 2014
-
Crowdmap," Ushahidi, accessed June 30, 2014, http://www.ushahidi .com/product/crowdmap/.
-
-
-
-
123
-
-
84957649045
-
-
"Ushahidi Haiti Project Map," National Geographic, accessed June 27, 2014, Russian Fires," accessed June 27, 2014
-
"Ushahidi Haiti Project Map," National Geographic, accessed June 27, 2014, http://newswatch.nationalgeographic.com/2012/07/02/crisis-mapping-haiti/uhp2/; "Russian Fires," accessed June 27, 2014, http:// russian-fires.ru/; "LizaAlert," accessed June 27, 2014, http://lizaalert .org/.
-
-
-
-
124
-
-
0003532542
-
Strong societies and weak states: State-Society relations and state capabilities in the third world
-
(Princeton: Princeton University Press, 1988).
-
Joel S. Migdal, Strong Societies and Weak States: State-Society Relations and State Capabilities in the Third World (Princeton: Princeton University Press, 1988).
-
-
-
Joel Migdal, S.1
-
125
-
-
84957652243
-
-
"Mobile Payments Go Viral: M-Pesa in Kenya," Yes Africa Can: Stories from a Dynamic Continent (Washington, DC: World Bank, Janu-ary 2013), accessed September 30, 2014
-
World Bank, "Mobile Payments Go Viral: M-Pesa in Kenya," Yes Africa Can: Stories from a Dynamic Continent (Washington, DC: World Bank, Janu-ary 2013), accessed September 30, 2014, http://web.worldbank.org/ WBSITE/EXTERNAL/COUNTRIES/AFRICAEXT/0, contentMDK:2255 1641~pagePK:146736~piPK:146830~theSitePK:258644,00.html.
-
-
-
-
126
-
-
84957611078
-
-
"If Your Government Fails, Can You Create a New One with Your Phone?" The Atlantic, July 31, 2013, accessed September 30, 2014
-
Philip N. Howard, "If Your Government Fails, Can You Create a New One with Your Phone?" The Atlantic, July 31, 2013, accessed September 30, 2014, http://www.theatlantic.com/international/archive/2013/07/if-your -government-fails-can-you-create-a-new-one-with-your-phone/ 278216/.
-
-
-
Philip Howard, N.1
-
127
-
-
84957701664
-
-
Ibid. "If Your Government Fails, Can You Create a New One with Your Phone?" The Atlantic, July 31, 2013, accessed September 30, 2014
-
Ibid. Philip N. Howard, "If Your Government Fails, Can You Create a New One with Your Phone?" The Atlantic, July 31, 2013, accessed September 30, 2014, http://www.theatlantic.com/international/archive/2013/07/if-your -government-fails-can-you-create-a-new-one-with-your-phone/ 278216/.
-
-
-
Philip Howard, N.1
-
128
-
-
84957638462
-
-
Ibid. "If Your Government Fails, Can You Create a New One with Your Phone?" The Atlant
-
Ibid. Philip N. Howard, "If Your Government Fails, Can You Create a New One with Your Phone?" The Atlantic, July 31, 2013, accessed September 30, 2014, http://www.theatlantic.com/international/archive/2013/07/if-your -government-fails-can-you-create-a-new-one-with-your-phone/ 278216/.
-
-
-
Philip Howard, N.1
-
129
-
-
84957683306
-
-
"Can the Cellphone Help End Global Poverty?" New York Times, April 13, 2008, accessed September 30, 2014
-
Sara Corbett, "Can the Cellphone Help End Global Poverty?" New York Times, April 13, 2008, accessed September 30, 2014, http://www .nytimes.com/2008/04/13/magazine/13anthropology-t.html. ic, July 31, 2013, accessed September 30, 2014
-
-
-
Corbett, S.1
-
130
-
-
84957652235
-
-
Human Rights Watch, You Can Die Any Time: Death Squad Killings in Min-danao (New York: Human Rights Watch, April 2009), accessed Sep-tember 30, 2014 Death Squads," Wikipedia, accessed September 14, 2014
-
Human Rights Watch, You Can Die Any Time: Death Squad Killings in Min-danao (New York: Human Rights Watch, April 2009), accessed Sep-tember 30, 2014, http://www.hrw.org/sites/default/files/reports/ philippines0409webwcover_0.pdf; "Davao Death Squads," Wikipedia, accessed September 14, 2014, http://en.wikipedia.org/wiki/Davao _death_squads.
-
-
-
-
131
-
-
84957654379
-
-
"The Project on Extrajudicial Executions," accessed June 27, 2014
-
"The Project on Extrajudicial Executions," accessed June 27, 2014, http://www.extrajudicialexecutions.org/.
-
-
-
-
132
-
-
84957663852
-
-
Peter van der Windt, "From Crowdsourcing to Crowdseeding: The Cut-ting Edge of Empowerment?" in Bits and Atoms: Information and Communica-tion Technology in Areas of Limited Statehood (New York: Oxford University Press
-
Peter van der Windt, "From Crowdsourcing to Crowdseeding: The Cut-ting Edge of Empowerment?" in Bits and Atoms: Information and Communica-tion Technology in Areas of Limited Statehood, ed. Steven Livingston and Gregor Walter-Drop (New York: Oxford University Press, 2013), 144-56.
-
(2013)
, pp. 144-156
-
-
Steven, L.1
Gregor, W.2
-
133
-
-
84957618469
-
Communities at Risk: Targeted digital threats against civil society
-
November 11, 2014, accessed January 4, 2015
-
"Communities at Risk: Targeted Digital Threats Against Civil Society," Citizen Lab, November 11, 2014, accessed January 4, 2015, https:// citizenlab.org/2014/11/civil-society-organizations-face-onslaught -persistent-computer-espionage-attacks/.
-
Citizen Lab
-
-
-
134
-
-
84957692091
-
-
Computational Propaganda, accessed January 4, 2015
-
Computational Propaganda, accessed January 4, 2015, http://political bots.org/.
-
-
-
-
135
-
-
84957704598
-
-
The Recollections of Alexis de Tocqueville, trans. Alexan-der Teixeira de Mattos (n.p.: Project Gutenberg, 2011), accessed Sep-tember 30, 2014
-
Alexis de Tocqueville, The Recollections of Alexis de Tocqueville, trans. Alexan-der Teixeira de Mattos (n.p.: Project Gutenberg, 2011), accessed Sep-tember 30, 2014, http://www.gutenberg.org/ebooks/37892.
-
-
-
de Tocqueville, A.1
-
136
-
-
84957668230
-
-
Exit-Voice Dynamics and the Collapse of East Germany: The Crisis of Leninism and the Revolution of 1989 (Durham, NC: Duke University Press, 2006)
-
Steven Pfaff, Exit-Voice Dynamics and the Collapse of East Germany: The Crisis of Leninism and the Revolution of 1989 (Durham, NC: Duke University Press, 2006).
-
-
-
Pfaff, S.1
-
137
-
-
84957684348
-
It's prime time for hackathons and other technol-ogy events
-
February 10, 2014, accessed September 30, 2014
-
Nancy Dahlberg, "It's Prime Time for Hackathons and Other Technol-ogy Events," Miami Herald, February 10, 2014, accessed September 30, 2014, http://miamiherald.typepad.com/the-starting-gate/2014/02/ miguel-chateloin-participates-in-the-hackathon-for-cuba-event-on -feb-1-at-the-lab-miami-hackathons-are-beco.html;
-
Miami Herald
-
-
Dahlberg, N.1
-
138
-
-
84967128307
-
Hack-ing for jesus: Top projects from 'code for the kingdom,' a faith-based hackathon for spiritual geeks
-
March 24, 2014, accessed September 30, 2014
-
Will Mari, "Hack-ing for Jesus: Top Projects from 'Code for the Kingdom,' a Faith-Based Hackathon for Spiritual Geeks," GeekWire, March 24, 2014, accessed September 30, 2014, http://www.geekwire.com/2014/faith-based -hackathon-meets-impact-hub/.
-
GeekWire
-
-
Mari, W.1
-
139
-
-
84957642399
-
-
Wicked Problems: Problems Worth Solving (Austin: Ac4d, 2012)
-
Jon Kolko, Wicked Problems: Problems Worth Solving (Austin: Ac4d, 2012).
-
-
-
Kolko, J.1
-
140
-
-
84966750441
-
The nsa is commandeering the internet
-
August 12, 2013, accessed September 30, 2014
-
Bruce Schneier, "The NSA Is Commandeering the Internet," The Atlantic, August 12, 2013, accessed September 30, 2014, http://www. theatlantic .com/technology/archive/2013/08/the-nsa-is-commandeering-the -internet/278572/.
-
The Atlantic
-
-
Schneier, B.1
-
141
-
-
84967128296
-
Yahya ayyash
-
accessed June 25, 2014
-
"Yahya Ayyash," Wikipedia, accessed June 25, 2014, http://en.wikipedia .org/wiki/yahya_Ayyash.
-
Wikipedia
-
-
-
142
-
-
84957633751
-
How osama bin laden was found
-
May 2, 2011, accessed September 30, 2014
-
Kat Hannaford, "How Osama Bin Laden Was Found," Gizmodo, May 2, 2011, accessed September 30, 2014, http://gizmodo.com/5797588/ how-osama-bin-laden-was-found.
-
Gizmodo
-
-
Hannaford, K.1
-
143
-
-
84957695258
-
Euromaidan
-
accessed June 30, 2014
-
"Euromaidan," Wikipedia, accessed June 30, 2014, http://en.wikipedia .org/wiki/Euromaidan.
-
Wikipedia
-
-
-
144
-
-
84957641524
-
Ominous text message sent to protesters in kiev sends chills around the internet
-
January 22, 2014, accessed September 30, 2014
-
Heather Murphy, "Ominous Text Message Sent to Protesters in Kiev Sends Chills Around the Internet," Lede, January 22, 2014, accessed September 30, 2014, http://thelede.blogs.nytimes.com/2014/01/22/ ominous-text-message-sent-to-protesters-in-kiev-sends-chills-around -the-internet/.
-
Lede
-
-
Murphy, H.1
-
145
-
-
84957687189
-
Meps condemn iran 'surveillance
-
February 11, 2010, accessed September 30, 2014
-
Jonathan Fildes, "MEPs Condemn Iran 'Surveillance,'" BBC, Febru-ary 11, 2010, accessed September 30, 2014, http://news.bbc.co.uk/2/ hi/8511035.stm.
-
BBC
-
-
Fildes, J.1
-
146
-
-
84957659850
-
Belarus: Pulling the plug
-
Xindex: The Voice of Free Expression (Budapest, HU, January 2013), ac-cessed September 30, 2014
-
Andrei Aliaksandrau and Alaksiej Lavoncyk, "Belarus: Pulling the Plug," Xindex: The Voice of Free Expression (Budapest, HU, January 2013), ac-cessed September 30, 2014, http://www.indexoncensorship.org/wp content/uploads/2013/01/IDX_Belarus_ENG_WebRes.pdf.
-
-
-
Andrei, A.1
Alaksiej, L.2
-
147
-
-
84957648211
-
Stuxnet
-
accessed June 30, 2014
-
"Stuxnet," Wikipedia, accessed June 30, 2014, http://en.wikipedia.org/ wiki/Stuxnet.
-
Wikipedia
-
-
-
148
-
-
84967265511
-
Türk genelkurmay başkanliği 27 nisan 2007 tarihli basin açiklamasi
-
accessed June 30, 2014, accessed September 30, 2014
-
"Türk Genelkurmay Başkanlğ 27 Nisan 2007 Tarihli Basn Açklamas," Wikisource, accessed June 30, 2014, accessed September 30, 2014, http://tr.wikisource.org/wiki/T%C3%BCrk_Genelkurmay_Ba%C5% 9Fkanl%C4%B1%C4%9F%C4%B1_27_Nisan_2007_tarihli_bas%C4% B1n_a%C3%A7%C4%B1klamas%C4%B1.
-
Wikisource
-
-
-
149
-
-
84957687600
-
Turkey pm erdogan defiant over twitter ban
-
March 23, 2014, accessed September 30, 2014
-
"Turkey PM Erdogan Defiant over Twitter Ban," Al Jazeera, March 23, 2014, accessed September 30, 2014, http://www.aljazeera.com/ news/middleeast/2014/03/turkey-pm-erdogan-defiant-over-twitter -ban-2014323164138586620.html.
-
Al Jazeera
-
-
-
150
-
-
84957667734
-
Proassad 'syrian electronic army' boasts of attacks on nyt, twitter, huffington post
-
August 27, 2013, accessed Septem-ber 30, 2014
-
Xeni Jardin, "Pro-Assad 'Syrian Electronic Army' Boasts of Attacks on NYT, Twitter, Huffington Post," Boing Boing, August 27, 2013, accessed Septem-ber 30, 2014, http://boingboing.net/2013/08/27/syrian- electronic -army-boa.html;
-
Boing Boing
-
-
Jardin, X.1
-
151
-
-
84957619244
-
Times site is disrupted in attack by hackers
-
August 27, 2013, ac-cessed September 30, 2014
-
Christine Haughney and Nicole Perlroth, "Times Site Is Disrupted in Attack by Hackers," New York Times, August 27, 2013, ac-cessed September 30, 2014, http://www.nytimes.com/2013/08/28/ business/media/hacking-attack-is-suspected-on-times-web-site.html.
-
New York Times
-
-
Christine, H.1
Nicole, P.2
-
152
-
-
84957706303
-
U.s. Aid implicated in abuses of power in colombia
-
August 20, 2011, accessed September 30, 2014
-
Karen Deyoung and Claudia Duque, "U.S. Aid Implicated in Abuses of Power in Colombia," Washington Post, August 20, 2011, accessed September 30, 2014, http://www.washingtonpost.com/pb/national/ national-security/us-aid-implicated-in-abuses-of-power-in-colombia/ 2011/06/21/gIQABrZpSJ_story.html.
-
Washington Post
-
-
Karen, D.1
Claudia, D.2
-
153
-
-
84957674126
-
Israeli Defense Forces Announce Major Assault on Gaza via Twitter, Live-Blog the Whole Thing
-
November 14, 2012, accessed September 30, 2014
-
Fruzsina Eördögh, "Israeli Defense Forces Announce Major Assault on Gaza via Twitter, Live-Blog the Whole Thing," Slate, November 14, 2012, accessed September 30, 2014, http://www.slate.com/blogs/future_tense/2012/11/14/idf_announces_gaza_assault_death_of_ahmed _al_jabari_via_twitter.html.
-
Slate
-
-
Fruzsina, E.1
-
154
-
-
84957665198
-
-
accessed June 27, 2014
-
Tactical Technology Collective, accessed June 27, 2014, https://www . tacticaltech.org/.
-
-
-
-
155
-
-
84957692590
-
Images Reveal Nigeria Army Abuse
-
May 1, 2013, accessed September 30, 2014
-
"Images Reveal Nigeria Army Abuse," BBC News, May 1, 2013, accessed September 30, 2014, http://www.bbc.co.uk/news/world-africa -22366016.
-
BBC News
-
-
-
156
-
-
84957666375
-
Human Rights Watch Identifies Isis Execution Sites Based on Satel-lite Images
-
June 27, 2014, accessed September 30, 2014
-
"Human Rights Watch Identifies Isis Execution Sites Based on Satel-lite Images," Guardian, June 27, 2014, accessed September 30, 2014, http://www.theguardian.com/world/video/2014/jun/27/human -rights-watch-isis-execution-sites-satellite-images-iraq-video.
-
Guardian
-
-
-
157
-
-
84957670419
-
1/2 Drone Launched by Protesters at Warsaw, Poland
-
November 18, 2011, accessed September 30, 2014
-
"1/2 Drone Launched by Protesters at Warsaw, Poland," YouTube, No-vember 18, 2011, accessed September 30, 2014, http://youtu.be/ o3OB_4BT1LA.
-
YouTube
-
-
-
158
-
-
84936943418
-
User-Generated Warfare: A Case of Converging Wartime Information Networks and Coproductive Regulation on YouTube
-
accessed September 30, 2014
-
Brittany Fiore-Silfvast, "User-Generated Warfare: A Case of Converg-ing Wartime Information Networks and Coproductive Regulation on YouTube," International Journal of Communication 6 (2012), 1965-88, ac-cessed September 30, 2014, http://ijoc.org/index.php/ijoc/article/ view/1436.
-
(2012)
International Journal of Communication
, vol.6
, pp. 1965-1988
-
-
-
159
-
-
84957670046
-
-
Tactical Technology Collective
-
Tactical Technology Collective.
-
-
-
-
160
-
-
84957702739
-
-
FrontlineSMS: FrontlineCloud, accessed June 27, 2014
-
FrontlineSMS: FrontlineCloud, accessed June 27, 2014, http://www. front linesms.com/.
-
-
-
-
161
-
-
84957617444
-
-
Mobilisation Lab, accessed June 27, 2014
-
Mobilisation Lab, accessed June 27, 2014, http://www.mobilisationlab .org/.
-
-
-
-
162
-
-
84957648108
-
-
Seeing Like a State: How Certain Schemes to Improve the Human Condition Have Failed (New Haven: Yale University Press, 1998)
-
James C. Scott, Seeing Like a State: How Certain Schemes to Improve the Human Condition Have Failed (New Haven: Yale University Press, 1998).
-
-
-
James Scott, C.1
-
163
-
-
84859294329
-
Clicks, Cabs, and Coffee Houses: Social Media and Oppositional Movements in Egypt, 2004-2011
-
April 1
-
Merlyna Lim, "Clicks, Cabs, and Coffee Houses: Social Media and Oppositional Movements in Egypt, 2004-2011," Journal of Communication 62, no. 2 (April 1, 2012): 231-48, doi:10.1111/j.1460-2466.2012.01628.x; Zeynep Tufekci and Christopher Wilson, "Social Media and the Decision to Participate in Political Protest: Observations From Tahrir Square," Journal of Communication 62, no. 2 (April 1, 2012): 363-79, doi:10. / j.1460-2466.2012.01629.x.
-
(2012)
Journal of Communication
, vol.62
, Issue.2
, pp. 231-248
-
-
Lim, M.1
-
164
-
-
84859309799
-
Social Media and the Decision to Participate in Political Protest: Observations From Tahrir Square
-
April 1
-
Zeynep Tufekci and Christopher Wilson, "Social Media and the Decision to Participate in Political Protest: Observations From Tahrir Square," Journal of Communication 62, no. 2 (April 1, 2012): 363-79, doi:10. / j.1460-2466.2012.01629.x.
-
(2012)
Journal of Communication
, vol.62
, Issue.2
, pp. 363-379
-
-
Zeynep, T.1
Christopher, W.2
-
165
-
-
84859329689
-
A Field Experiment on the Internet's Effect in an African Election: Savvier Citizens, Disaffected Voters, or Both?
-
April 1
-
Catie Snow Bailard, "A Field Experiment on the Internet's Effect in an African Election: Savvier Citizens, Disaffected Voters, or Both?" Journal of Communication 62, no. 2 (April 1, 2012): 330-44, doi:10.1111/j.1460 -2466.2012.01632.x.
-
(2012)
Journal of Communication
, vol.62
, Issue.2
, pp. 330-344
-
-
-
166
-
-
84859328881
-
Safety Valve or Pressure Cooker? Blogs in Chinese Political Life
-
April 1
-
Jonathan Hassid, "Safety Valve or Pressure Cooker? Blogs in Chinese Political Life," Journal of Communication 62, no. 2 (April 1, 2012): 212-30, doi:10.1111/j.1460-2466.2012.01634.x;
-
(2012)
Journal of Communication
, vol.62
, Issue.2
, pp. 212-230
-
-
Hassid, J.1
-
167
-
-
84859304568
-
The Social Media Basis of Youth Protest Behavior: The Case of Chile
-
April 1
-
Sebastián Valenzuela, Arturo Arriagada, and Andrés Scherman, "The Social Media Basis of Youth Protest Behavior: The Case of Chile," Journal of Communication 62, no. 2 (April 1, 2012): 299-314, doi:10.1111/j.1460-2466.2012.01635.x.
-
(2012)
Journal of Communication
, vol.62
, Issue.2
, pp. 299-314
-
-
Sebastián, V.1
Arturo, A.2
Andrés, S.3
-
168
-
-
77649094008
-
Nigeria: Hints of a New Chapter
-
November 12, 2009, accessed September 14, 2014
-
"Nigeria: Hints of a New Chapter," Economist, November 12, 2009, accessed September 14, 2014, http://www.economist.com/node/ 14843563.
-
Economist
-
-
-
169
-
-
34547693006
-
The Digital Provide: Information (Technology), Mar-ket Performance, and Welfare in the South Indian Fisheries Sector
-
August 1
-
Robert Jensen, "The Digital Provide: Information (Technology), Mar-ket Performance, and Welfare in the South Indian Fisheries Sector," Quarterly Journal of Economics 122, no. 3 (August 1, 2007): 879-924, doi:10.1162/qjec.122.3.879;
-
(2007)
Quarterly Journal of Economics
, vol.122
, Issue.3
, pp. 879-924
-
-
Jensen, R.1
-
170
-
-
84957641433
-
-
formation, Direct Access to Farmers, and Rural Market Performance in Central India (Rochester, NY: World Bank, May 2010), accessed September 30, 2014
-
Aparajita Goyal, Information, Direct Access to Farmers, and Rural Market Performance in Central India (Rochester, NY: World Bank, May 2010), accessed September 30, 2014, http://papers.ssrn .com/abstract=1613083.
-
-
-
Goyal, A.1
-
171
-
-
84957696877
-
-
Beth Simone Noveck, Wiki Government: How Technology Can Make Govern-ment Better, Democracy Stronger, and Citizens More Powerful (Washington, DC: Brookings Institution Press, 2010).
-
Beth Simone Noveck, Wiki Government: How Technology Can Make Govern-ment Better, Democracy Stronger, and Citizens More Powerful (Washington, DC: Brookings Institution Press, 2010).
-
-
-
-
172
-
-
84957629844
-
an Iranian Image, a Missile Too Many
-
July 10, 2008
-
Mike Nizza and Patrick Lyon, "In an Iranian Image, a Missile Too Many," Lede, July 10, 2008, http://thelede.blogs.nytimes.com/2008/07/10/ in-an-iranian-image-a-missile-too-many/.
-
Lede
-
-
Mike, N.1
Patrick, L.2
-
173
-
-
84957663731
-
Tiananmen Effect: 'Big Yellow Duck' a Banned Term
-
June 4, 2013, accessed September 30, 2014
-
Josh Chin, "Tiananmen Effect: 'Big Yellow Duck' a Banned Term," China Real Time Report, June 4, 2013, accessed September 30, 2014, http://blogs.wsj.com/chinarealtime/2013/06/04/tiananmen-effect -big-yellow-duck-a-banned-term/.
-
China Real Time Report
-
-
Chin, J.1
-
174
-
-
84957693290
-
-
Of Revelation and Revolution, vol. 1, Christianity, Colonialism, and Consciousness in South Africa (Chicago: University of Chicago Press, 1991).
-
Jean Comaroff and John L. Comaroff, Of Revelation and Revolution, vol. 1, Christianity, Colonialism, and Consciousness in South Africa (Chicago: University of Chicago Press, 1991).
-
-
-
Jean, C.1
John Comaroff, L.2
-
175
-
-
84957641389
-
-
Communication Power (Oxford: Oxford University Press, 2011)
-
Manuel Castells, Communication Power (Oxford: Oxford University Press, 2011).
-
-
-
Castells, M.1
-
176
-
-
84957611225
-
-
Startup Rising: The Entrepreneurial Revolution Remaking the Middle East (New York: Palgrave Macmillan, 2013)
-
Christopher M. Schroeder, Startup Rising: The Entrepreneurial Revolution Remaking the Middle East (New York: Palgrave Macmillan, 2013).
-
-
-
Christopher Schroeder, M.1
-
177
-
-
84922956023
-
-
Media Commercialization and Authoritarian Rule in China (New York: Cambridge University Press, 2013)
-
Daniela Stockmann, Media Commercialization and Authoritarian Rule in China (New York: Cambridge University Press, 2013).
-
-
-
Stockmann, D.1
-
178
-
-
77955949357
-
New Political Tool: Text Messaging
-
June 30, 2005, accessed September 14, 2014
-
Cathy Hong, "New Political Tool: Text Messaging," Christian Science Monitor, June 30, 2005, accessed September 14, 2014, http://www .csmonitor.com/2005/0630/p13s01-stct.html.
-
Christian Science Monitor
-
-
Hong, C.1
-
179
-
-
84957644671
-
New Political Tool: Text Messaging
-
June 30, 2005, accessed September 30, 2014
-
Cathy Hong, "New Political Tool: Text Messaging," USA Today, June 30, 2005, accessed September 30, 2014, http://usatoday30.usatoday.com/ tech/news/2005-06-30-politics-text-tool_x.htm.
-
USA Today
-
-
Hong, C.1
-
180
-
-
84957628808
-
-
Does Social Media Make a Difference in Political Campaigns? Digital Dividends in Brazil's 2010 National Elections (Se-attle: Center for Communication and Civic Engagement, June 2013), accessed September 30, 2014
-
Jason Gilmore and Philip N. Howard, Does Social Media Make a Difference in Political Campaigns? Digital Dividends in Brazil's 2010 National Elections (Se-attle: Center for Communication and Civic Engagement, June 2013), accessed September 30, 2014, http://papers.ssrn.com/sol3/papers. cfm?abstract_id=2273832;
-
-
-
Jason, G.1
Philip Howard, N.2
-
181
-
-
84957615692
-
-
eds., Sociological Perspectives (Thousand Oaks, CA: Sage, n.d.)
-
James Elliot, Robert O'Brien, and Jean Stockard, eds., Sociological Perspectives (Thousand Oaks, CA: Sage, n.d.).
-
-
-
James, E.1
O'Brien, R.2
Jean, S.3
-
182
-
-
84957702051
-
More Tweets, More Votes-It Works for Google Searches, Too!
-
February 14, 2014, accessed September 30, 2014
-
Fabio Rojas, "More Tweets, More Votes-It Works for Google Searches, Too!" Orgtheory.net, February 14, 2014, accessed September 30, 2014, http://orgtheory.wordpress.com/2014/02/14/more-tweets-more -votes-it-works-for-google-searches-too/.
-
Orgtheory.net
-
-
Rojas, F.1
-
183
-
-
84957647325
-
The Internet Has Become the Main Battlefield of Ideo-logical Struggle
-
October 15
-
Liu Yazhou, "The Internet Has Become the Main Battlefield of Ideo-logical Struggle," China Scope, no. 66 (October 15, 2013): 32;
-
(2013)
China Scope
, vol.66
, pp. 32
-
-
Yazhou, L.1
-
184
-
-
84920475052
-
China Must Reform or Die
-
August 12, 2010, accessed September 30, 2014
-
John Garnaut, "China Must Reform or Die," Sydney Morning Herald, August 12, 2010, accessed September 30, 2014, http://www.smh.com.au/world/ china-must-reform-or-die-20100811-11zxd.html.
-
Sydney Morning Herald
-
-
Garnaut, J.1
-
185
-
-
84856920252
-
-
"A Dangerous Year," Economist, January 28, 2012, accessed Septem-ber 30, 2014
-
"A Dangerous Year," Economist, January 28, 2012, accessed Septem-ber 30, 2014, http://www.economist.com/node/21543477.
-
-
-
-
186
-
-
34250017093
-
Howard and Adrienne Massanari, "Learning to Search and Searching to Learn: Income, Education, and Experience Online," Journal of Computer-Mediated Communication
-
Philip N. Howard and Adrienne Massanari, "Learning to Search and Searching to Learn: Income, Education, and Experience Online," Journal of Computer-Mediated Communication 12, no. 3 (April 1, 2007): 846-65, doi:10.1111/j.1083-6101.2007.00353.x.
-
(2007)
, vol.12
, Issue.3
, pp. 846-865
-
-
Philip, N.1
-
187
-
-
79957935781
-
formation Technolo-gies and Omnivorous News Diets over Three U.S. Presidential Elections
-
Adrienne L. Massanari and Philip N. Howard, "Information Technolo-gies and Omnivorous News Diets over Three U.S. Presidential Elections," Journal of Information Technology & Politics 8, no. 2 (2011): 177-98, doi: 10.1080/19331681.2011.541702.
-
(2011)
Journal of Information Technology & Politics
, vol.8
, Issue.2
, pp. 177-198
-
-
Adrienne Massanari, L.1
Philip Howard, N.2
-
188
-
-
84951029013
-
Society Online: The Internet in Context
-
Thousand Oaks, CA: Sage
-
Philip N. Howard and Steve Jones, Society Online: The Internet in Context (Thousand Oaks, CA: Sage, 2004).
-
(2004)
-
-
Philip Howard, N.1
Steve, J.2
-
189
-
-
84881262309
-
Social Infiuence Bias: A Randomized Experiment
-
Lev Muchnik, Sinan Aral, and Sean J. Taylor, "Social Infiuence Bias: A Randomized Experiment," Science 341, no. 6146 (2013): 647-51, doi:10.1126/science.1240466.
-
(2013)
Science
, vol.341
, Issue.6146
, pp. 647-651
-
-
Lev, M.1
Sinan, A.2
Sean Taylor, J.3
-
190
-
-
84957658444
-
Ex-Neo-Nazis, Ex-Terrorists Get Social Network
-
accessed September 30, 2014
-
Nic Halverson, "Ex-Neo-Nazis, Ex-Terrorists Get Social Network," Dis-covery News, April 26, 2012, accessed September 30, 2014, http://news .discovery.com/tech/against-violent-extremism-120426.htm.
-
(2012)
Dis-covery News
-
-
Halverson, N.1
-
191
-
-
84944736584
-
-
"Quilliam Foundation," accessed June 27, 2014, http://www . quilliamfoundation.org/.
-
(2014)
accessed
-
-
-
192
-
-
84872686609
-
Jane Vincent, Migration, Diaspora, and Information Technology in Global Societies
-
New York: Routledge
-
Leopoldina Fotunati, Raul Pertierra, and Jane Vincent, Migration, Diaspora, and Information Technology in Global Societies (New York: Routledge, 2012).
-
(2012)
-
-
Leopoldina, F.1
Raul, P.2
-
193
-
-
84957707480
-
Stingray Tracking Devices: Who's Got Them
-
accessed June 23
-
"Stingray Tracking Devices: Who's Got Them?" American Civil Liberties Union, accessed June 23, 2014, https://www.aclu.org/maps/stingray -tracking-devices-whos-got-them.
-
(2014)
American Civil Liberties Union
-
-
-
194
-
-
84957653813
-
Spy Agencies, Prime Minister's Adviser Defend Wi-Fi Data Collection
-
February 3, 2014, accessed September 30
-
Laura Payton, "Spy Agencies, Prime Minister's Adviser Defend Wi-Fi Data Collection," CBC News, February 3, 2014, accessed September 30, 2014, http://www.cbc.ca/1.2521166.
-
(2014)
CBC News
-
-
Payton, L.1
-
195
-
-
84957690923
-
Google Transparency Report
-
Google, Google Transparency Report, accessed September 30, 2014, http:// www.google.com/transparencyreport/.
-
(2014)
accessed September
-
-
-
196
-
-
84957705045
-
A Threat to the Entire Country
-
September 29, 2012, accessed September 30, 2014
-
"A Threat to the Entire Country," Economist, September 29, 2012, accessed September 30, 2014, http://www.economist.com/node/21563751.
-
Economist
-
-
-
197
-
-
84957666896
-
Khaled Said's Killing Draws 7-Year Sentences for 2 Offi-cers
-
New York Times, October 26, 2011, accessed September 30, 2014
-
Heba Afify, "Khaled Said's Killing Draws 7-Year Sentences for 2 Offi-cers," New York Times, October 26, 2011, accessed September 30, 2014, http://www.nytimes.com/2011/10/27/world/middleeast/khaled -saids-killing-draws-7-year-sentences-for-2-officers.html.
-
-
-
Afify, H.1
-
198
-
-
84967035769
-
Death of Neda Agha-Soltan
-
accessed June 26, 2014
-
"Death of Neda Agha-Soltan," Wikipedia, accessed June 26, 2014, http://en.wikipedia.org/wiki/Death_of_Neda_Agha-Soltan.
-
Wikipedia
-
-
-
199
-
-
84957707452
-
Video of Tortured Boy's Corpse Deepens Anger in Syria
-
New York Times, May 30, 2011, accessed September 30, 2014
-
Liam Stack, "Video of Tortured Boy's Corpse Deepens Anger in Syria," New York Times, May 30, 2011, accessed September 30, 2014, http:// www.nytimes.com/2011/05/31/world/middleeast/31syria.html.
-
-
-
Stack, L.1
-
200
-
-
84957691374
-
-
The Logic of Collective Action: Public Goods and the Theory of Groups (Cambridge: Harvard University Press, 2009)
-
Mancur Olson, The Logic of Collective Action: Public Goods and the Theory of Groups (Cambridge: Harvard University Press, 2009).
-
-
-
Olson, M.1
-
201
-
-
84957617918
-
-
Rewire: Digital Cosmopolitans in the Age of Connection (New York: Norton, 2013)
-
Ethan Zuckerman, Rewire: Digital Cosmopolitans in the Age of Connection (New York: Norton, 2013).
-
-
-
Zuckerman, E.1
-
202
-
-
84957622389
-
-
The Logic of Connective Action: Digital Media and the Personalization of Contentious Politics (New York: Cam-bridge University Press, 2014)
-
W. Lance Bennett and Alexandra Segerberg, The Logic of Connective Action: Digital Media and the Personalization of Contentious Politics (New York: Cam-bridge University Press, 2014).
-
-
-
Lance Bennett, W.1
Alexandra, S.2
-
203
-
-
84957710048
-
DeadUshahidi: Neither Dead Right nor Dead Wrong
-
July 5, 2012
-
"DeadUshahidi: Neither Dead Right nor Dead Wrong," iRevolution, July 5, 2012, http://irevolution.net/2012/07/05/deadushahidi/.
-
iRevolution
-
-
-
204
-
-
84957688305
-
-
Digital Activism and Non-Violent Confiict (Seattle: Digital Activism Research Project, No-vember 2013), accessed September 30, 2014
-
F. Edwards, Philip N. Howard, and Mary Joyce, Digital Activism and Non-Violent Confiict (Seattle: Digital Activism Research Project, No-vember 2013), accessed September 30, 2014, http://digital-activism .org/2013/11/report-on-digital-activism-and-non-violent-confiict/.
-
-
-
Edwards, F.1
Philip Howard, N.2
Mary, J.3
-
205
-
-
84896056107
-
The Parable of Google Flu: Traps in Big Data Analy-sis
-
David M. Lazer et al., "The Parable of Google Flu: Traps in Big Data Analy-sis," Science 343, no. 6176 (2014): 1203-5, doi:10.1126/science.1248506.
-
(2014)
Science
, vol.343
, Issue.6176
, pp. 1203-1205
-
-
David Lazer, M.1
-
206
-
-
84957681233
-
Federal Reserve Banks Announce New Study to Exam-ine Nation's Payments Usage
-
(Washington, DC: Federal Reserve Fi-nancial Services Policy Committee, January 17, 2013), accessed Sep-tember 30, 2014
-
June Gates, "Federal Reserve Banks Announce New Study to Exam-ine Nation's Payments Usage" (Washington, DC: Federal Reserve Fi-nancial Services Policy Committee, January 17, 2013), accessed Sep-tember 30, 2014, http://www.federalreserve.gov/newsevents/press/ other/20130117a.htm.
-
-
-
Gates, J.1
-
207
-
-
84926097400
-
-
New Media Campaigns and the Managed Citizen (New York: Cambridge University Press, 2005)
-
Philip N. Howard, New Media Campaigns and the Managed Citizen (New York: Cambridge University Press, 2005).
-
-
-
Philip Howard, N.1
-
208
-
-
84957669887
-
Premise
-
June 30, 2014
-
Premise, accessed June 30, 2014, http://www.premise.com/.
-
accessed
-
-
-
209
-
-
84957704563
-
M-Paisa: Ending Afghan Corruption, One Text at a Time
-
October 17, 2010, accessed September 30, 2014
-
Monty Munford, "M-Paisa: Ending Afghan Corruption, One Text at a Time," TechCrunch, October 17, 2010, accessed September 30, 2014, http:// techcrunch.com/2010/10/17/m-paisa-ending-afghan-corruption-one -text-at-a-time/.
-
TechCrunch
-
-
Munford, M.1
-
210
-
-
84957673369
-
Warmed-up Numbers
-
June 23, 2012, accessed Septem-ber 30, 2014
-
"Warmed-up Numbers," Economist, June 23, 2012, accessed Septem-ber 30, 2014, http://www.economist.com/node/21557366#.
-
Economist
-
-
-
211
-
-
84957694909
-
Betting on Syria's Assad Staying in Power
-
February 10, 2012, accessed September 30, 2014
-
Bernd Debusmann, "Betting on Syria's Assad Staying in Power," Reuters, February 10, 2012, accessed September 30, 2014, http://in.reuters.com/ article/2012/02/10/column-debusmann-idINDEE8190FA20120210;
-
Reuters
-
-
Debusmann, B.1
-
212
-
-
84860241808
-
What Makes Heroic Strife
-
April 21, 2012, accessed Septem-ber 30, 2014
-
"What Makes Heroic Strife," Economist, April 21, 2012, accessed Septem-ber 30, 2014, http://www.economist.com/node/21553006.
-
Economist
-
-
-
213
-
-
84957682693
-
-
For more on the empires of contemporary media, see Tim Wu, The Master Switch: The Rise and Fall of Information Empires (New York: Vintage, 2010)
-
For more on the empires of contemporary media, see Tim Wu, The Master Switch: The Rise and Fall of Information Empires (New York: Vintage, 2010).
-
-
-
-
214
-
-
84957667549
-
The Internet Economy in the G-20
-
2012, accessed September 30, 2014
-
Boston Consulting Group, The Internet Economy in the G-20, 2012, accessed September 30, 2014, http://www.bcg.com/documents/file100409.pdf.
-
-
-
-
215
-
-
84957609169
-
IPv6
-
accessed June 30, 2014
-
"IPv6," Wikipedia, accessed June 30, 2014, http://en.wikipedia.org/ wiki/IPv6.
-
Wikipedia
-
-
-
216
-
-
84957664866
-
State Enemies Archive-The Enemies of Internet
-
The Enemies of the Internet: Reporters Without Borders, 2012, accessed September 30, 2014
-
"State Enemies Archive-The Enemies of Internet," The Enemies of the Internet: Reporters Without Borders, 2012, accessed September 30, 2014, http://surveillance.rsf.org/en/category/state-enemies/.
-
-
-
-
217
-
-
84957641510
-
Reporters Without Borders: For the First Time, America Is an Enemy of the Internet
-
Washington Post, March 14, 2014, accessed September 30, 2014
-
Brian Fung, "Reporters Without Borders: For the First Time, America Is an Enemy of the Internet," Washington Post, March 14, 2014, accessed September 30, 2014, http://www.washingtonpost.com/blogs/the -switch/wp/2014/03/14/reporters-without-borders-for-the-first -time-america-is-an-enemy-of-the-internet/.
-
-
-
Fung, B.1
-
218
-
-
34347359691
-
-
May 24, 2007, accessed September 30, 2014
-
"Greatest Hits," Economist, May 24, 2007, accessed September 30, 2014, http://www.economist.com/node/9228794.
-
Economist
-
-
-
219
-
-
84957613497
-
-
Saudi Arabia, Report (Washington, DC: Depart-ment 0f State, Office of Website Management, Bureau of Public Affairs, June 2012), accessed September 30, 2014
-
U.S. Department of State, Saudi Arabia, Report (Washington, DC: Depart-ment 0f State, Office of Website Management, Bureau of Public Affairs, June 2012), accessed September 30, 2014, http://www.state.gov/e/ eb/rls/othr/ics/2012/191229.htm.
-
-
-
-
220
-
-
84957677211
-
Mobile Payments Go Viral: M-Pesa in Kenya
-
Yes Africa Can: Stories from a Dynamic Continent (Washington, DC: World Bank, Janu-ary 2013), accessed September 30, 2014
-
World Bank, "Mobile Payments Go Viral: M-Pesa in Kenya," Yes Africa Can: Stories from a Dynamic Continent (Washington, DC: World Bank, Janu-ary 2013), accessed September 30, 2014, http://web.worldbank.org/
-
-
-
-
221
-
-
84957690240
-
Airtime-Cellphone Banking-FNB
-
accessed June 30, 2014
-
"Airtime-Cellphone Banking-FNB," accessed June 30, 2014, https:// www.fnb.co.za/ways-to-bank/airtime.html.
-
-
-
-
222
-
-
84957671182
-
-
accessed June 30, 2014
-
"iHub," accessed June 30, 2014, http://www.ihub.co.ke/research.
-
-
-
-
223
-
-
84957667340
-
-
Economist, November 10, 2012, accessed Septem-ber 30, 2014
-
"Vital for the Poor," Economist, November 10, 2012, accessed Septem-ber 30, 2014, http://www.economist.com/news/middle-east-and -africa/21566022-report-describes-sacrifices-poor-make-keep-mobile -phone-vital.
-
-
-
-
224
-
-
84957643423
-
Mobile Usage at the Base of the Pyramid in Kenya
-
foDev: Growing Innovation (Washington, DC: World Bank, Decem-ber 2012), accessed September 30, 2014
-
World Bank, "Mobile Usage at the Base of the Pyramid in Kenya," infoDev: Growing Innovation (Washington, DC: World Bank, Decem-ber 2012), accessed September 30, 2014, http://www.infodev.org/ infodev-files/final_kenya_bop_study_web_jan_02_2013_0.pdf.
-
-
-
-
225
-
-
84957609096
-
-
accessed June 20, 2014
-
"Map Kibera," accessed June 20, 2014, http://mapkibera.org/.
-
-
-
-
226
-
-
84957718543
-
10 Twitter Bot Services to Simplify Your Life
-
October 23, 2011, accessed September 30, 2014
-
David Daw, "10 Twitter Bot Services to Simplify Your Life," TechHive, October 23, 2011, accessed September 30, 2014, http://www.techhive .com/article/242338/10_twitter_bot_services_to_simplify_your_life .html.
-
TechHive
-
-
Daw, D.1
-
227
-
-
84957704845
-
Open Government Initiatives Helped New Yorkers Stay Connected During Hurricane Sandy
-
January 11, 2013, ac-cessed September 30, 2014
-
Rachel Haot, "Open Government Initiatives Helped New Yorkers Stay Connected During Hurricane Sandy," TechCrunch, January 11, 2013, ac-cessed September 30, 2014, http://techcrunch.com/2013/01/11/ data-and-digital-saved-lives-in-nyc-during-hurricane-sandy/.
-
TechCrunch
-
-
Haot, R.1
-
228
-
-
84957635824
-
-
The Clash of Civilizations and the Remaking of World Order (New York: Simon and Schuster, 2011)
-
Samuel P. Huntington, The Clash of Civilizations and the Remaking of World Order (New York: Simon and Schuster, 2011).
-
-
-
Samuel Huntington, P.1
-
229
-
-
84957666679
-
-
accessed June 30, 2014
-
"Global Voices," accessed June 30, 2014, http://globalvoicesonline .org.
-
-
-
-
230
-
-
33645758831
-
Declaration of Independence of Cyberspace
-
1996, accessed September 30, 201
-
John Perry Barlows, "Declaration of Independence of Cyberspace," 1996, accessed September 30, 2014, http://wac.colostate.edu/rhetnet/ barlow/barlow_declaration.html;
-
-
-
Barlows, J.P.1
-
231
-
-
84957712325
-
-
"Internet Free-dom: The Prepared Text of Secretary of State Hillary Rodham Clinton's Speech, Delivered at the Newseum in Washington, DC," Foreign Policy, January 21, 2010, accessed September 30, 2014
-
Hillary Clinton, "Internet Free-dom: The Prepared Text of Secretary of State Hillary Rodham Clinton's Speech, Delivered at the Newseum in Washington, DC," Foreign Policy, January 21, 2010, accessed September 30, 2014, http://www.foreign policy.com/articles/2010/01/21/internet_freedom.
-
-
-
Clinton, H.1
-
232
-
-
84957648170
-
-
accessed June 30, 2014
-
"Aga Khan Development Network," accessed June 30, 2014, http:// www.akdn.org/.
-
-
-
-
233
-
-
84957648423
-
-
accessed June 30, 2014 "Cen-tre for Applied Nonviolent Action and Strategies," Wikipedia, accessed June 6, 2014
-
"Telecomix," accessed June 30, 2014, http://telecomix.org/; "Cen-tre for Applied Nonviolent Action and Strategies," Wikipedia, accessed June 6, 2014, http://en.wikipedia.org/wiki/Centre_for_Applied _Nonviolent_Action_and_Strategies.
-
-
-
-
234
-
-
84957693570
-
-
accessed June 30, 2014 Gigi Ibrahim, "Piggiepedia," Tahrir and Beyond, July 5, 2011, accessed September 30, 2014
-
"Nawaat," accessed June 30, 2014, http://nawaat.org/portail/; Gigi Ibrahim, "Piggiepedia," Tahrir and Beyond, July 5, 2011, accessed September 30, 2014, http://theangryegyptian.wordpress.com/category/piggiepedia/.
-
-
-
-
236
-
-
84957646642
-
Access: Mobilizing for Global Digital Freedom
-
accessed June 30, 2014
-
"Access: Mobilizing for Global Digital Freedom," accessed June 30, 2014, https://www.accessnow.org/.
-
-
-
-
237
-
-
84957691385
-
-
accessed June 30, 2014
-
"Pirate Party International," accessed June 30, 2014, http://www .pp-international.net/.
-
-
-
-
238
-
-
84967305996
-
Higgins on Social Media and Syria
-
accessed June 30, 2014
-
CBC News, "Higgins on Social Media and Syria," accessed June 30, 2014, http://podcast.cbc.ca/mp3/podcasts/current_20131216_73168 .mp3.
-
-
-
-
239
-
-
84957706525
-
-
accessed June 30, 2014
-
"Uchaguzi," accessed June 30, 2014, https://uchaguzi.co.ke/.
-
-
-
-
240
-
-
84957690796
-
-
Steven Livingston, Africa's Information Revolution: Implications for Crime, Polic-ing, and Citizen Security (Washington, DC: Africa Center for Strategic Stud-ies, November 2013), accessed September 30, 2014
-
Steven Livingston, Africa's Information Revolution: Implications for Crime, Polic-ing, and Citizen Security (Washington, DC: Africa Center for Strategic Stud-ies, November 2013), accessed September 30, 2014, http://oai.dtic .mil/oai/oai?verb=getRecord&metadataPrefix=html&identifier=AD A588374.
-
-
-
-
241
-
-
84957704762
-
-
accessed June 30, 2014
-
"India Kanoon," accessed June 30, 2014, http://www.indiankanoon .org/about.html.
-
-
-
-
242
-
-
84957636427
-
-
accessed June 27, 2014
-
"LizaAlert," accessed June 27, 2014, http://lizaalert.org/.
-
-
-
-
243
-
-
84957708182
-
Holoda Rynda
-
accessed June 30, 2014 "Rynda," accessed June 30, 2014
-
"Holoda Rynda," accessed June 30, 2014, http://holoda.rynda.org/; "Rynda," accessed June 30, 2014, http://rynda.org/.
-
-
-
-
244
-
-
84957637527
-
Not in My Country
-
accessed June 30, 2014
-
"Not in My Country," accessed June 30, 2014, https://www.notinmy country.org/.
-
-
-
-
245
-
-
84957632775
-
I Paid a Bribe
-
accessed June 30, 2014
-
"I Paid a Bribe," accessed June 30, 2014, http://www.ipaidabribe .com/#gsc.tab=0; "I Paid a Bribe: Kenya," accessed June 30, 2014, http://ipaidabribe.or.ke/;
-
-
-
-
246
-
-
84957708947
-
Kenya
-
accessed June 30, 2014
-
"enya," accessed June 30, 2014, http://ipaidabribe.or.ke/;
-
-
-
-
247
-
-
84957628133
-
I Paid a Bribe: Pakistan
-
accessed June 30, 2014
-
"I Paid a Bribe: Pakistan," accessed June 30, 2014, http://www.ipaidbribe.pk/.
-
-
-
-
248
-
-
84957670108
-
-
accessed June 30, 2014
-
"Kiirti," accessed June 30, 2014, http://www.kiirti.org/static/view/ whatiskiirti.
-
-
-
-
249
-
-
84859309799
-
Social Media and the De-cision to Participate in Political Protest: Observations from Tahrir Square
-
Zeynep Tufekci and Christopher Wilson, "Social Media and the De-cision to Participate in Political Protest: Observations from Tahrir Square," Journal of Communication 62, no. 2 (April 1, 2012): 363-79, doi: 10.1111/j.1460-2466.2012.01629.x.
-
(2012)
Journal of Communication
, vol.62
, Issue.2
-
-
-
250
-
-
84957629350
-
-
When the Press Fails: Political Power and the News Media from Iraq to Katrina (Chicago: University of Chicago Press, 2008)
-
W. Lance Bennett, Regina G. Lawrence, and Steven Livingston, When the Press Fails: Political Power and the News Media from Iraq to Katrina (Chicago: University of Chicago Press, 2008).
-
-
-
Lance Bennett, W.1
Regina Lawrence, G.2
Steven, L.3
-
251
-
-
84957686998
-
Safecast
-
accessed June 30, 2014
-
"Safecast," accessed June 30, 2014, http://blog.safecast.org/.
-
-
-
-
252
-
-
84966789496
-
Google Takes on the Drug Cartels
-
July 19, 2012, ac-cessed September 30, 2014
-
John Sutter, "Google Takes on the Drug Cartels," CNN, July 19, 2012, ac-cessed September 30, 2014, http://www.cnn.com/2012/07/19/tech/ web/google-ideas-crime/index.html.
-
CNN
-
-
Sutter, J.1
-
253
-
-
84957645877
-
-
Social Physics: How Good Ideas Spread-The Lessons from a New Science (New York: Penguin, 2014)
-
Alex Pentland, Social Physics: How Good Ideas Spread-The Lessons from a New Science (New York: Penguin, 2014).
-
-
-
Pentland, A.1
-
254
-
-
84861974217
-
Critical Questions for Big Data: Prov-ocations for a Cultural, Technological, and Scholarly Phenomenon
-
Communication, and Society
-
danah boyd and Kate Crawford, "Critical Questions for Big Data: Prov-ocations for a Cultural, Technological, and Scholarly Phenomenon," Information, Communication, and Society 15, no. 5 (2012): 662-79, doi:0.10 80/1369118X.2012.678878.
-
(2012)
Information
, vol.15
, Issue.5
, pp. 662-679
-
-
Danah, B.1
Kate, C.2
-
255
-
-
84957709025
-
-
Anonymity, Privacy, and Security Online, Internet Project (Washington, DC: Pew Research, September 2013), accessed Septem-ber 30, 2014
-
Lee Rainie et al., Anonymity, Privacy, and Security Online, Internet Project (Washington, DC: Pew Research, September 2013), accessed Septem-ber 30, 2014, http://www.pewinternet.org/2013/09/05/anonymity -privacy-and-security-online/.
-
-
-
Lee, R.1
-
256
-
-
84957609437
-
-
Black Code: Inside the Battle for Cyberspace (Toronto: Sig-nal, 2013)
-
Ronald J. Deibert, Black Code: Inside the Battle for Cyberspace (Toronto: Sig-nal, 2013).
-
-
-
Ronald Deibert, J.1
-
257
-
-
84957614725
-
-
Learning from SARS: Preparing for the Next Disease Out-break: Workshop Summary (Washington, DC: National Academies Press, January 2004), accessed September 30, 2014
-
Stacey Knobler et al., Learning from SARS: Preparing for the Next Disease Out-break: Workshop Summary (Washington, DC: National Academies Press, January 2004), accessed September 30, 2014, http://www.nap.edu/ openbook.php?record_id=10915.
-
-
-
Stacey, K.1
-
258
-
-
84957610332
-
Stupid Data Miner Tricks: How Quants Fool Them-selves and the Economic Indicator in Your Pants
-
July 24, 2012, accessed September 30, 2014
-
David Leinweber, "Stupid Data Miner Tricks: How Quants Fool Them-selves and the Economic Indicator in Your Pants," Forbes, July 24, 2012, accessed September 30, 2014, http://www.forbes.com/sites/ davidleinweber/2012/07/24/stupid-data-miner-tricks-quants-fooling -themselves-the-economic-indicator-in-your-pants/.
-
Forbes
-
-
Leinweber, D.1
-
259
-
-
84957698363
-
Fiber-Optic Cable Benefiting Only Cuban Govern-ment
-
May 26, 2012, accessed September 30, 2014
-
Juan O. Tamayo, "Fiber-Optic Cable Benefiting Only Cuban Govern-ment," Miami Herald, May 26, 2012, accessed September 30, 2014, http://www.miamiherald.com/2012/05/25/2817534/fiber-optic -cable-benefiting-only.html.
-
Miami Herald
-
-
Juan Tamayo, O.1
-
260
-
-
84957713936
-
U.S.-Style Personal Data Gathering Is Spreading World-wide
-
October 16, 2013, accessed September 30, 2014
-
Adam Tanner, "U.S.-Style Personal Data Gathering Is Spreading World-wide," Forbes, October 16, 2013, accessed September 30, 2014, http:// www.forbes.com/sites/adamtanner/2013/10/16/u-s-style-personal -data-gathering-spreading-worldwide/.
-
Forbes
-
-
Tanner, A.1
-
261
-
-
84957638367
-
Police Warn over Drugs Cyber-Attack
-
Oc-tober 16, 2013, accessed September 30, 2014
-
Tom Bateman, "Police Warn over Drugs Cyber-Attack," BBC News, Oc-tober 16, 2013, accessed September 30, 2014, http://www.bbc.co.uk/ news/world-europe-24539417.
-
BBC News
-
-
Bateman, T.1
-
262
-
-
84957642010
-
A Hilarious Coded Riff on China's Government: 'Going Shopping for the 18th Time
-
October 14, 2012, accessed September 30, 2014
-
Xiaoying Zhou, "A Hilarious Coded Riff on China's Government: 'Going Shopping for the 18th Time,'" Tea Leaf Nation, October 14, 2012, accessed September 30, 2014, http://www.tealeafnation.com/2012/11/a-hilarious -coded-riff-on-chinas-government-going-shopping-for-the-18th-time/.
-
Tea Leaf Nation
-
-
Zhou, X.1
-
263
-
-
84957643868
-
China Has More Internet Monitors Than Soldiers
-
October 8, 2013, accessed September 30, 2014
-
Lily Kuo, "China Has More Internet Monitors Than Soldiers," Quartz, Oc-tober 8, 2013, accessed September 30, 2014, http://qz.com/132590/ china-has-more-internet-monitors-than-active-army-personnel/.
-
Quartz
-
-
Kuo, L.1
-
264
-
-
84957697773
-
-
Occupying the Information High Ground: Chinese Capabilities for Computer Network Operations and Cyber Espionage (Falls Church, VA: Northrop Grumman Corporation, March 2012), ac-cessed September 30, 2014
-
Brian Kretal, Paton Adams, and George Bakos, Occupying the Information High Ground: Chinese Capabilities for Computer Network Operations and Cyber Espionage (Falls Church, VA: Northrop Grumman Corporation, March 2012), ac-cessed September 30, 2014, http://origin.www.uscc.gov/sites/default/ files/Research/USCC_Report_Chinese_Capabilities_for_Computer _Network_Operations_and_Cyber_%20Espionage.pdf.
-
-
-
Brian, K.1
Paton, A.2
George, B.3
-
265
-
-
84957655703
-
Five Points on the Deeply Flawed U.S. Congress Hua-wei Report
-
October 10, 2012, accessed September 30, 2014
-
Graham Webster, "Five Points on the Deeply Flawed U.S. Congress Hua-wei Report," Transpacifica, October 10, 2012, accessed September 30, 2014, http://transpacifica.net/2012/10/10/five-points-on-the-deeply-fiawed -u-s-congress-huawei-report/.
-
Transpacifica
-
-
Webster, G.1
-
266
-
-
84877264447
-
How Censorship in China Allows Government Criticism but Silences Collective Ex-pression
-
Gary King, Jennifer Pan, and Margaret E. Roberts, "How Censorship in China Allows Government Criticism but Silences Collective Ex-pression," American Political Science Review 107, no. 02 (2013): 326-43, doi:10.1017/S0003055413000014.
-
(2013)
American Political Science Review
, vol.107
, Issue.2
, pp. 326-343
-
-
Gary, K.1
Jennifer, P.2
Margaret Roberts, E.3
-
267
-
-
84957659234
-
ternet Censorship in China
-
accessed September 30, 2014
-
"Internet Censorship in China," Wikipedia, accessed September 30, 2014, http://en.wikipedia.org/wiki/Internet_censorship_in_China.
-
Wikipedia
-
-
-
268
-
-
84966915832
-
On the 'Slow' Chinese Internet and the Prospects for China: One More Round
-
May 30, 2012, accessed September 30, 2014
-
James Fallows, "On the 'Slow' Chinese Internet and the Prospects for China: One More Round," Atlantic, May 30, 2012, accessed September 30, 2014, http://www.theatlantic.com/international/archive/2012/05/on -the-slow-chinese-internet-and-the-prospects-for-china-one-more -round/257878/.
-
Atlantic
-
-
Fallows, J.1
-
269
-
-
84957646184
-
-
Akamai State of the Internet Report Quarter 1: 2014 (Cambridge, MA: Akamai, January 2014), accessed September 30, 2014
-
Akamai State of the Internet Report Quarter 1: 2014 (Cambridge, MA: Akamai, January 2014), accessed September 30, 2014, http://www. akamai .com/stateoftheinternet/;
-
-
-
-
270
-
-
84957690940
-
China Hard-ens Grip Before Meeting
-
November 10, 2012, accessed September 30, 2014
-
Brian Spegele and Paul Mozur, "China Hard-ens Grip Before Meeting," Wall Street Journal, November 10, 2012, ac-cessed September 30, 2014, http://online.wsj.com/news/articles/SB10001424052970204707104578092461228569642.
-
Wall Street Journal
-
-
Brian, S.1
Paul, M.2
-
271
-
-
84957608982
-
The People's Republic of Hacking
-
January 31, 2013, accessed September 30, 2014
-
Adam Segal, "The People's Republic of Hacking," Foreign Policy, Janu-ary 31, 2013, accessed September 30, 2014, http://www.foreignpolicy .com/articles/2013/01/31/the_people_s_republic_of_hacking_china _new_york_times?wp_login_redirect=0.
-
Foreign Policy
-
-
Segal, A.1
-
272
-
-
84957639489
-
-
Winds from the East: How the People's Republic of China Seeks to Infiuence the Media in Africa, Latin America, and South-east Asia (Washington, DC: Center for International Media Assistance, September 2010), accessed September 30, 2014
-
Douglas Farah and Andy Mosher, Winds from the East: How the People's Republic of China Seeks to Infiuence the Media in Africa, Latin America, and South-east Asia (Washington, DC: Center for International Media Assistance, September 2010), accessed September 30, 2014, http://cima.ned.org/ sites/default/files/CIMA-China-Report_1.pdf.
-
-
-
Douglas, F.1
Andy, M.2
-
273
-
-
84957638358
-
-
http://www.tealeafnation.com/tealeafnation.com.
-
-
-
-
274
-
-
84966749051
-
China Blocks Web Access to Times
-
October 25, 2012, accessed September 30, 2014
-
Keith Bradsher, "China Blocks Web Access to Times," New York Times, October 25, 2012, accessed September 30, 2014, http://www.nytimes .com/2012/10/26/world/asia/china-blocks-web-access-to-new-york -times.html.
-
New York Times
-
-
Bradsher, K.1
-
275
-
-
84957703496
-
Xi Jinping Millionaire Relations Reveal Fortunes of Elite
-
June 29, 2012, accessed September 30, 2014
-
Bloomberg News, "Xi Jinping Millionaire Relations Reveal Fortunes of Elite," Bloomberg, June 29, 2012, accessed September 30, 2014, http://www.bloomberg.com/news/2012-06-29/xi-jinping-millionaire -relations-reveal-fortunes-of-elite.html.
-
Bloomberg
-
-
-
276
-
-
84874579524
-
Georgetown Students Shed Light on China's Tunnel Sys-tem for Nuclear Weapons
-
Washington Post, November 29, 2009, accessed September 30, 2014
-
William Wan, "Georgetown Students Shed Light on China's Tunnel Sys-tem for Nuclear Weapons," Washington Post, November 29, 2009, accessed September 30, 2014, http://www.washingtonpost.com/world/national -security/georgetown-students-shed-light-on-chinas-tunnel-system-for -nuclear-weapons/2011/11/16/gIQA6AmKAO_story.html.
-
-
-
Wan, W.1
-
277
-
-
84957643188
-
-
http://personaldemocracy.com/jessica-beinecke.
-
-
-
-
278
-
-
84957706477
-
-
http://youtu.be/TorXQUb0SXo, http://youtu.be/LPIovmLzGWo.
-
-
-
-
279
-
-
84957620793
-
Crowd Sourcing or Cadre Sourcing: Why the Chinese Government Cannot Rely on the Internet for Information
-
presented at the International Studies Association, San Diego, 2012
-
Pontus Wallin, "Crowd Sourcing or Cadre Sourcing: Why the Chinese Government Cannot Rely on the Internet for Information" (presented at the International Studies Association, San Diego, 2012).
-
-
-
Wallin, P.1
-
280
-
-
84957637579
-
-
http://www.interseliger.com/.
-
-
-
-
281
-
-
84957642174
-
Social Media and the New Cold War
-
2012, accessed September 30, 2014
-
Philip N. Howard, "Social Media and the New Cold War," The Great Debate, 2012, accessed September 30, 2014, http://blogs.reuters.com/ great-debate/2012/08/01/social-media-and-the-new-cold-war/.
-
The Great Debate
-
-
Philip Howard, N.1
-
282
-
-
84957651710
-
-
http://www.pinterest.com/pin/379569074817799499/.
-
-
-
-
283
-
-
84966915840
-
Russian Wikipedia Closes Site to Protest Internet Law
-
July 10, 2012, accessed September 30, 2014
-
Thomas Grove, "Russian Wikipedia Closes Site to Protest Internet Law," Reuters, July 10, 2012, accessed September 30, 2014, http://www .reuters.com/article/2012/07/10/net-us-russia-wikipedia-protest -idUSBRE8690NY20120710.
-
Reuters
-
-
Grove, T.1
-
284
-
-
84957686553
-
-
http://youtu.be/jxf-nRTDvGQ.
-
-
-
-
285
-
-
84957641573
-
side Putin's Campaign of Social Media Trolling and Faked Ukrainian Crimes
-
May 11, 2014, accessed September 30, 2014
-
Paul Roderick Gregory, "Inside Putin's Campaign of Social Media Trolling and Faked Ukrainian Crimes," Forbes, May 11, 2014, accessed September 30, 2014, http://www.forbes.com/sites/paulroderickgregory/2014/05/11/ inside-putins-campaign-of-social-media-trolling-and-faked-ukrainian -crimes/.
-
Forbes
-
-
-
286
-
-
84957681028
-
-
Freedom House, Venezuela, Freedom on the Net 2013 (Washington, DC: Freedom House, January 2013), accessed September 30, 2014
-
Freedom House, Venezuela, Freedom on the Net 2013 (Washington, DC: Freedom House, January 2013), accessed September 30, 2014, http:// www.freedomhouse.org/report/freedom-net/2013/venezuela#. U7Dv0vmSxad.
-
-
-
-
287
-
-
84957670391
-
Webcams Can Record Secretly
-
accessed June 30, 2014, accessed September 30, 2014
-
Katherine Musslewhite, "Webcams Can Record Secretly," Washington Post, accessed June 30, 2014, accessed September 30, 2014, http:// www.washingtonpost.com/posttv/business/technology/webcams -can-record-secretly/2013/12/18/3a48220c-6771-11e3-ae56-22de0 72140a2_video.html.
-
Washington Post
-
-
Musslewhite, K.1
-
288
-
-
84957703044
-
China 'Hacking Websites in Hunt for Tibetan Dissi-dents
-
August 13, 2013, accessed September 30, 2014
-
Dean Nelson, "China 'Hacking Websites in Hunt for Tibetan Dissi-dents,'" Telegraph, August 13, 2013, accessed September 30, 2014, http:// www.telegraph.co.uk/news/worldnews/asia/china/10240404/ China-hacking-websites-in-hunt-for-Tibetan-dissidents.html.
-
Telegraph
-
-
Nelson, D.1
-
289
-
-
84957686503
-
AntiLeaks Boss: We'll Keep Pummeling WikiLeaks and As-sange
-
August 13, 2012, accessed September 30, 2014
-
Iain Thomson, "AntiLeaks Boss: We'll Keep Pummeling WikiLeaks and As-sange," Register, August 13, 2012, accessed September 30, 2014, http://www .theregister.co.uk/2012/08/13/antileaks_wikileaks_attack_response/.
-
Register
-
-
Thomson, I.1
-
290
-
-
84967036176
-
Amnesty International Site Serving Java Exploit
-
December 22, 2011, accessed September 30, 2014
-
Brian Krebs, "Amnesty International Site Serving Java Exploit," Krebs on Se-curity, December 22, 2011, accessed September 30, 2014, http://krebson security.com/2011/12/amnesty-international-site-serving-java-exploit/.
-
Krebs on Security
-
-
Krebs, B.1
-
291
-
-
84957718376
-
IK Servers Are Getting DDoSed Using the DNS Refiec-tion Attack
-
dian Kanoon (October 19, 2013), accessed September 30, 2014
-
indiankanoon, "IK Servers Are Getting DDoSed Using the DNS Refiec-tion Attack," Indian Kanoon (October 19, 2013), accessed September 30, 2014, https://twitter.com/indiankanoon/status/391497714451492865.
-
-
-
-
292
-
-
84957612092
-
-
The Filter Bubble: How the New Personalized Web Is Changing What We Read and How We Think (London: Penguin, 2011)
-
Eli Pariser, The Filter Bubble: How the New Personalized Web Is Changing What We Read and How We Think (London: Penguin, 2011).
-
-
-
Pariser, E.1
-
293
-
-
84975203437
-
1 in 10 Twitter Accounts Is Fake, Say Researchers
-
November 26, 2013, accessed September 30, 2014
-
Keith Wagstaff, "1 in 10 Twitter Accounts Is Fake, Say Researchers," NBC News, November 26, 2013, accessed September 30, 2014, http:// www.nbcnews.com/technology/1-10-twitter-accounts-fake-sayresearchers-2D11655362;
-
NBC News
-
-
Wagstaff, K.1
-
294
-
-
79955982157
-
On Botnets
-
Proceed-ings of the 12th International Conference on Information Integration and Web-Based Applications and Services (New York: ACM, 2010), 5-10, accessed Septem-ber 30, 2014
-
Won Kim et al., "On Botnets," in Proceed-ings of the 12th International Conference on Information Integration and Web-Based Applications and Services (New York: ACM, 2010), 5-10, accessed Septem-ber 30, 2014, http://dl.acm.org/citation.cfm?id=1967488.
-
-
-
Won, K.1
-
295
-
-
85170015245
-
Who Is Tweeting on Twitter: Human, Bot, or Cy-borg?
-
Proceedings of the 26th Annual Computer Security Applications Conference (New York: ACM, 2010), 21-30, accessed September 30
-
Zi Chu,et al., "Who Is Tweeting on Twitter: Human, Bot, or Cy-borg?" in Proceedings of the 26th Annual Computer Security Applications Conference (New York: ACM, 2010), 21-30, accessed September 30, 2014, http:// dl.acm.org/citation.cfm?id=1920265.
-
-
-
Zi, C.1
-
296
-
-
84957694739
-
What's Your Egg Count? Block Spam Bots Fol-lowing You on Twitter
-
accessed September 30, 2014
-
Joan Woodbrey Crocker, "What's Your Egg Count? Block Spam Bots Fol-lowing You on Twitter," Flyte New Media, accessed September 30, 2014, http://www.takefiyte.com/fiyte/2011/08/whats-your-egg-count-block -spam-bots-following-you-on-twitter.html.
-
Flyte New Media
-
-
Crocker, J.W.1
-
297
-
-
85022018878
-
The Rise of Twitter Bots
-
November 15, 2013, accessed September 30, 2014
-
Rob Dubbin, "The Rise of Twitter Bots," New Yorker Blogs, November 15, 2013, accessed September 30, 2014, http://www.newyorker.com/ online/blogs/elements/2013/11/the-rise-of-twitter-bots.html.
-
New Yorker Blogs
-
-
Dubbin, R.1
-
298
-
-
84966927722
-
Spam Bots Flooding Twitter to Drown Info About #Syria Protests
-
April 18, 2011, accessed September 30, 2014
-
Anas Qtiesh, "Spam Bots Flooding Twitter to Drown Info About #Syria Protests," Anas Qtiesh's Blog, April 18, 2011, accessed September 30, 2014, http://www.anasqtiesh.com/2011/04/spam-bots-fiooding-twitter-to -drown-info-about-syria-protests/;
-
Anas Qtiesh's Blog
-
-
Qtiesh, A.1
-
299
-
-
84967035831
-
How to Spot a Twitter Spambot
-
November 8, 2013, accessed September 30, 2014
-
Taylor Casti, "How to Spot a Twitter Spambot," Mashable, November 8, 2013, accessed September 30, 2014, http://mashable.com/2013/11/08/twitter-spambots/;
-
Mashable
-
-
Casti, T.1
-
300
-
-
84957640571
-
Syria's Twitter Spambots
-
April 21, 2011, accessed Septem-ber 30, 2014
-
Jillian C. York, "Syria's Twitter Spambots," Guardian, April 21, 2011, accessed Septem-ber 30, 2014, http://www.theguardian.com/commentisfree/2011/ apr/21/syria-twitter-spambots-pro-revolution.
-
Guardian
-
-
Jillian York, C.1
-
301
-
-
84957702062
-
-
Qtiesh, "Spam Bots Flooding Twitter to Drown Info About #Syria Protests."
-
Qtiesh, "Spam Bots Flooding Twitter to Drown Info About #Syria Protests."
-
-
-
-
302
-
-
84866597254
-
Twitter Bots Drown Out Anti-Kremlin Tweets
-
December 8, 2011, accessed September 30, 2014
-
Brian Krebs, "Twitter Bots Drown Out Anti-Kremlin Tweets," Krebs on Se-curity, December 8, 2011, accessed September 30, 2014, http://krebsonsecurity.com/2011/12/twitter-bots-drown-out-anti-kremlin-tweets/;
-
Krebs on Security
-
-
Krebs, B.1
-
303
-
-
84962527092
-
Twitter Mischief Plagues Mexico's Election
-
June 21, 2012, accessed September 30, 2014
-
Mike Orcutt, "Twitter Mischief Plagues Mexico's Election," MIT Technology Review, June 21, 2012, accessed September 30, 2014, http://www.tech nologyreview.com/news/428286/twitter-mischief-plagues-mexicos -election/;
-
MIT Technology Review
-
-
Orcutt, M.1
-
304
-
-
84967029160
-
Twitter Bots Target Tibetan Protests
-
March 20, 2012, accessed September 30, 2014
-
Brian Krebs, "Twitter Bots Target Tibetan Protests," Krebs on Security, March 20, 2012, accessed September 30, 2014, http://krebson security.com/2012/03/twitter-bots-target-tibetan-protests/;
-
Krebs on Security
-
-
Krebs, B.1
-
305
-
-
84963498865
-
The Coalition's Twitter Fraud and Deception
-
August 26, 2013, accessed September 30, 2014
-
Torin Peel, "The Coalition's Twitter Fraud and Deception," Independent Australia, Au-gust 26, 2013, accessed September 30, 2014, http://www.independent australia.net/politics/politics-display/the-coalitions-twitter-fraud-and -deception,5660;
-
Independent Australia
-
-
Peel, T.1
-
306
-
-
84957697954
-
-
"Jasper Admits to Using Twitter Bots to Drive Election Bid," Inside Croydon, November 26, 2012, accessed September 30, 2014
-
"Jasper Admits to Using Twitter Bots to Drive Election Bid," Inside Croydon, November 26, 2012, accessed September 30, 2014, http://insidecroydon.com/2012/11/26/jasper-admits-to-using-twitter -bots-to-drive-election-bid/;
-
-
-
-
307
-
-
84957614342
-
Mitt Romney's Fake Twitter Follower Problem
-
July 25, 2012, accessed September 30, 2014
-
W. Oremus, "Mitt Romney's Fake Twitter Follower Problem," Slate, July 25, 2012, accessed September 30, 2014, http://www.slate.com/blogs/future_tense/2012/07/25/mitt_romney_fake_twitter_followers_who_s_buying_them_.html;
-
Slate
-
-
Oremus, W.1
-
308
-
-
84957637825
-
Cyber fuckery in Azerbaijan
-
Adventures in Research, March 10, 2013, accessed September 30, 2014
-
Katy Pearce, "Cy ber fuckery in Azerbaijan," Adventures in Research, March 10, 2013, ac-cessed September 30, 2014, http://www.katypearce.net/cyberfuckery -in- azerbaijan/; York, "Syria's Twitter Spambots"
-
-
-
Pearce, K.1
-
309
-
-
85052024286
-
Prosecutors Detail Attempt to Sway South Korean Election
-
November 21, 2013, accessed September 30, 2014
-
Choe Sang-hun, "Prosecutors Detail Attempt to Sway South Korean Election," New York Times, November 21, 2013, accessed September 30, 2014, http://www .nytimes.com/2013/11/22/world/asia/prosecutors-detail-bid-to-sway -south-korean-election.html.
-
New York Times
-
-
Choe, S.-H.1
-
310
-
-
84957652975
-
On Botnets
-
Kim et al., "On Botnets."
-
-
-
Kim, W.1
-
311
-
-
84957689351
-
Who Is Tweeting on Twitter?
-
Chu et al., "Who Is Tweeting on Twitter?"
-
-
-
Chu, Z.1
-
312
-
-
84957700013
-
Let's Make Candidates Pledge Not to Use Bots
-
January 2, 2014, accessed September 30, 2014
-
Philip N. Howard, "Let's Make Candidates Pledge Not to Use Bots," Reuters Blogs-The Great Debate, January 2, 2014, accessed September 30, 2014, http://blogs.reuters.com/great-debate/2014/01/02/lets-make -candidates-pledge-not-to-use-bots/.
-
Reuters Blogs-The Great Debate
-
-
Philip Howard, N.1
-
313
-
-
84957711651
-
The Problem of So-Called 'Push Polls': When Advocacy Calls Are Made Under the Guise of Research
-
2007, accessed September 30, 2014
-
American Association of Public Opinion Researchers, "The Problem of So-Called 'Push Polls': When Advocacy Calls Are Made Under the Guise of Research," 2007, accessed September 30, 2014, http://aapor.org/ AAPOR_Statements_on_Push_Polls1/3850.htm#.U7ErMfmSxad.
-
-
-
-
314
-
-
84957651599
-
Malaysian Air Said to Opt Out of Boeing Jet-Data Service
-
March 12, 2014, accessed Sep-tember 30, 2014
-
Julie Johnsson and Mary Schlangenstein, "Malaysian Air Said to Opt Out of Boeing Jet-Data Service," Bloomberg, March 12, 2014, accessed Sep-tember 30, 2014, http://www.bloomberg.com/news/2014-03-12/ malaysian-air-said-to-opt-out-of-boeing-plan-to-share-jets-data.html.
-
Bloomberg
-
-
Julie, J.1
Mary, S.2
-
315
-
-
84957664706
-
LG Smart TVs Logging USB Filenames and Viewing Info to LG Servers
-
November 18, 2013, accessed September 30, 2014
-
"LG Smart TVs Logging USB Filenames and Viewing Info to LG Serv-ers," DoctorBeet's Blog, November 18, 2013, accessed September 30, 2014, http://doctorbeet.blogspot.hu/2013/11/lg-smart-tvs-logging-usb -filenames-and.html.
-
DoctorBeet's Blog
-
-
-
316
-
-
84957689725
-
Smart TVs That Send Data Without Consent Will Be Fixed: LG
-
October 21, 2013, accessed September 30, 2014
-
"Smart TVs That Send Data Without Consent Will Be Fixed: LG," CBC News, October 21, 2013, accessed September 30, 2014, http://www.cbc .ca/1.2434710.
-
CBC News
-
-
-
317
-
-
84967312514
-
Researchers Demo How Smart TVs Can Watch You
-
2014, accessed September 30, 2014
-
Ericka Chickowski, "Researchers Demo How Smart TVs Can Watch You," Guardian, 2014, accessed September 30, 2014, http://www. theguardian .com/media-network/partner-zone-infosecurity/smart-tv-security-risks? CMP=twt_gu.
-
Guardian
-
-
Chickowski, E.1
-
318
-
-
84957619967
-
-
Wired Shut: Copyright and the Shape of Digital Culture, rpt. ed. (Cambridge: MIT Press, 2009)
-
Tarleton Gillespie, Wired Shut: Copyright and the Shape of Digital Culture, rpt. ed. (Cambridge: MIT Press, 2009).
-
-
-
Gillespie, T.1
-
319
-
-
84957684918
-
Bolivia: Borders Will Have Biometric Security Mea-sures
-
October 24, 2012, accessed September 30, 2014
-
Lucas Radicella, "Bolivia: Borders Will Have Biometric Security Mea-sures," Argentina Independent, October 24, 2012, accessed September 30, 2014, http://www.argentinaindependent.com/currentaffairs/news fromlatinamerica/bolivia-borders-will-have-biometric-security -measures/.
-
Argentina Independent
-
-
Radicella, L.1
-
320
-
-
84957699361
-
Colombia's Supreme Court Drops 2 Charges Against For-mer Intelligence Director in Wire Tapping Scandal Case
-
October 9, 2013, accessed September 30, 2014
-
Silvia Higuera, "Colombia's Supreme Court Drops 2 Charges Against For-mer Intelligence Director in Wire Tapping Scandal Case," Knight Center for Journalism in the Americas, October 9, 2013, accessed September 30, 2014, https://knightcenter.utexas.edu/blog/00-14561-colombias-supreme -court-drops-2-charges-against-former-intelligence-director-wire -tapp.
-
Knight Center for Journalism in the Americas
-
-
Higuera, S.1
-
321
-
-
84957614713
-
They Know Everything We Do
-
Telecom and Internet Surveillance in Ethiopia (New York: Human Rights Watch, March 2014), accessed September 30, 2014
-
Human Rights Watch, "They Know Everything We Do": Telecom and Internet Surveillance in Ethiopia (New York: Human Rights Watch, March 2014), accessed September 30, 2014, http://www.hrw.org/node/123977.
-
-
-
-
322
-
-
84957667819
-
Report: Web Monitoring Devices Made by U.S. Firm Blue Coat Detected in Iran, Sudan
-
July 8, 2013, ac-cessed September 30, 2014
-
Ellen Nakashima, "Report: Web Monitoring Devices Made by U.S. Firm Blue Coat Detected in Iran, Sudan," Washington Post, July 8, 2013, ac-cessed September 30, 2014, http://www.washingtonpost.com/world/ national-security/report-web-monitoring-devices-made-by-us-firm -blue-coat-detected-in-iran-sudan/2013/07/08/09877ad6-e7cf-11e2 -a301-ea5a8116d211_story.html.
-
Washington Post
-
-
Nakashima, E.1
-
323
-
-
84865428942
-
Demystifying the Arab Spring: Parsing the Differences between Tunisia, Egypt, and Libya
-
Lisa Anderson, "Demystifying the Arab Spring: Parsing the Differences between Tunisia, Egypt, and Libya," Foreign Affairs 90, no. 3 (2011): 1-2.
-
(2011)
Foreign Affairs
, vol.90
, Issue.3
, pp. 1-2
-
-
Anderson, L.1
-
324
-
-
84951873172
-
How Isis Is Spreading Its Message Online
-
June 19, 2014, accessed September 30, 2014
-
Faisal Irshaid, "How Isis Is Spreading Its Message Online," BBC News, June 19, 2014, accessed September 30, 2014, http://www.bbc.com/ news/world-middle-east-27912569.
-
BBC News
-
-
Irshaid, F.1
-
325
-
-
84957630595
-
Extremists Flocking to Facebook for Recruits
-
August 29, 2011, accessed September 30, 2014
-
Paisley Dodds, "Extremists Flocking to Facebook for Recruits," Yahoo News, August 29, 2011, accessed September 30, 2014, http://news.yahoo.com/ extremists-fiocking-facebook-recruits-151504367.html.
-
Yahoo News
-
-
Dodds, P.1
-
326
-
-
84967126782
-
Steganography
-
accessed September 30, 2014
-
"Steganography," Wikipedia, accessed September 30, 2014, http://en.wikipedia.org/wiki/Steganography.
-
Wikipedia
-
-
-
327
-
-
84957645240
-
-
Chinese Cyber Nationalism: Evolution, Characteristics, and Implications (Lanham, MD: Lexington, 2007)
-
Xu Wu, Chinese Cyber Nationalism: Evolution, Characteristics, and Implications (Lanham, MD: Lexington, 2007).
-
-
-
Wu, X.1
-
328
-
-
84957629773
-
-
Mapping Iran's Online Public: Politics and Culture in the Persian Blogosphere (Cambridge, MA: Berkman Center for Internet and Society, April 2008), accessed September 30, 2014
-
John Kelly and Bruce Etling, Mapping Iran's Online Public: Politics and Culture in the Persian Blogosphere (Cambridge, MA: Berkman Center for Internet and Society, April 2008), accessed September 30, 2014, http://cyber.law .harvard.edu/publications/2008/Mapping_Irans_Online_Public.
-
-
-
John, K.1
Bruce, E.2
-
329
-
-
85058039493
-
Hacked Emails Allege Russian Youth Group Nashi Pay-ing Bloggers
-
February 7, 2012, accessed September 30, 2014
-
Miriam Elder, "Hacked Emails Allege Russian Youth Group Nashi Pay-ing Bloggers," Guardian, February 7, 2012, accessed September 30, 2014, http://www.theguardian.com/world/2012/feb/07/hacked-emails -nashi-putin-bloggers.
-
Guardian
-
-
Elder, M.1
-
330
-
-
84957667649
-
Documents Reveal Unregulated Use of Stingrays in California
-
March 13, 2014, accessed September 30, 2014
-
Linda Lye, "Documents Reveal Unregulated Use of Stingrays in California," American Civil Liberties Union, March 13, 2014, accessed September 30, 2014, https://www.aclu.org/blog/national-security-technology-and -liberty/documents-reveal-unregulated-use-stingrays-california.
-
American Civil Liberties Union
-
-
Lye, L.1
-
331
-
-
84967126769
-
Seattle Grounds Police Drone Program
-
February 7, 2013, accessed September 30, 2014
-
Christine Clarridge, "Seattle Grounds Police Drone Program," Seattle Times, February 7, 2013, accessed September 30, 2014, http://seattletimes.com/ html/localnews/2020312864_spddronesxml.html; Lye, "Documents Reveal Unregulated Use of Stingrays in California."
-
Seattle Times
-
-
Clarridge, C.1
-
332
-
-
84967035713
-
Why Copyrighted Coffee May Cripple the Internet of Things
-
March 6, 2014, accessed September 30, 2014
-
Marcus Wohlsen, "Why Copyrighted Coffee May Cripple the Internet of Things," Wired, March 6, 2014, accessed September 30, 2014, http:// www.wired.com/2014/03/copyrighted-coffee-undermine-whole -internet-things/.
-
Wired
-
-
Wohlsen, M.1
-
333
-
-
84957649372
-
-
Wired Shut: Copyright and the Shape of Digital Culture, rpt. ed. (Cambridge: MIT Press, 2009)
-
Tarleton Gillespie, Wired Shut: Copyright and the Shape of Digital Culture, rpt. ed. (Cambridge: MIT Press, 2009).
-
-
-
Gillespie, T.1
-
334
-
-
84957648815
-
-
Making Democracy Work: Civic Traditions in Modern Italy (Princeton: Princeton University Press, 1994)
-
Robert D. Putnam, Robert Leonardi, and Raffaella Y. Nanetti, Making Democracy Work: Civic Traditions in Modern Italy (Princeton: Princeton University Press, 1994).
-
-
-
Robert Putnam, D.1
Robert, L.2
Raffaella Nanetti, Y.3
-
335
-
-
84966846325
-
How Bretton Woods Reshaped the World
-
November 14, 2008, accessed September 30, 2014
-
Steve Schifferes, "How Bretton Woods Reshaped the World," BBC, No-vember 14, 2008, accessed September 30, 2014, http://news.bbc.co.uk/ 2/hi/7725157.stm.
-
BBC
-
-
Schifferes, S.1
-
336
-
-
84967035707
-
Edward Gibbon
-
accessed June 27, 2014, accessed Septem-ber 30, 2014
-
"Edward Gibbon," Wikipedia, accessed June 27, 2014, accessed Septem-ber 30, 2014, http://en.wikipedia.org/wiki/Edward_Gibbon;
-
Wikipedia
-
-
-
337
-
-
84966828191
-
The History of the Decline and Fall of the Roman Empire
-
accessed June 21, 2014
-
"The History of the Decline and Fall of the Roman Empire," Wikipedia, ac-cessed June 21, 2014, http://en.wikipedia.org/wiki/The_History_of _the_Decline_and_Fall_of_the_Roman_Empire.
-
Wikipedia
-
-
-
338
-
-
84957678042
-
-
Ensuring Fragile States Are Not Left Behind: 2013 Factsheet on Resource Flows and Trends (Paris: OECD, January 2013), accessed September 30, 2014
-
OECD, Ensuring Fragile States Are Not Left Behind: 2013 Factsheet on Resource Flows and Trends (Paris: OECD, January 2013), accessed September 30, 2014, http:// www.oecd.org/dac/incaf/factsheet%202013%20resource%20flows %20final.pdf.
-
-
-
-
339
-
-
84957611018
-
Your Thermostat is About to Get Smart
-
November 5, 2013, accessed September 30, 2014
-
David Unger, "Your Thermostat is About to Get Smart," Christian Sci-ence Monitor, November 5, 2013, accessed September 30, 2014, http:// www.csmonitor.com/Environment/Energy-Voices/2013/1105/Your -thermostat-is-about-to-get-smart-video video.
-
Christian Science Monitor
-
-
Unger, D.1
-
340
-
-
84957635941
-
-
Consent of the Networked: The Worldwide Struggle for Inter-net Freedom (New York: Basic, 2013)
-
Rebecca MacKinnon, Consent of the Networked: The Worldwide Struggle for Inter-net Freedom (New York: Basic, 2013).
-
-
-
MacKinnon, R.1
-
341
-
-
84957618379
-
Keynote Speech on Surveillance
-
Opening Ceremony of the Freedom Online Conference, 2013, accessed September 30, 2014
-
Rebecca MacKinnon, "Keynote Speech on Surveillance," in Opening Ceremony of the Freedom Online Conference, 2013, accessed September 30, 2014, http:// consentofthenetworked.com/2013/06/17/freedom-online-keynote/.
-
-
-
MacKinnon, R.1
-
342
-
-
78249265471
-
-
accessed June 29, 2014
-
"Aaron Swartz," Wikipedia, accessed June 29, 2014, http://en.wikipedia .org/wiki/Aaron_Swartz.
-
Wikipedia
-
-
Swartz, A.1
-
343
-
-
84967050323
-
Russian Business Network
-
accessed June 19, 2014
-
"Russian Business Network," Wikipedia, accessed June 19, 2014, http://en.wikipedia.org/wiki/Russian_Business_Network.
-
Wikipedia
-
-
-
344
-
-
84967290332
-
Zero-Day Attack
-
accessed June 21, 2014
-
"Zero-Day Attack," Wikipedia, accessed June 21, 2014, http://en.wikipedia .org/wiki/Zero-day_attack.
-
Wikipedia
-
-
-
345
-
-
84966730782
-
U.S.-Style Personal Data Gathering Is Spreading Worldwide
-
accessed June 29, 2014
-
"U.S.-Style Personal Data Gathering Is Spreading Worldwide," Forbes, accessed June 29, 2014, http://www.forbes.com/sites/adamtanner/2013/10/16/ u-s-style-personal-data-gathering-spreading-worldwide/;
-
Forbes
-
-
-
346
-
-
84957641845
-
-
Managing Global Privacy (Berkeley: ThePrivacyProjects.org, January 2009), ac-cessed September 30, 2014
-
Paul Schwartz, Managing Global Privacy (Berkeley: ThePrivacyProjects.org, January 2009), ac-cessed September 30, 2014, http://theprivacyprojects.org/wp-content/ uploads/2009/08/The-Privacy-Projects-Paul-Schwartz-Global-Data -Flows-20093.pdf.
-
-
-
Schwartz, P.1
-
347
-
-
84957624322
-
Computer Says No
-
June 22, 2013, accessed September 30, 2014
-
"Computer Says No," Economist, June 22, 2013, accessed September 30, 2014, http://www.economist.com/news/international/21579816-denial -service-attacks-over-internet-are-growing-easier-and-more-powerful -their.
-
Economist
-
-
-
348
-
-
84957670990
-
Too Many People with Security Clearances, but Cuts Could Help Some Feds, Hurt Others
-
Washington Post, March 20, 2014, accessed September 30, 2014
-
Joe Davidson, "Too Many People with Security Clearances, but Cuts Could Help Some Feds, Hurt Others," Washington Post, March 20, 2014, accessed September 30, 2014, http://www.washingtonpost.com/politics/ federal_government/too-many-people-with-security-clearances-but -cuts-could-help-some-feds-hurt-others/2014/03/20/1f1d011a-b05e -11e3-a49e-76adc9210f19_story.html.
-
-
-
Davidson, J.1
-
349
-
-
84906239881
-
The Geeks Who Leak
-
June 24, 2013, accessed September 30, 2014
-
Michael Scherer, "The Geeks Who Leak," Time, June 24, 2013, accessed September 30, 2014, http://content.time.com/time/magazine/article/ 0,9171,2145506,00.html.
-
Time
-
-
Scherer, M.1
-
350
-
-
84957660344
-
Backdoor Dealings
-
September 14, 2013, accessed Septem-ber 30, 2014
-
"Backdoor Dealings," Economist, September 14, 2013, accessed Septem-ber 30, 2014, http://www.economist.com/news/leaders/21586345 -covertly-weakening-security-entire-internet-make-snooping-easier -bad.
-
Economist
-
-
-
351
-
-
84936875790
-
NSA Said to Exploit Heartbleed Bug for Intelligence for Years
-
April 12, 2014, accessed September 30, 2014
-
Michael Riley, "NSA Said to Exploit Heartbleed Bug for Intelligence for Years," Bloomberg, April 12, 2014, accessed September 30, 2014, http:// www.bloomberg.com/news/2014-04-11/nsa-said-to-have-used -heartbleed-bug-exposing-consumers.html.
-
Bloomberg
-
-
Riley, M.1
-
352
-
-
84957626837
-
-
US Institute of Peace, Non-Violent Struggle: 50 Crucial Points (Washington, DC: United States Institute of Peace, January 2006), accessed Septem-ber 30, 2014
-
US Institute of Peace, Non-Violent Struggle: 50 Crucial Points (Washington, DC: United States Institute of Peace, January 2006), accessed Septem-ber 30, 2014, http://www.usip.org/publications/non-violent-struggle -50-crucial-points.
-
-
-
-
353
-
-
84957696719
-
-
https://www.tacticaltech.org/, https://citizenlab.org/.
-
-
-
-
354
-
-
84966915361
-
Glenn Greenwald's Partner Detained at Heathrow Airport for Nine Hours
-
August 19, 2013
-
Alan Rusbridger, "Glenn Greenwald's Partner Detained at Heathrow Airport for Nine Hours," Guardian, August 19, 2013, http://www.the guardian.com/world/2013/aug/18/glenn-greenwald-guardian -partner-detained-heathrow.
-
Guardian
-
-
Rusbridger, A.1
-
355
-
-
84967343292
-
American Middle Class
-
accessed June 28, 2014
-
"American Middle Class," Wikipedia, accessed June 28, 2014, http://en.wikipedia.org/wiki/Middle_class.
-
Wikipedia
-
-
-
356
-
-
84957658500
-
-
Social Physics: How Good Ideas Spread: The Lessons from a New Science (New York: Penguin, 2014)
-
Alex Pentland, Social Physics: How Good Ideas Spread: The Lessons from a New Science (New York: Penguin, 2014).
-
-
-
Pentland, A.1
-
357
-
-
84926097400
-
-
New Media Campaigns and the Managed Citizen (New York: Cambridge University Press, 2005)
-
Philip N. Howard, New Media Campaigns and the Managed Citizen (New York: Cambridge University Press, 2005).
-
-
-
Philip Howard, N.1
-
358
-
-
84923066492
-
-
frastructure: The Social Value of Shared Resources (New York: Oxford University Press, 2012)
-
Brett M. Frischmann, Infrastructure: The Social Value of Shared Resources (New York: Oxford University Press, 2012).
-
-
-
Brett Frischmann, M.1
-
359
-
-
84957631345
-
-
News in the Mail: The Press, Post Office, and Public Informa-tion, 1700-1860 s (New York: Praeger, 1989)
-
Richard Kielbowicz, News in the Mail: The Press, Post Office, and Public Informa-tion, 1700-1860 s (New York: Praeger, 1989).
-
-
-
Kielbowicz, R.1
-
360
-
-
84967032976
-
ternet Freedom Fighters Build a Shadow Web
-
March
-
Julian Dibbell, "Internet Freedom Fighters Build a Shadow Web," Scien-tific American 306, no. 3 (March 2012).
-
(2012)
Scientific American
, vol.306
, Issue.3
-
-
Dibbell, J.1
-
361
-
-
84957652651
-
Light and Shady
-
April 21, 2012, accessed September 30, 2014
-
"Light and Shady," Economist, April 21, 2012, accessed September 30, 2014, http://www.economist.com/node/21553012.
-
Economist
-
-
-
362
-
-
84957670865
-
-
http://www.globalwitness.org/campaigns/corruption/anonymous -companies.
-
-
-
-
363
-
-
34548223308
-
A Case of Mistaken Identity? News Accounts of Hacker, Consumer, and Organizational Responsibility for Compromised Digital Records
-
Kris Erickson and Philip N. Howard, "A Case of Mistaken Identity? News Accounts of Hacker, Consumer, and Organizational Responsibility for Compromised Digital Records," Journal of Computer-Mediated Communication 12, no. 4 (2007): 1229-47.
-
(2007)
Journal of Computer-Mediated Communication
, vol.12
, Issue.4
, pp. 1229-1247
-
-
Kris, E.1
Philip Howard, N.2
-
364
-
-
84957609034
-
-
http://tosdr.org/.
-
-
-
-
365
-
-
84957614694
-
-
https://www.globalnetworkinitiative.org/.
-
-
-
-
366
-
-
84966915372
-
Carlos Slim
-
accessed June 28, 2014
-
"Carlos Slim," Wikipedia, accessed June 28, 2014, http://en.wikipedia.org/ wiki/Carlos_Slim; "Megahurts," Economist, February 11, 2012, accessed September 30, 2014, http://www.economist.com/node/21547280.
-
Wikipedia
-
-
-
367
-
-
84858697397
-
Megahurts
-
February 11, 2012, accessed September 30, 2014
-
"Megahurts," Economist, February 11, 2012, accessed September 30, 2014, http://www.economist.com/node/21547280.
-
Economist
-
-
-
368
-
-
84957654461
-
-
Light and Shady
-
"Light and Shady."
-
-
-
-
369
-
-
84957621129
-
-
http://www.fcc.gov/encyclopedia/universal-service.
-
-
-
-
370
-
-
84957645366
-
-
Economist, August 27, 2011
-
Www.africa.slow," Economist, August 27, 2011, http://www. economist .com/node/21526937.
-
-
-
-
371
-
-
84957624639
-
Last Mile
-
accessed June 19, 2014
-
"Last Mile," Wikipedia, accessed June 19, 2014, http://en.wikipedia .org/wiki/Last_mile.
-
Wikipedia
-
-
-
372
-
-
84957701433
-
Google Now Offers Google Earth, Picasa, and Chrome in Syria
-
May 24, 2012, accessed September 30, 2014
-
T. C. Sottek, "Google Now Offers Google Earth, Picasa, and Chrome in Syria," Verge, May 24, 2012, accessed September 30, 2014, http://www .theverge.com/2012/5/24/3041459/google-earth-picasa-chrome-syria.
-
Verge
-
-
Sottek, T.C.1
-
373
-
-
84957652581
-
-
Monk School of Global Affairs, Internet Filtering in a Failed State: The Case of Netsweeper in Somalia (Toronto: University of Toronto, February 2014), accessed September 30, 2014
-
Monk School of Global Affairs, Internet Filtering in a Failed State: The Case of Netsweeper in Somalia (Toronto: University of Toronto, February 2014), accessed September 30, 2014, https://citizenlab.org/2014/02/ internet -filtering-failed-state-case-netsweeper-somalia/;
-
-
-
-
374
-
-
84957693756
-
-
Monk School of Global Affairs, O Pakistan, We Stand on Guard for Thee: An Analysis of Canada-Based Net-sweeper's Role in Pakistan's Censorship Regime (Toronto: University of Toronto, June 2014), accessed September 30, 2014
-
Monk School of Global Affairs, O Pakistan, We Stand on Guard for Thee: An Analysis of Canada-Based Net-sweeper's Role in Pakistan's Censorship Regime (Toronto: University of Toronto, June 2014), accessed September 30, 2014, https://citizenlab.org/2013/06/ o-pakistan/.
-
-
-
-
375
-
-
84957609066
-
Seven Principles for Big Data and Resilience Projects
-
September 23, 2013, accessed September 30, 2014
-
Kate Crawford et al., "Seven Principles for Big Data and Resilience Projects," iRevolution, September 23, 2013, accessed September 30, 2014, http://irevolution.net/2013/09/23/principles-for-big-data-and -resilience/.
-
iRevolution
-
-
Kate, C.1
-
376
-
-
84957677568
-
-
A PGP key allows you to securely send and receive email. "Pretty Good Privacy," Wikipedia, accessed June 26, 2014
-
A PGP key allows you to securely send and receive email. "Pretty Good Privacy," Wikipedia, accessed June 26, 2014, http://en.wikipedia.org/ wiki/Pretty_Good_Privacy.
-
-
-
|