
Онлайн книга «Интернет как иллюзия. Обратная сторона сети»
Buchstein, H. Bytes That Bite: The Internet and Deliberative De-mocracy // Constellations 4, no. 2 (1997): 248–263. Burrell, J. Problematic Empowerment: West African Internet Scams as Strategic Misrepresentation // Information Technologies and In-ternational Development 4, no. 4 (2008): 15–30. Burton, Matthew On the Weaponization of the Collabora-tive Web. Personal Democracy Forum, June 16, 2009. personal-democracy.com/blog-entry/weaponization-collaborative-web. Carr, M. Slouching Towards Dystopia: The New Military Futurism // Race & Class 51, no. 3 (2010): 13. Carr, Nicholas Is Google Making Us Stupid? // Atlantic, August 2008. Cavelty, M. D. Cyber-Terror – Looming Threat or Phantom Me-nace? The Framing of the US Cyber-Threat Debate // Journal of Information Technology & Politics 4, no. 1 (2007): 19–36. Clarke, Richard A., and Robert Knake Cyber War: The Next Threat to National Security and What to Do About It. New York: HarperCollins, 2010. Clinton, Hillary Remarks on Internet Freedom. The Newseum, Washington, DC, January 21, 2010. Clinton, Hillary Speech to Kaiser Family Foundation. March 8, 2005. Cowie, James The Proxy Fight for Iranian Democracy // Renesys Blog, June 22, 2009. www.renesys.com/blog/2009/06/the-proxy-fight-for-iranian-de.shtml. Curtin, M. Beyond the Vast Wasteland: The Policy Discourse of Global Television and the Politics of American Empire // Journal of Broad-casting & Electronic Media 37, no. 2 (1993): 127–145. Dahlberg, L. Democracy via Cyberspace: Mapping the Rhetorics and Practices of Three Prominent Camps // New Media & Society 3, no. 2 (2001): 157. Damm, J. The Internet and the Fragmentation of Chinese Society // Critical Asian Studies 39, no. 2 (2007): 273–294. Deibert, R. J., and R. Rohozinski Risking Security: Policies and Paradoxes of Cyberspace Security // International Political Socio-logy 4, no. 1 (2010): 15–32. Dobson, William J. Computer Programmer Takes On the World’s Despots // Newsweek, August 6, 2010. El-Khairy, O. “Freedom’s a Lifestyle Choice”: US Cultural Diploma-cy, Empire’s Soundtrack, and Middle Eastern “Youth” in our Con- temporary Global Infowar // Middle East Journal of Culture and Communication 2, no. 1 (2009): 115–135. Elmusa, S. S. Faust Without the Devil? The Interplay of Technology and Culture in Saudi Arabia // Middle East Journal 51, no. 3 (1997): 345–357. Facebook Deletes Hong Kong Groups That Oppose Pro-Beijing Party // BBC Monitoring International Reports, February 5, 2010. Falvey, Christian Minister’s Web Monitoring Tool Off to Rocky Start // Radio Prague, February 12, 2010. Fandy, M. Information Technology, Trust, and Social Change in the Arab World // Middle East Journal (2000): 378–394. Fletcher, Owen Apple Censors Dalai Lama iPhone Apps in China // IDG News Service, December 30, 2009. Fox, J. The Uncertain Relationship Between Transparency and Account-ability // Development in Practice 17, no. 4 (2007): 663–671. Franzese, P. W. Sovereignty in Cyberspace: Can It Exist? // Air Force Law Review 64 (2009): 1. Fuchs, C. Some Reflections on Manuel Castells’ Book “Communication Power” // Triple C: Cognition, Communication, Co-operation 7, no. 1 (2009): 94. Garnham, N. The Mass Media, Cultural Identity, and the Public Sphere in the Modern World // Public Culture 5, no. 2 (1993): 251. Gilboa, E. The CNN Effect: The Search for a Communication Theory of International Relations // Political Communication 22, no. 1 (2005): 27–44. Gilboa, E. Global Communication and Foreign Policy // Journal of Communication 52, no. 4 (2002): 731–748. Glassman, James K., and Michael Doran How to Help Iran’s Green Revolution // Wall Street Journal, January 21, 2010. Glenny, Misha BlackBerry is but a Skirmish in the Battle for the Web // Financial Times, August 6, 2010. Goldsmith, J. L., and T. Wu Digital Borders // Legal Affairs (2006): 40. Goldsmith, J. L., and T. Wu Who Controls the Internet: Illu-sions of a Borderless World. New York: Oxford University Press, 2006. Gunaratne, S. A. De-Westernizing Communication/Social Science Research: Opportunities and Limitations // Media, Culture & Soci-ety 32, no. 3 (2010): 473. Guynn, J. Twitter Hires Obama Administration’s Katie Stanton // Los Angeles Times, July 10, 2010. Hardy, M. In-Q-Tel, Google Invest in Recorded Future // Government Computer News, July 29, 2010. gcn.com/articles/2010/ 07/29/inqtel-google-fund-web-analysis-firm.aspx. Hawkins, V. The Other Side of the CNN Factor: The Media and Con-flict // Journalism Studies 3, no. 2 (2002): 225–240. Himma, K. E. Hacking as Politically Motivated Digital Civil Disobedience: Is Hacktivism Morally Justified? // Internet Security: Hacking, Counterhacking, and Society (2007): 73. Hindman, M. The Myth of Digital Democracy. Princeton, NJ: Princeton University Press, 2009. Hofmann, J. The Libertarian Origins of Cybercrime: Unintended Side-Effects of a Political Utopia // ESRC Research Centre Discus-sion Paper no. 62, 2010. w.lse.ac.uk/collections/CARR/pdf/DPs/ Disspaper62.pdf. Holmes, A. Defining Transparency // Nextgov, September 3, 2009. www.nextgov.com/nextgov/ng_20090903_7217.php. Holmes, A. The Risks of Open Government // Nextgov, September 14, 2009. www.nextgov.com/nextgov/ng_20090914_3118.php. Howe, J. P. Obama and Crowdsourcing: A Failed Relationship? // Wired Epicenter Blog, April 1, 2009. www.wired.com/epicenter/ 2009/04/obama-and-crowd/. Ibahrine, M. Mobile Communication and Sociopolitical Change in the Arab World // Quaderns de la Mediterránia 11 (2009): 51–60. Interview with Indira Lakshmanan of Bloomberg TV. U. S. Department of State, March 19, 2010. Issa, A. Palestine: Twitter Accused of Silencing Gaza Tribute // Global Voices, December 29, 2009. globalvoicesonline.org/2009/12/29/ palestine-twitter-accused-of-silencing-gaza-tribute/. Jaeger, P. T., Lin, J., Grimes, J. M., and S. N. Simmons Where Is the Cloud? Geography, Economics, Environment, and Jurisdiction in Cloud Computing // First Monday 14, no. 5 (2009). Jakobsen, P. V. Focus on the CNN Effect Misses the Point: The Real Media Impact on Conflict Management Is Invisible and Indirect // Journal of Peace Research 37, no. 2 (2000): 131. |