Arrington, Michael Reputation Is Dead: It’s Time to Overlook Our Indiscretions // TechCrunch, March 28, 2010. techcrunch. com/2010/03/28/reputation-is-dead-its-time-to-overlook-our-indiscretions/.
Baker, L. The Unintended Consequences of US Export Restrictions on Software and Online Services for American Foreign Policy and Human Rights // Harvard Journal of Law & Technology 23, no. 2 (2010).
Barber, B. R. The Ambiguous Effects of Digital Technology on De-mocracy in a Globalizing World / In: Innovations for an E-Society: Challenges for Technology Assessment, ed. by Banse, G., Grun-wald, A., and M. Rader, 43–56. Berlin: Edition Sigma, 2002.
Bartow, A. A Portrait of the Internet as a Young Man // Michigan Law Review 108, no. 6 (2010).
Barlow, John Perry Leaving the Physical World // EFF.org, 1993. w2.eff.org/Misc/Publications/John_Perry_Barlow/HTML/leaving_the_physical_world.html.
Baumgartner, J. C., and J. S. Morris MyFaceTube Politics: Social Networking Web Sites and Political Engagement of Young Adults // Social Science Computer Review 28, no. 1 (2010): 24.
Beniger, J. R. Personalization of Mass Media and the Growth of Pseu-do-Community // Communication Research 14, no. 3 (1987): 352.
Billing, S. Saudi Campaign to Clean Up YouTube // ITP.net, August 13, 2009. www.itp.net/564689-its-just-boredom.
Bimber, Bruce Information and American Democracy: Technology in the Evolution of Political Power. New York: Cambridge University Press, 2003.
Boudreau, John Activists Aim to Punch Holes in Online Shields of Authoritarian Regimes // San Jose Mercury News, February 17, 2010.
Brenkert, G. G. Corporate Control of Information: Business and the Freedom of Expression // Business and Society Review 115, no. 1 (2010): 121–145.
Brenkert, G. G. Google, Human Rights, and Moral Compromise // Journal of Business Ethics 85, no. 4 (2009): 453–478.
Buchstein, H. Bytes That Bite: The Internet and Deliberative De-mocracy // Constellations 4, no. 2 (1997): 248–263.
Burrell, J. Problematic Empowerment: West African Internet Scams as Strategic Misrepresentation // Information Technologies and In-ternational Development 4, no. 4 (2008): 15–30.
Burton, Matthew On the Weaponization of the Collabora-tive Web. Personal Democracy Forum, June 16, 2009. personal-democracy.com/blog-entry/weaponization-collaborative-web.
Carr, M. Slouching Towards Dystopia: The New Military Futurism // Race & Class 51, no. 3 (2010): 13.
Carr, Nicholas Is Google Making Us Stupid? // Atlantic, August 2008.
Cavelty, M. D. Cyber-Terror – Looming Threat or Phantom Me-nace? The Framing of the US Cyber-Threat Debate // Journal of Information Technology & Politics 4, no. 1 (2007): 19–36.
Clarke, Richard A., and Robert Knake Cyber War: The Next Threat to National Security and What to Do About It. New York: HarperCollins, 2010.
Clinton, Hillary Remarks on Internet Freedom. The Newseum, Washington, DC, January 21, 2010.
Clinton, Hillary Speech to Kaiser Family Foundation. March 8, 2005. Cowie, James The Proxy Fight for Iranian Democracy // Renesys
Blog, June 22, 2009. www.renesys.com/blog/2009/06/the-proxy-fight-for-iranian-de.shtml.
Curtin, M. Beyond the Vast Wasteland: The Policy Discourse of Global Television and the Politics of American Empire // Journal of Broad-casting & Electronic Media 37, no. 2 (1993): 127–145.
Dahlberg, L. Democracy via Cyberspace: Mapping the Rhetorics and Practices of Three Prominent Camps // New Media & Society 3, no. 2 (2001): 157.
Damm, J. The Internet and the Fragmentation of Chinese Society // Critical Asian Studies 39, no. 2 (2007): 273–294.
Deibert, R. J., and R. Rohozinski Risking Security: Policies and Paradoxes of Cyberspace Security // International Political Socio-logy 4, no. 1 (2010): 15–32.
Dobson, William J. Computer Programmer Takes On the World’s Despots // Newsweek, August 6, 2010.
El-Khairy, O. “Freedom’s a Lifestyle Choice”: US Cultural Diploma-cy, Empire’s Soundtrack, and Middle Eastern “Youth” in our Con-
temporary Global Infowar // Middle East Journal of Culture and Communication 2, no. 1 (2009): 115–135.
Elmusa, S. S. Faust Without the Devil? The Interplay of Technology and Culture in Saudi Arabia // Middle East Journal 51, no. 3 (1997): 345–357.
Facebook Deletes Hong Kong Groups That Oppose Pro-Beijing Party //
BBC Monitoring International Reports, February 5, 2010. Falvey, Christian Minister’s Web Monitoring Tool Off to Rocky
Start // Radio Prague, February 12, 2010.
Fandy, M. Information Technology, Trust, and Social Change in the Arab World // Middle East Journal (2000): 378–394.
Fletcher, Owen Apple Censors Dalai Lama iPhone Apps in China // IDG News Service, December 30, 2009.
Fox, J. The Uncertain Relationship Between Transparency and Account-ability // Development in Practice 17, no. 4 (2007): 663–671.
Franzese, P. W. Sovereignty in Cyberspace: Can It Exist? // Air Force Law Review 64 (2009): 1.
Fuchs, C. Some Reflections on Manuel Castells’ Book “Communication Power” // Triple C: Cognition, Communication, Co-operation 7, no. 1 (2009): 94.
Garnham, N. The Mass Media, Cultural Identity, and the Public
Sphere in the Modern World // Public Culture 5, no. 2 (1993): 251. Gilboa, E. The CNN Effect: The Search for a Communication Theory of International Relations // Political Communication 22, no. 1 (2005): 27–44.
Gilboa, E. Global Communication and Foreign Policy // Journal of Communication 52, no. 4 (2002): 731–748.
Glassman, James K., and Michael Doran How to Help
Iran’s Green Revolution // Wall Street Journal, January 21, 2010. Glenny, Misha BlackBerry is but a Skirmish in the Battle for the
Web // Financial Times, August 6, 2010.
Goldsmith, J. L., and T. Wu Digital Borders // Legal Affairs (2006): 40.
Goldsmith, J. L., and T. Wu Who Controls the Internet: Illu-sions of a Borderless World. New York: Oxford University Press, 2006.
Gunaratne, S. A. De-Westernizing Communication/Social Science Research: Opportunities and Limitations // Media, Culture & Soci-ety 32, no. 3 (2010): 473.
Guynn, J. Twitter Hires Obama Administration’s Katie Stanton // Los Angeles Times, July 10, 2010.
Hardy, M. In-Q-Tel, Google Invest in Recorded Future // Government Computer News, July 29, 2010. gcn.com/articles/2010/ 07/29/inqtel-google-fund-web-analysis-firm.aspx.
Hawkins, V. The Other Side of the CNN Factor: The Media and Con-flict // Journalism Studies 3, no. 2 (2002): 225–240.
Himma, K. E. Hacking as Politically Motivated Digital Civil Disobedience: Is Hacktivism Morally Justified? // Internet Security: Hacking, Counterhacking, and Society (2007): 73.
Hindman, M. The Myth of Digital Democracy. Princeton, NJ: Princeton University Press, 2009.
Hofmann, J. The Libertarian Origins of Cybercrime: Unintended Side-Effects of a Political Utopia // ESRC Research Centre Discus-sion Paper no. 62, 2010. w.lse.ac.uk/collections/CARR/pdf/DPs/ Disspaper62.pdf.
Holmes, A. Defining Transparency // Nextgov, September 3, 2009. www.nextgov.com/nextgov/ng_20090903_7217.php.
Holmes, A. The Risks of Open Government // Nextgov, September 14, 2009. www.nextgov.com/nextgov/ng_20090914_3118.php.
Howe, J. P. Obama and Crowdsourcing: A Failed Relationship? // Wired Epicenter Blog, April 1, 2009. www.wired.com/epicenter/ 2009/04/obama-and-crowd/.
Ibahrine, M. Mobile Communication and Sociopolitical Change in the Arab World // Quaderns de la Mediterránia 11 (2009): 51–60.
Interview with Indira Lakshmanan of Bloomberg TV. U. S. Department of State, March 19, 2010.
Issa, A. Palestine: Twitter Accused of Silencing Gaza Tribute // Global Voices, December 29, 2009. globalvoicesonline.org/2009/12/29/ palestine-twitter-accused-of-silencing-gaza-tribute/.
Jaeger, P. T., Lin, J., Grimes, J. M., and S. N. Simmons Where Is the Cloud? Geography, Economics, Environment, and Jurisdiction in Cloud Computing // First Monday 14, no. 5 (2009).
Jakobsen, P. V. Focus on the CNN Effect Misses the Point: The Real Media Impact on Conflict Management Is Invisible and Indirect // Journal of Peace Research 37, no. 2 (2000): 131.
Jenkins, H. The Chinese Columbine // Technology Review, August 2, 2002. www.technologyreview.com/read_article.aspx?id=12913&ch= infotech.
Johnson, D. G. Is the Global Information Infrastructure a Demo-cratic Technology? // Readings in Cyberethics 18 (2004): 121. Katz, J. E., and C. H. Lai News Blogging in Cross-Cultural Con-texts: A Report on the Struggle for Voice // Knowledge, Technology & Policy 22, no. 2 (2009): 95–107.
Kenner, D. Useless Democracy Promotion Efforts? There’s an App for That // FP Passport, Foreign Policy, December 31, 2009. blog. foreignpolicy.com/posts/2009/12/31/useless_democracy_promotion_efforts_theres_an_app_for_that.
Khouri, R. G. When Arabs Tweet // International Herald Tribune, July 22, 2010.
Kingsbury, P., and J. P. Jones III Walter Benjamin’s Diony-sian Adventures on Google Earth // Geoforum 40, no. 4 (2009): 502–513.
Kirkpatrick, M. Jordan Says It Will Begin Censoring Websites // Read-WriteWeb, January 14, 2010. www.readwriteweb.com/ archives/jordan_to_censor_websites.php.
Klang, M. Civil Disobedience Online // Journal of Information, Communication & Ethics in Society 2, no. 2 (2008): 2.
Kleine D., and T. Unwin Technological Revolution, Evolution and New Dependencies: What’s New About ict4d? // Third World Quarterly 30, no. 5 (2009): 1045–1067.
Kleinz, T., and C. Morris Higher Regional Court Says Online Demonstration Is Not Force // Heise Online, June 2, 2006. www. heise.de/english/newsticker/news/73827.
Kluver, R. US and Chinese Policy Expectations of the Internet // China Information 19, no. 2 (2005): 299.
Kluver, R., and P. H. Cheong Technological Modernization, the Internet, and Religion in Singapore // Journal of Computer-Medi-ated Communication 12, no. 3 (2007): 1122–1142.
Lagerkvist, J. Global Media for Global Citizenship in India and China // Peace Review 21, no. 3 (2009): 367–375.
Land, M. B. Peer Producing Human Rights // Alberta Law Review 46, no. 4 (2009).
Landler, Mark U. S. Hopes Exports Will Help Open Closed Socie-ties // New York Times, March 7, 2010.
Lee, Tae-hoon Lawmaker Calls for Stricter Access to NK Sites // Korea Times, October 6, 2009.
Lessig, L. Against Transparency // New Republic 9 (2010).
Lewis, J. Sovereignty and the Role of Government in Cyberspace //
The Brown Journal of World Affairs 16, no. 2 (2010). Lichtenstein, J. Digital Diplomacy // New York Times Magazine,
July 16, 2010.
Loftus, M. People Use Social Networking to Fight Violence, Extre-mism. U. S. Department of Defense, December 2, 2008.
Lonkila, M., and B. Gladarev Social Networks and Cellphone Use in Russia: Local Consequences of Global Communication Tech-nology // New Media & Society 10, no. 2 (2008): 273.
Luhr, N. L. Iran, Social Media, and US Trade Sanctions: The First Amendment Implications of US Foreign Policy // First Amendment Law Review 8 (2010): 500–533.
Lynch, M. Blogging the New Arab Public // Arab Media & Society 1, no. 1 (2007).
Lynch, M. The Internet Freedom Agenda // Abu Aardvark’s Middle East Blog, January 22, 2010. lynch.foreignpolicy.com/posts/2010/01/ 22/the_internet_freedom_agenda.
MacKinnon, R. China’s Censorship 2.0: How companies censor blog-gers // First Monday 14, no. 2–2 (2009).
MacKinnon, R. The Great Chinese Censorship Hoax // RCon-versation, March 14, 2006. rconversation.blogs.com/rconversation/2006/03/the_great_chine.html.
MacKinnon, R. Liberty or Safety? Both – or Neither // IEEE Spec-trum, May 2010. spectrum.ieee.org/telecom/internet/liberty-or-safety-bothor-neither.
Markoff, J. U. S. and Russian Accord on Display at Internet Meeting // New York Times, April 15, 2010.
Marosi, R. UC San Diego Professor Who Studies Disobedience Gains
Followers – and Investigators // Los Angeles Times, May 7, 2010. Martin, K. E. Internet Technologies in China: Insights on the Morally
Important Influence of Managers // Journal of Business Ethics 83, no. 3 (2008): 489–501.
McCarthy, C. Philly Targets Facebook, Twitter After Snowball Fight Turns Ugly // CNET, February 17, 2010. news.cnet.com/8301-13577_3-10455254-36.html.
McConnell, M. Mike McConnell on How to Win the Cyber-War We’re Losing // Washington Post, February 28, 2010.
McMillan, R. Citing Cybercrime, FBI Director Doesn’t Bank On-line // IDG News Service, October 7, 2009.
Mearsheimer, J. J. The Tragedy of Great Power Politics. New York: W. W. Norton, 2003.
Merelman, R. M. Technological Cultures and Liberal Democracy in the United States // Science, Technology & Human Values 25, no. 2 (2000): 167.
Metzl, J. F. Information Intervention: When Switching Channels Isn’t Enough // Foreign Affairs 76, no. 6 (1997): 15–20.
Metzl, J. F. Rwandan Genocide and the International Law of Ra-dio Jamming // American Journal of International Law 91, no. 4 (1997): 628–651.
Miller, J. Soft Power and State – Firm Diplomacy: Congress and IT Corporate Activity in China // International Studies Perspectives 10, no. 3 (2009): 285–302.