Kniga-Online.club
» » » » Евгений Морозов - Интернет как иллюзия. Обратная сторона сети

Евгений Морозов - Интернет как иллюзия. Обратная сторона сети

Читать бесплатно Евгений Морозов - Интернет как иллюзия. Обратная сторона сети. Жанр: Политика издательство -, год 2004. Так же читаем полные версии (весь текст) онлайн без регистрации и SMS на сайте kniga-online.club или прочесть краткое содержание, предисловие (аннотацию), описание и ознакомиться с отзывами (комментариями) о произведении.
Перейти на страницу:

Arrington, Michael Reputation Is Dead: It’s Time to Overlook Our Indiscretions // TechCrunch, March 28, 2010. techcrunch. com/2010/03/28/reputation-is-dead-its-time-to-overlook-our-indiscretions/.

Baker, L. The Unintended Consequences of US Export Restrictions on Software and Online Services for American Foreign Policy and Human Rights // Harvard Journal of Law & Technology 23, no. 2 (2010).

Barber, B. R. The Ambiguous Effects of Digital Technology on De-mocracy in a Globalizing World / In: Innovations for an E-Society: Challenges for Technology Assessment, ed. by Banse, G., Grun-wald, A., and M. Rader, 43–56. Berlin: Edition Sigma, 2002.

Bartow, A. A Portrait of the Internet as a Young Man // Michigan Law Review 108, no. 6 (2010).

Barlow, John Perry Leaving the Physical World // EFF.org, 1993. w2.eff.org/Misc/Publications/John_Perry_Barlow/HTML/leaving_the_physical_world.html.

Baumgartner, J. C., and J. S. Morris MyFaceTube Politics: Social Networking Web Sites and Political Engagement of Young Adults // Social Science Computer Review 28, no. 1 (2010): 24.

Beniger, J. R. Personalization of Mass Media and the Growth of Pseu-do-Community // Communication Research 14, no. 3 (1987): 352.

Billing, S. Saudi Campaign to Clean Up YouTube // ITP.net, August 13, 2009. www.itp.net/564689-its-just-boredom.

Bimber, Bruce Information and American Democracy: Technology in the Evolution of Political Power. New York: Cambridge University Press, 2003.

Boudreau, John Activists Aim to Punch Holes in Online Shields of Authoritarian Regimes // San Jose Mercury News, February 17, 2010.

Brenkert, G. G. Corporate Control of Information: Business and the Freedom of Expression // Business and Society Review 115, no. 1 (2010): 121–145.

Brenkert, G. G. Google, Human Rights, and Moral Compromise // Journal of Business Ethics 85, no. 4 (2009): 453–478.

Buchstein, H. Bytes That Bite: The Internet and Deliberative De-mocracy // Constellations 4, no. 2 (1997): 248–263.

Burrell, J. Problematic Empowerment: West African Internet Scams as Strategic Misrepresentation // Information Technologies and In-ternational Development 4, no. 4 (2008): 15–30.

Burton, Matthew On the Weaponization of the Collabora-tive Web. Personal Democracy Forum, June 16, 2009. personal-democracy.com/blog-entry/weaponization-collaborative-web.

Carr, M. Slouching Towards Dystopia: The New Military Futurism // Race & Class 51, no. 3 (2010): 13.

Carr, Nicholas Is Google Making Us Stupid? // Atlantic, August 2008.

Cavelty, M. D. Cyber-Terror – Looming Threat or Phantom Me-nace? The Framing of the US Cyber-Threat Debate // Journal of Information Technology & Politics 4, no. 1 (2007): 19–36.

Clarke, Richard A., and Robert Knake Cyber War: The Next Threat to National Security and What to Do About It. New York: HarperCollins, 2010.

Clinton, Hillary Remarks on Internet Freedom. The Newseum, Washington, DC, January 21, 2010.

Clinton, Hillary Speech to Kaiser Family Foundation. March 8, 2005. Cowie, James The Proxy Fight for Iranian Democracy // Renesys

Blog, June 22, 2009. www.renesys.com/blog/2009/06/the-proxy-fight-for-iranian-de.shtml.

Curtin, M. Beyond the Vast Wasteland: The Policy Discourse of Global Television and the Politics of American Empire // Journal of Broad-casting & Electronic Media 37, no. 2 (1993): 127–145.

Dahlberg, L. Democracy via Cyberspace: Mapping the Rhetorics and Practices of Three Prominent Camps // New Media & Society 3, no. 2 (2001): 157.

Damm, J. The Internet and the Fragmentation of Chinese Society // Critical Asian Studies 39, no. 2 (2007): 273–294.

Deibert, R. J., and R. Rohozinski Risking Security: Policies and Paradoxes of Cyberspace Security // International Political Socio-logy 4, no. 1 (2010): 15–32.

Dobson, William J. Computer Programmer Takes On the World’s Despots // Newsweek, August 6, 2010.

El-Khairy, O. “Freedom’s a Lifestyle Choice”: US Cultural Diploma-cy, Empire’s Soundtrack, and Middle Eastern “Youth” in our Con-

temporary Global Infowar // Middle East Journal of Culture and Communication 2, no. 1 (2009): 115–135.

Elmusa, S. S. Faust Without the Devil? The Interplay of Technology and Culture in Saudi Arabia // Middle East Journal 51, no. 3 (1997): 345–357.

Facebook Deletes Hong Kong Groups That Oppose Pro-Beijing Party //

BBC Monitoring International Reports, February 5, 2010. Falvey, Christian Minister’s Web Monitoring Tool Off to Rocky

Start // Radio Prague, February 12, 2010.

Fandy, M. Information Technology, Trust, and Social Change in the Arab World // Middle East Journal (2000): 378–394.

Fletcher, Owen Apple Censors Dalai Lama iPhone Apps in China // IDG News Service, December 30, 2009.

Fox, J. The Uncertain Relationship Between Transparency and Account-ability // Development in Practice 17, no. 4 (2007): 663–671.

Franzese, P. W. Sovereignty in Cyberspace: Can It Exist? // Air Force Law Review 64 (2009): 1.

Fuchs, C. Some Reflections on Manuel Castells’ Book “Communication Power” // Triple C: Cognition, Communication, Co-operation 7, no. 1 (2009): 94.

Garnham, N. The Mass Media, Cultural Identity, and the Public

Sphere in the Modern World // Public Culture 5, no. 2 (1993): 251. Gilboa, E. The CNN Effect: The Search for a Communication Theory of International Relations // Political Communication 22, no. 1 (2005): 27–44.

Gilboa, E. Global Communication and Foreign Policy // Journal of Communication 52, no. 4 (2002): 731–748.

Glassman, James K., and Michael Doran How to Help

Iran’s Green Revolution // Wall Street Journal, January 21, 2010. Glenny, Misha BlackBerry is but a Skirmish in the Battle for the

Web // Financial Times, August 6, 2010.

Goldsmith, J. L., and T. Wu Digital Borders // Legal Affairs (2006): 40.

Goldsmith, J. L., and T. Wu Who Controls the Internet: Illu-sions of a Borderless World. New York: Oxford University Press, 2006.

Gunaratne, S. A. De-Westernizing Communication/Social Science Research: Opportunities and Limitations // Media, Culture & Soci-ety 32, no. 3 (2010): 473.

Guynn, J. Twitter Hires Obama Administration’s Katie Stanton // Los Angeles Times, July 10, 2010.

Hardy, M. In-Q-Tel, Google Invest in Recorded Future // Government Computer News, July 29, 2010. gcn.com/articles/2010/ 07/29/inqtel-google-fund-web-analysis-firm.aspx.

Hawkins, V. The Other Side of the CNN Factor: The Media and Con-flict // Journalism Studies 3, no. 2 (2002): 225–240.

Himma, K. E. Hacking as Politically Motivated Digital Civil Disobedience: Is Hacktivism Morally Justified? // Internet Security: Hacking, Counterhacking, and Society (2007): 73.

Hindman, M. The Myth of Digital Democracy. Princeton, NJ: Princeton University Press, 2009.

Hofmann, J. The Libertarian Origins of Cybercrime: Unintended Side-Effects of a Political Utopia // ESRC Research Centre Discus-sion Paper no. 62, 2010. w.lse.ac.uk/collections/CARR/pdf/DPs/ Disspaper62.pdf.

Holmes, A. Defining Transparency // Nextgov, September 3, 2009. www.nextgov.com/nextgov/ng_20090903_7217.php.

Holmes, A. The Risks of Open Government // Nextgov, September 14, 2009. www.nextgov.com/nextgov/ng_20090914_3118.php.

Howe, J. P. Obama and Crowdsourcing: A Failed Relationship? // Wired Epicenter Blog, April 1, 2009. www.wired.com/epicenter/ 2009/04/obama-and-crowd/.

Ibahrine, M. Mobile Communication and Sociopolitical Change in the Arab World // Quaderns de la Mediterránia 11 (2009): 51–60.

Interview with Indira Lakshmanan of Bloomberg TV. U. S. Department of State, March 19, 2010.

Issa, A. Palestine: Twitter Accused of Silencing Gaza Tribute // Global Voices, December 29, 2009. globalvoicesonline.org/2009/12/29/ palestine-twitter-accused-of-silencing-gaza-tribute/.

Jaeger, P. T., Lin, J., Grimes, J. M., and S. N. Simmons Where Is the Cloud? Geography, Economics, Environment, and Jurisdiction in Cloud Computing // First Monday 14, no. 5 (2009).

Jakobsen, P. V. Focus on the CNN Effect Misses the Point: The Real Media Impact on Conflict Management Is Invisible and Indirect // Journal of Peace Research 37, no. 2 (2000): 131.

Jenkins, H. The Chinese Columbine // Technology Review, August 2, 2002. www.technologyreview.com/read_article.aspx?id=12913&ch= infotech.

Johnson, D. G. Is the Global Information Infrastructure a Demo-cratic Technology? // Readings in Cyberethics 18 (2004): 121. Katz, J. E., and C. H. Lai News Blogging in Cross-Cultural Con-texts: A Report on the Struggle for Voice // Knowledge, Technology & Policy 22, no. 2 (2009): 95–107.

Kenner, D. Useless Democracy Promotion Efforts? There’s an App for That // FP Passport, Foreign Policy, December 31, 2009. blog. foreignpolicy.com/posts/2009/12/31/useless_democracy_promotion_efforts_theres_an_app_for_that.

Khouri, R. G. When Arabs Tweet // International Herald Tribune, July 22, 2010.

Kingsbury, P., and J. P. Jones III Walter Benjamin’s Diony-sian Adventures on Google Earth // Geoforum 40, no. 4 (2009): 502–513.

Kirkpatrick, M. Jordan Says It Will Begin Censoring Websites // Read-WriteWeb, January 14, 2010. www.readwriteweb.com/ archives/jordan_to_censor_websites.php.

Klang, M. Civil Disobedience Online // Journal of Information, Communication & Ethics in Society 2, no. 2 (2008): 2.

Kleine D., and T. Unwin Technological Revolution, Evolution and New Dependencies: What’s New About ict4d? // Third World Quarterly 30, no. 5 (2009): 1045–1067.

Kleinz, T., and C. Morris Higher Regional Court Says Online Demonstration Is Not Force // Heise Online, June 2, 2006. www. heise.de/english/newsticker/news/73827.

Kluver, R. US and Chinese Policy Expectations of the Internet // China Information 19, no. 2 (2005): 299.

Kluver, R., and P. H. Cheong Technological Modernization, the Internet, and Religion in Singapore // Journal of Computer-Medi-ated Communication 12, no. 3 (2007): 1122–1142.

Lagerkvist, J. Global Media for Global Citizenship in India and China // Peace Review 21, no. 3 (2009): 367–375.

Land, M. B. Peer Producing Human Rights // Alberta Law Review 46, no. 4 (2009).

Landler, Mark U. S. Hopes Exports Will Help Open Closed Socie-ties // New York Times, March 7, 2010.

Lee, Tae-hoon Lawmaker Calls for Stricter Access to NK Sites // Korea Times, October 6, 2009.

Lessig, L. Against Transparency // New Republic 9 (2010).

Lewis, J. Sovereignty and the Role of Government in Cyberspace //

The Brown Journal of World Affairs 16, no. 2 (2010). Lichtenstein, J. Digital Diplomacy // New York Times Magazine,

July 16, 2010.

Loftus, M. People Use Social Networking to Fight Violence, Extre-mism. U. S. Department of Defense, December 2, 2008.

Lonkila, M., and B. Gladarev Social Networks and Cellphone Use in Russia: Local Consequences of Global Communication Tech-nology // New Media & Society 10, no. 2 (2008): 273.

Luhr, N. L. Iran, Social Media, and US Trade Sanctions: The First Amendment Implications of US Foreign Policy // First Amendment Law Review 8 (2010): 500–533.

Lynch, M. Blogging the New Arab Public // Arab Media & Society 1, no. 1 (2007).

Lynch, M. The Internet Freedom Agenda // Abu Aardvark’s Middle East Blog, January 22, 2010. lynch.foreignpolicy.com/posts/2010/01/ 22/the_internet_freedom_agenda.

MacKinnon, R. China’s Censorship 2.0: How companies censor blog-gers // First Monday 14, no. 2–2 (2009).

MacKinnon, R. The Great Chinese Censorship Hoax // RCon-versation, March 14, 2006. rconversation.blogs.com/rconversation/2006/03/the_great_chine.html.

MacKinnon, R. Liberty or Safety? Both – or Neither // IEEE Spec-trum, May 2010. spectrum.ieee.org/telecom/internet/liberty-or-safety-bothor-neither.

Markoff, J. U. S. and Russian Accord on Display at Internet Meeting // New York Times, April 15, 2010.

Marosi, R. UC San Diego Professor Who Studies Disobedience Gains

Followers – and Investigators // Los Angeles Times, May 7, 2010. Martin, K. E. Internet Technologies in China: Insights on the Morally

Important Influence of Managers // Journal of Business Ethics 83, no. 3 (2008): 489–501.

McCarthy, C. Philly Targets Facebook, Twitter After Snowball Fight Turns Ugly // CNET, February 17, 2010. news.cnet.com/8301-13577_3-10455254-36.html.

McConnell, M. Mike McConnell on How to Win the Cyber-War We’re Losing // Washington Post, February 28, 2010.

McMillan, R. Citing Cybercrime, FBI Director Doesn’t Bank On-line // IDG News Service, October 7, 2009.

Mearsheimer, J. J. The Tragedy of Great Power Politics. New York: W. W. Norton, 2003.

Merelman, R. M. Technological Cultures and Liberal Democracy in the United States // Science, Technology & Human Values 25, no. 2 (2000): 167.

Metzl, J. F. Information Intervention: When Switching Channels Isn’t Enough // Foreign Affairs 76, no. 6 (1997): 15–20.

Metzl, J. F. Rwandan Genocide and the International Law of Ra-dio Jamming // American Journal of International Law 91, no. 4 (1997): 628–651.

Miller, J. Soft Power and State – Firm Diplomacy: Congress and IT Corporate Activity in China // International Studies Perspectives 10, no. 3 (2009): 285–302.

Перейти на страницу:

Евгений Морозов читать все книги автора по порядку

Евгений Морозов - все книги автора в одном месте читать по порядку полные версии на сайте онлайн библиотеки kniga-online.club.


Интернет как иллюзия. Обратная сторона сети отзывы

Отзывы читателей о книге Интернет как иллюзия. Обратная сторона сети, автор: Евгений Морозов. Читайте комментарии и мнения людей о произведении.


Уважаемые читатели и просто посетители нашей библиотеки! Просим Вас придерживаться определенных правил при комментировании литературных произведений.

  • 1. Просьба отказаться от дискриминационных высказываний. Мы защищаем право наших читателей свободно выражать свою точку зрения. Вместе с тем мы не терпим агрессии. На сайте запрещено оставлять комментарий, который содержит унизительные высказывания или призывы к насилию по отношению к отдельным лицам или группам людей на основании их расы, этнического происхождения, вероисповедания, недееспособности, пола, возраста, статуса ветерана, касты или сексуальной ориентации.
  • 2. Просьба отказаться от оскорблений, угроз и запугиваний.
  • 3. Просьба отказаться от нецензурной лексики.
  • 4. Просьба вести себя максимально корректно как по отношению к авторам, так и по отношению к другим читателям и их комментариям.

Надеемся на Ваше понимание и благоразумие. С уважением, администратор kniga-online.


Прокомментировать
Подтвердите что вы не робот:*
Подтвердите что вы не робот:*