Online Book Reader

Home Category

The Net Delusion - Evgeny Morozov [195]

By Root 1841 0
14, 2009.

Balduzzi, M., et al. “Abusing Social Networks for Automated User Profiling.” International Secure Systems Lab (March 2010).

Bannon, L. J. “Forgetting as a Feature, not a Bug: The Duality of Memory and Implications for Ubiquitous Computing.” CoDesign 2, no. 1 (2006): 3-15.

Bennett, C. J., and C. D. Raab. The Governance of Privacy: Policy Instruments in Global Perspective. Farnham, UK: Ashgate, 2003.

Bilton, Nick. “An Average American Consumes 34 Gigabytes a Day, Study Says.” New York Times, December 9, 2009.

Blanchette, J. F., and D. G. Johnson. “Data Retention and the Panoptic Society: The Social Benefits of Forgetfulness.” Information Society 18, no. 1 (2002): 33-45.

“Bloggery Soobwajut, Chto FSB Prosit Udaljat’ Posty na Temu Akcij Protesta.” Rambler-Novosti, December 24, 2008. news.rambler.ru/Russia/head/1634066/?abstroff=0 .

Bonneau, J., J. Anderson, R. Anderson, and F. Stajano. “Eight Friends Are Enough: Social Graph Approximation via Public Listings.” In Proceedings of the Second ACM EuroSys Workshop on Social Network Systems, 13-18. 2009.

Bunyan, T. “Just over the Horizon: The Surveillance Society and the State in the EU.” Race & Class 51, no. 3 (2010): 1.

“Cambodia Shuts Off SMS Ahead of Elections.” Associated Press, April 2, 2007.

Carver, G. A., Jr. “Intelligence in the Age of Glasnost.” Foreign Affairs 69 (1989): 147.

Clover, Charles. “Stalin-Era Files Raided in ‘War over Memory.’” Financial Times, December 7, 2008.

Cohen, Jared. Children of Jihad: A Young American’s Travels Among the Youth of the Middle East. New York: Gotham, 2007.

Dautin, Aleksandr. “Chem Bol’she Oppozicionerov, Tem Huzhe Svjaz’?” Belorusskie Novosti, March 29, 2006. naviny.by/rubrics/mobile/2006/03/29/ic_articles_127_133799/.

Dementis, G., and G. Sousa. “A Legal Reasoning Component of a Network Security Command and Control System.” Master’s thesis, Naval Postgraduate School, Monterey, CA, 2010.

Dodge, M., and R. Kitchin. “The Ethics of Forgetting in an Age of Pervasive Computing.” CASA Working Papers 92 (2005).

Elliott, Christopher. “Hotels Connecting Dots to Online Reviewers.” Tribune Media Services, June 4, 2010.

Faris, Robert, Hal Roberts, and Stephanie Wang. “China’s Green Dam: The Implications of Government Control Encroaching on the Home PC.” OpenNet Initiative, June 2009. opennet.net/chinas-green-dam-the-implications-government-control-encroaching-home-pc.

Fassihi, Farnaz. “Iranian Crackdown Goes Global.” Wall Street Journal, December 3, 2009.

“FBI Backs Record-Keeping on Prepaid Cell Phones.” Associated Press, July 31, 2010.

George-Cosh, David. “Blackberry Maker Silent on UAE Security Talks.” National (Abu Dhabi), July 29, 2010.

“Google: Critics of Vietnam Mine Face Online Attack.” Associated Press, March 31, 2010.

“Google Says Vietnam Mine Opponents Under Cyber Attack.” BBC News, March 31, 2010.

“Government to Banish Unbranded Mobile Phones.” SiliconIndia, July 14, 2010. www.siliconindia.com/shownews/Government_to_banish_unbranded_mobile_phones_-nid-69662.html.

Graham, S., and D. Wood. “Digitizing Surveillance: Categorization, Space, Inequality.” Critical Social Policy 23, no. 2 (2003): 227.

Heintz, Jim. “Text Messages Warn of Violence in Belarus.” Associated Press, March 18, 2006.

Helft, Miguel. “Google Uses Web Searches to Track Flu’s Spread.” New York Times, November 11, 2008.

Henckel von Donnersmarck, Florian. The Lives of Others. Sony Pictures, 2006.

Hille, Kathrin. “Censorship Fears Grow as IBM Tool Bolsters Chinese Spam Curb.” Financial Times, March 25, 2010.

———. “Censorship Fears over China Spam Curb.” Financial Times, March 24, 2010.

———. “China Bolsters Internet Censors’ Scrutiny.” Financial Times, January 5, 2009.

Holland, H. Brian. “Privacy Paradox 2.0.” Widener Law Journal (forthcoming).

“Home Office Targets Terror-Related Websites.” BBC News, February 1, 2010.

Huber, M., S. Kowalski, M. Nohlberg, and S. Tjoa. “Towards Automating Social Engineering Using Social Networking Sites.” In 2009 International Conference on Computational Science and Engineering, 117-124. 2009.

“India

Return Main Page Previous Page Next Page

®Online Book Reader