Online Book Reader

Home Category

The Net Delusion - Evgeny Morozov [196]

By Root 1795 0
Bans Chinese Telecom Equipment.” Associated Press, April 30, 2010.

“Iran’s Police Vow No Tolerance Towards Protesters.” Reuters, February 6, 2010.

Johnson, Carolyn Y. “Project ‘Gaydar’: An MIT Experiment Raises New Questions About Online Privacy.” Boston Globe, September 20, 2009.

Jonietz, Erika. “Augmented Identity.” Technology Review, February 23, 2010. www.technologyreview.com/computing/24639/?a=f.

Kazmin, Amy. “Police Threaten Kashmiri Facebook Users.” Financial Times, July 19, 2010.

Kirk, Jeremy. “Vietnam Rebuffs Hacking Claims from Google.” IDG News Service, April 6, 2010.

Kondrat’ev, Aleksandr, and Taras Podrez. “Minkomsvjazi Vydelit 10 mln Rub. na E-mail Adresa na Kirillice.” Gazeta Marker, June 4, 2010. www.marker.ru/news/891.

Krishna, Jai. “India Minister: Security Agencies Have Concerns over Blackberry Services.” Wall Street Journal, July 27, 2010.

Lemos, Robert. “Your Groups Tell Hackers Who You Are.” Technology Review, July 23, 2010. www.technologyreview.com/printer_friendly_article.aspx?id=25852&channel=web§ion=.

Lukyanenko, Peter, and Cathy Young. “Tricks of the KGB trade.” Harper’s Magazine , January 1992.

Mayer-Schonberger, Viktor. Delete: The Virtue of Forgetting in the Digital Age. Princeton, NJ: Princeton University Press, 2009.

McMillan, Robert. “Activists Worry About a New ‘Green Dam’ in Vietnam.” IDG News Service, June 4, 2010.

Morar, Natalia. “Blog for Democracy, from the Streets of Moldova.” OpenDemocracy , April 8, 2009. www.opendemocracy.net/article/email/blog-for-democracy-from-the-streets-of-moldova.

“Moskovskaja Milicija Monitorit Twitter.” Vebplaneta, November 10, 2009. webplanet.ru/news/life/2009/11/10/iopasnaitrudna.html.

Mumford, Lewis. The Pentagon of Power. New York: Harcourt Brace Jovanovich, 1974.

“Nigeria: New Policy on Mobile Phone SIM Cards.” Daily Trust, January 11, 2010. allafrica.com/stories/201001110286.html.

“Note to Readers.” New York Times, September 13, 2009. www.nytimes.com/2009/09/13/business/media/13note.html? _r=1.

Owad, Tom. “Data Mining 101: Finding Subversives with Amazon Wishlists.” Applefritter, January 4, 2006. www.applefritter.com/bannedbooks.

“P2P Comes to the Aid of Audiovisual Search.” PhysOrg.com. November 18, 2009.www.physorg.com/news177780052.html.

Page, Lewis. “NSA Offering ‘Billions’ for Skype Eavesdrop Solution.” Register, February 12, 2009. www.theregister.co.uk/2009/02/12/nsa_offers_billions_for_skype_pwnage/.

Palmer, Maija. “Face Recognition Software Gaining a Broader Canvas.” Financial Times, May 22, 2010.

———. “Google Debates Face Recognition Technology After Privacy Blunders.” Financial Times, May 20, 2010.

Pankavec, Zmіcer. “KDB Verbue Praz vkontakte.ru.” Nasha Nіva, December 19, 2009.

Peterson, Kristina. “Intelligence Agents Borrow Wall Street Trading Technology.” Wall Street Journal, May 28, 2010.

Pljuwev, Aleksandr. “Poiskovye Sistemy Kak Strategicheskij i Politicheskij Resurs.” Tochka, Jeho Moskvy, January 24, 2010. echo.msk.ru/programs/tochka/651123-echo/ .

Scheck, Justin. “Stalkers Exploit Cellphone GPS.” What They Know series, Wall Street Journal, August 3, 2010.

Sharma, A. “Cyber Wars: A Paradigm Shift from Means to Ends.” Strategic Analysis 34, no. 1 (2010): 62-73.

Simonite, Tom. “Surveillance Software Knows What a Camera Sees.” Technology Review, June 1, 2010. www.technologyreview.com/computing/25439/?a=f.

Soar, Daniel. “Short Cuts.” London Review of Books, August 14, 2008.

Soghoian, Christopher. “Caught in the Cloud: Privacy, Encryption, and Government Back Doors in the Web 2.0 Era.” Journal of Telecommunications and High Technology Law, August 17, 2009.

———. “Exclusive: Widespread Cell Phone Location Snooping by NSA?” Surveillance State, CNET News, September 8, 2008. news.cnet.com/8301-13739_3-10030134-46.html?tag=mncol;title .

Solove, Daniel J. The Digital Person: Technology and Privacy in the Information Age. Ex Machina. New York: New York University Press, 2004.

———. “Do Social Networks Bring the End of Privacy?” Scientific American, September 2008.

———. “I’ve Got Nothing to Hide and Other Misunderstandings

Return Main Page Previous Page Next Page

®Online Book Reader