Категории
Самые читаемые
Лучшие книги » Научные и научно-популярные книги » Политика » Интернет как иллюзия. Обратная сторона сети - Евгений Морозов

Интернет как иллюзия. Обратная сторона сети - Евгений Морозов

Читать онлайн Интернет как иллюзия. Обратная сторона сети - Евгений Морозов

Шрифт:

-
+

Интервал:

-
+

Закладка:

Сделать
1 ... 89 90 91 92 93 94 95 96 97 ... 100
Перейти на страницу:

Walker, Christopher Repressing the Media // Miami Herald, April 30, 2010.

Wang, Z. Explaining Regime Strength in China // China: An International Journal 4, no. 2 (2006): 217–237.

Watts, Jonathan Old Suspicions Magnified Mistrust into Ethnic Ri-ots in Urumqi // Guardian, July 10, 2009.

Wong, E. Vice President Turns to Speech Editing // New York Times, May 13, 2010.

Wu, Zhong China’s Internet Awash with State Spies // Asia Times On-line, August 14, 2008. www.atimes.com/atimes/China/JH14Ad01. html.

Ye, J. “Hidden Cat”: A Prisoner’s Death Gives New Meaning to Chil-dren’s Game // China Real Time Report Blog, Wall Street Jour-nal, February 18, 2009. blogs.wsj.com/chinarealtime/2009/02/18/ hidden-cat-a-prisoners-death-gives-new-meaning-to-childrens-game/.

Yiannopoulos, M. What is “The Streisand Effect”? // Milo Yian-nopoulos Blog, Daily Telegraph, January 31, 2009. blogs.telegraph. co.uk/technology/miloyiannopoulos/8248311/What_is_The_ Streisand_Effect/.

Zhang, J. Will the Government “Serve the People”? The Development of

Chinese E-Government // New Media & Society 4, no. 2 (2002): 163. Zhou, Yu The Inside Story of China’s High-Tech Industry: Making Sil-icon Valley in Beijing. Lanham, MD: Rowman & Littlefield, 2008.

Глава 6. КГБ приглашает вас в “Фейсбук”

Андрианов К., Козенко А. “Мемориал” повернул обыск вспять // Коммерсант, 21 марта 2009 года. www.kommersant.ru/doc.aspx? DocsID=1142280.

Блогеры сообщают, что ФСБ просит удалять посты на тему акций протеста // Рамблер-Новости, 24 декабря 2008 года. news. rambler.ru/Russia/head/1634066/?abstroff=0.

Даутин А. Чем больше оппозиционеров, тем хуже связь? // Белорусские новости, 29 марта 2006 года. naviny.by/rubrics/mo-bile/2006/03/29/ic_articles_127_133799/.

Кондратьев А., Подрез Т. Минкомсвязи выделит 10 млн руб. на e-mail адреса на кириллице // Маркер, 4 июня 2010 года. www. marker.ru/news/891.

Московская милиция мониторит “Твиттер” // Вебпланета, 10 ноября 2009 года. webplanet.ru/news/life/2009/11/10/iopasnaitrud-na.html.

Плющев, Александр Поисковые системы как стратегический и политический ресурс // Эхо Москвы, 24 января 2010 года. echo.msk.ru/programs/tochka/651123-echo/.

Панкавец, Зміцер КДБ вербуе праз vkontakte.ru // Наша нiва, 19 декабря 2009 года. http://nn.by/?c=ar&i=23079.

Armstrong Moore, E. Google Flu Trends: Take with Grain of Salt // CNET News, May 17, 2010. news.cnet.com/8301-27083_3-20005150-247.html.

Azerbaijani Authorities Interrogate Music Fan over Eurovision Vote for Armenia // Radio Free Europe/Radio Liberty, August 14, 2009.

Balduzzi, M., et al. Abusing Social Networks for Automated User

Profiling // International Secure Systems Lab (March 2010). Bannon, L. J. Forgetting as a Feature, not a Bug: The Duality of Me-mory and Implications for Ubiquitous Computing // CoDesign 2, no. 1 (2006): 3–15.

Bennett, C. J., and C. D. Raab The Governance of Privacy: Policy Instruments in Global Perspective. Farnham, UK: Ashgate, 2003.

Bilton, N. An Average American Consumes 34 Gigabytes a Day, Study Says // New York Times, December 9, 2009.

Blanchette, J. F., and D. G. Johnson Data Retention and the Panoptic Society: The Social Benefits of Forgetfulness // Information Society 18, no. 1 (2002): 33–45.

Bonneau, J., Anderson, J., Anderson, R., and F. Stajano Eight Friends Are Enough: Social Graph Approximation via Public Listings / In: Proceedings of the Second ACM EuroSys Workshop on Social Network Systems, 13–18. 2009.

Bunyan, T. Just over the Horizon: The Surveillance Society and the State in the EU // Race & Class 51, no. 3 (2010): 1.

Cambodia Shuts Off SMS Ahead of Elections // Associated Press, April 2, 2007.

Carver, G. A., Jr. Intelligence in the Age of Glasnost // Foreign Af-fairs 69 (1989): 147.

Clover, C. Stalin-Era Files Raided in “War over Memory” // Finan-cial Times, December 7, 2008.

Cohen, J. Children of Jihad: A Young American’s Travels Among the Youth of the Middle East. New York: Gotham, 2007.

Dementis, G., and G. Sousa A Legal Reasoning Component of a Network Security Command and Control System. Master’s thesis, Naval Postgraduate School, Monterey, CA, 2010.

Dodge, M., and R. Kitchin The Ethics of Forgetting in an Age of

Pervasive Computing // CASA Working Papers 92 (2005). Elliott, C. Hotels Connecting Dots to Online Reviewers // Tribune

Media Services, June 4, 2010.

Faris, R., Roberts, H, and S. Wang China’s Green Dam: The Implications of Government Control Encroaching on the Home PC // OpenNet Initiative, June 2009. opennet.net/chinas-green-dam-the-implications-government-control-encroaching-home-pc.

Fassihi, F. Iranian Crackdown Goes Global // Wall Street Journal, December 3, 2009.

FBI Backs Record-Keeping on Prepaid Cell Phones // Associated Press, July 31, 2010.

George-Cosh, D. Blackberry Maker Silent on UAE Security Talks // National (Abu Dhabi), July 29, 2010.

Google: Critics of Vietnam Mine Face Online Attack // Associated Press, March 31, 2010.

Google Says Vietnam Mine Opponents Under Cyber Attack // BBC News, March 31, 2010.

Government to Banish Unbranded Mobile Phones // SiliconIndia, July 14, 2010.www.siliconindia.com/shownews/Government_to_banish_ unbranded_mobile_phones_-nid-69662.html.

Graham, S., and D. Wood Digitizing Surveillance: Categorization, Space, Inequality // Critical Social Policy 23, no. 2 (2003): 227. Heintz, J. Text Messages Warn of Violence in Belarus // Associated

Press, March 18, 2006.

Helft, M. Google Uses Web Searches to Track Flu’s Spread // New York Times, November 11, 2008.

Hille, K. Censorship Fears Grow as IBM Tool Bolsters Chinese Spam Curb // Financial Times, March 25, 2010.

Hille, K. Censorship Fears over China Spam Curb // Financial Times, March 24, 2010.

Hille, K. China Bolsters Internet Censors’ Scrutiny // Financial Times, January 5, 2009.

Holland, H. B. Privacy Paradox 2.0 // 19 Widener Law Journal 893 (2010).

Home Office Targets Terror-Related Websites // BBC News, February 1, 2010.

Huber, M., Kowalski, S., Nohlberg, M., and S. Tjoa To-wards Automating Social Engineering Using Social Networking Sites / In: 2009 International Conference on Computational Science and Engineering, 117–124.

India Bans Chinese Telecom Equipment // Associated Press, April 30, 2010. Iran’s Police Vow No Tolerance Towards Protesters // Reuters, Febru-ary 6, 2010.

Johnson, C. Y. Project “Gaydar”: An MIT Experiment Raises New Questions About Online Privacy // Boston Globe, September 20, 2009.

Jonietz, E. Augmented Identity // Technology Review, February 23,

2010. www.technologyreview.com/computing/24639/?a=f. Kazmin, A. Police Threaten Kashmiri Facebook Users // Financial

Times, July 19, 2010.

Kirk, J. Vietnam Rebuffs Hacking Claims from Google // IDG News Service, April 6, 2010.

Krishna, Jai India Minister: Security Agencies Have Concerns over Blackberry Services // Wall Street Journal, July 27, 2010.

Lemos, Robert Your Groups Tell Hackers Who You Are // Technology Review, July 23, 2010. www.technologyreview.com/printer_friendly_ article.aspx?id=25852&channel=web&section=.

Lukyanenko, Peter, and Cathy Young Tricks of the KGB trade // Harper’s Magazine, January 1992.

Mayer-Schonberger, Viktor Delete: The Virtue of Forgetting in the Digital Age. Princeton, NJ: Princeton University Press, 2009.

McMillan, Robert Activists Worry About a New “Green Dam” in Vietnam // IDG News Service, June 4, 2010.

Morar, Natalia Blog for Democracy, from the Streets of Moldova // Open-Democracy, April 8, 2009. www.opendemocracy.net/arti-cle/email/blog-for-democracy-from-the-streets-of-moldova.

Mumford, Lewis The Pentagon of Power. New York: Harcourt Brace Jovanovich, 1974.

Nigeria: New Policy on Mobile Phone SIM Cards // Daily Trust, Janu-ary 11, 2010. allafrica.com/stories/201001110286.html.

Note to Readers // New York Times, September 13, 2009. www.nytimes. com/2009/09/13/business/media/13note.html?_r=1.

Owad, Tom Data Mining 101: Finding Subversives with Amazon Wishlists // Applefritter, January 4, 2006. www.applefritter.com/ bannedbooks.

P2P Comes to the Aid of Audiovisual Search // PhysOrg.com. Novem-ber 18, 2009. www.physorg.com/news177780052.html.

Page, Lewis NSA Offering “Billions” for Skype Eavesdrop Solution // Register, February 12, 2009. www.theregister.co.uk/2009/02/12/ nsa_offers_billions_for_skype_pwnage/.

Palmer, Maija Face Recognition Software Gaining a Broader Can-vas // Financial Times, May 22, 2010.

Palmer, Maija Google Debates Face Recognition Technology After Privacy Blunders // Financial Times, May 20, 2010.

Peterson, Kristina Intelligence Agents Borrow Wall Street Trading Technology // Wall Street Journal, May 28, 2010.

Scheck, Justin Stalkers Exploit Cellphone GPS // What They Know series, Wall Street Journal, August 3, 2010.

Sharma, A. Cyber Wars: A Paradigm Shift from Means to Ends // Stra-tegic Analysis 34, no. 1 (2010): 62–73.

Simonite, Tom Surveillance Software Knows What a Camera Sees // Technology Review, June 1, 2010. www.technologyreview. com/computing/25439/?a=f.

Soar, Daniel Short Cuts // London Review of Books, August 14, 2008. Soghoian, Christopher Caught in the Cloud: Privacy, Encryption, and Government Back Doors in the Web 2.0 Era // Journal

of Telecommunications and High Technology Law, August 17, 2009.

Soghoian, Christopher Exclusive: Widespread Cell Phone Lo-cation Snooping by NSA? // Surveillance State, CNET News, September 8, 2008. news.cnet.com/8301-13739_3-10030134-46. html?tag=mncol;title.

Solove, Daniel J. The Digital Person: Technology and Privacy in the Information Age. Ex Machina. New York: New York University Press, 2004.

Solove, Daniel J. Do Social Networks Bring the End of Privacy? // Scientific American, September 2008.

Solove, Daniel J. I’ve Got Nothing to Hide and Other Misunder-standings of Privacy // San Diego Law Review 44 (2007): 745. Solove, Daniel J. Understanding Privacy. Cambridge, MA: Harvard

University Press, 2008.

Sternstein, Aliya Lawmaker Questions White House Official’s Use of Gmail // Nextgov, April 12, 2010. www.nextgov.com/next-gov/ng_20100412_6003.php.

Stone, Brad T. M. I.? Not for Sites Focused on Sharing // New York Times, April 22, 2010.

Timmons, Heather India Wary of Chinese Telecom Equipment // New York Times, April 30, 2010.

Vietnam: Farmers to Get Free Computers in Plan to Boost Production // Thai Press Reports, April 14, 2010.

Vietnam Launches Own Social Network Site // Agence France-Presse, May 22, 2010.

Vietnam Politics: A State-Run Social Networking Website Is Launched // EIU ViewsWire, June 7, 2010.

Vietnam Steps Up China-Style Internet Control // Agence France-Pres-se, July 1, 2010.

Villeneuve, Nart, and Greg Walton 0day”: Civil Society and Cyber Security. Malware Lab, October 28, 2009. malwarelab. org/2009/10/0day-civil-society-and-cyber-security/.

Wells-Dang, A. Political Space in Vietnam: A View from the “Rice-Roots” // Pacific Review 23, no. 1 (2010): 93–112.

Wigglesworth, Robin UAE Comments Raise Fears of Crackdown on Black-Berry // Financial Times, July 26, 2010.

Wines, Michael In Restive Chinese Area, Cameras Keep Watch // New York Times, August 2, 2010.

Wondracek, G., Holz, T., Kirda, E., Antipolis, S., and

C. Kruegel A Practical Attack to De-Anonymize Social Net-work Users / In: 2010 IEEE Symposium on Security and Privacy, 223–238. 2010.

Young, Martin J. Vietnam Strengthens Firewall // Asia Times On-line, June 19, 2010. www.atimes.com/atimes/Global_Economy/ LF19Dj03.html.

Zetter, Kim Tor Researcher Who Exposed Embassy E-mail Passwords Gets Raided by Swedish FBI and CIA // Threat Level, Wired, No-vember 14, 2007. www.wired.com/threatlevel/2007/11/swedish-researc/.

Глава 7. Кьеркегор против диванных активистов

Agre, P. E. The Practical Republic: Social Skills and the Progress of Citi-zenship // Community in the Digital Age: Philosophy and Practice (2004): 201–223.

Alexander, M. G., and S. Levin Theoretical, Empirical, and

Practical Approaches to Intergroup Conflict // Journal of Social Is-sues 54, no. 4 (1998): 629–639.

Alinsky, Saul David Rules for Radicals: A Practical Primer for Re-alistic Radicals. New York: Vintage Books, 1989.

Arguello, J., Butler, B. S., Joyce, E., Kraut, R., Ling,

K. S., RosÉ, C., and X. Wang Talk to Me: Foundations for Successful Individual-Group Interactions in Online Communities / In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 968. 2006.

1 ... 89 90 91 92 93 94 95 96 97 ... 100
Перейти на страницу:
На этой странице вы можете бесплатно скачать Интернет как иллюзия. Обратная сторона сети - Евгений Морозов торрент бесплатно.
Комментарии