REFERENCES
- Alterman, J. B. (2011). The revolution will not be tweeted. The Washington Quarterly, 34(4), 103–116.
- Bamford, J. (2015). Battle in the cloud: America isn’t being honest about its cyberwars. Foreign Policy, 214, 102–103. http://foreignpolicy.com/2015/09/29/what-snowden-told-me-about-the-nsa-offensive-capabilities
- Bishara, M. (2012). The invisible Arab: The promise and peril of the Arab revolution. New York, NY: Nation Books.
- Burchill, S. (2009). Liberalism. In S. Burchill, A. Linklater, R. Devetak, J. Donnelly, T. Nardin, M. Paterson, C. Reus-Smit, and J. True (Eds.), Theories of international relations (4th ed., pp. 57–85). New York, NY: Palgrave/Macmillan.
- Carty, V. (2011). Wired and mobilizing: Social movements, new technology, and electoral politics. New York, NY: Routledge.
- Chalcraft, J. (2012). Horizontalism in the Egyptian revolutionary process. Middle East Report, 42(1), 6–11.
- Diamond, L. (2010). Liberation technology. Journal of Democracy, 21(3), 69–83. doi:10.1353/jod.0.0190
- Donahoe, E. (2014). Human rights in the digital age. Retrieved from https://www.hrw.org/news/2014/12/23/human-rights-digital-age
- Franklin, M. (2015). Defending human rights in a digital age. Retrieved from https://www.opendemocracy.net/can-europe-make-it/marianne-franklin/defending-human-rights-in-digital-age
- Ghonim, W. (2012). Revolution 2.0: The power of the people is greater than the people in power, a memoir. Boston, MA: Houghton Mifflin Harcourt.
- Gunitsky, S. (2015). Corrupting the cyber-commons: Social media as a tool of autocratic stability. Perspectives on Politics, 13(1), 42–54. doi:10.1017/S1537592714003120
- Howard, P. N. (2011). The digital origins of dictatorship and democracy: Information technology and political Islam. New York, NY: Oxford University Press.
- Jarmon, J. A. (2014). The new era in U.S. national security: An introduction to emerging threats and challenges. Lanham, MD: Rowman & Littlefield.
- Klang, M., & Murray, A. (Eds.) (2005). Human rights in the digital age. London, UK: Glass House Press.
- Koettl, C. (2013). Twitter to the rescue: How social media is transforming human rights monitoring. [Amnesty International, Human Rights Now Blog]. Retrieved from http://blog.amnestyusa.org/middle-east/twitter-to-the-rescue-how-social-media-is-transforming-human-rights-monitoring
- Kostopoulos, G. K. (2013). Cyberspace and cybersecurity. New York, NY: CRC Press.
- Kristof, N. D. (2012, June 21). In Iran, they want fun, fun, fun. New York Times, p. A23.
- Lannon, J., & Halpin, E. F. (Eds.) (2013). Human rights and information communication technologies: Trends and consequences of use. Hershey, PA: IGI Global.
- Liptak, A., & Schmidt, M. S. (2013, December 28). Judge upholds NSA’s bulk collection of data on calls. The New York Times. Retrieved from http://www.nytimes.com/2013/12/28/us/nsa-phone-surveillance-is-lawful-federal-judge-rules.html
- Monshipouri, M. (2014a). Democratic uprisings in the new Middle East: Youth, technology, human rights, and US foreign policy. Boulder, CO: Paradigm.
- Monshipouri, M. (2014b). People’s power and participation. In M. Gibney & A. A. Mihr (Eds.), Sage handbook of human rights (Vol. 2, pp. 923–940). Thousand Oaks, CA: Sage.
- Okruhlik, G. (2013). Saudi Arabia. In M. P. Angrist (Ed.), Politics & society in the contemporary Middle East (2nd ed., pp. 417–443). Boulder, CO: Lynne Rienner.
- Rosenzweig, P. (2011). Internet kill switch: Mapping out government’s proper role in cybersecurity (Heritage Foundation report 2011–02). Retrieved from http://www.heritage.org/research/reports/2011/02/internet-kill-switch-mapping-out-governments-proper-role-in-cybersecurity
- Schafer, E. D. (2003). Digital technology. In Encyclopedia.com. Retrieved from http://www.encyclopedia.com/doc/1G2-3401801216.html
- Schmidt, E., & Cohen, J. (2013). The new digital age: Reshaping the future of people, nations, and business. New York, NY: Alfred A. Knopf.
- Sinpeng, A. (2015, May 18). ICT companies and Internet freedoms. [Web log post on The Interpreter]. Retrieved from http://www.lowyinterpreter.org/post/2015/05/18/ICT-multinational-corporations-and-digital-accountability.aspx
- Valeriano, B., & Maness, R. C. (2015). Cyber war versus cyber realities: Cyber conflict in the international relations. New York, NY: Oxford University Press.
- Wales, A., Gorman, M., & Allison-Hope, D. (2010). Big business, big responsibilities: From villains to visionaries: How companies are tackling the world’s greatest challenges. New York, NY: Palgrave Macmillan.
- Ziccardi, G. (2013). Resistance, liberation technology, and human rights in the digital age. Dordrecht, Netherlands: Springer.