1,725
Views
11
CrossRef citations to date
0
Altmetric
Articles

Framing human rights: exploring storytelling within internet companies

Pages 340-355 | Received 03 Aug 2016, Accepted 23 Jan 2017, Published online: 15 Feb 2017

References

  • Alma, W. (2010). Lessons from Google: Internet Security, Privacy and Encryption. Retrieved from https://bestinfopreneurs.com/alma-whitten-on-lessons-from-googles-approach-to-internet-security-privacy-and-encryption/
  • Ammori, M. (2014). The ‘new’ New York Times: Free speech lawyering in the age of Google and Twitter. Harvard Law Review, 127, 2259–2295.
  • Aronson, S. A., & Higham, I. (2013). ‘Re-righting business’: John Ruggie and the struggle to develop international human rights standards for transnational firms. Human Rights Quarterly: A Comparative and International Journal of the Social Sciences, Philosophy, and Law, 35, 333–364. doi: 10.1353/hrq.2013.0032
  • Balkin, J. M. (2014). Old-school/new-school speech regulation. Harvard Law Review, 127, 2296–2342.
  • Balnaves, M. W. M. A. (2011). A new theory of information and the internet: Public sphere meets protocol. New York, NY: Peter Lang.
  • Bang, H., & Esmark, A. (2007). Public spheres with/out democracy. Copenhagen: Samfundslitteratur Press/Nordicom.
  • Bechmann, A. (2013). Internet profiling: The economy of data interoperability on Facebook and Google. MedieKultur, 29, 72–91. doi: 10.7146/mediekultur.v29i55.8070
  • Benkler, Y. (2006). The wealth of networks – How social production transform markets and freedom. New Haven, CT: Yale University Press.
  • Benn, S. I., & Gaus, G. F. (1983). Public and private in social life. London: Croom Helm.
  • Bilchitz, D. (2013). A chasm between is and ought?: A critique of the normative foundations of the SRSGs framework and the guiding principles. Human Rights Obligations of Business: Beyond the Corporate Responsibility to Respect?, 107–137. doi: 10.1017/CBO9781139568333.009
  • Cannataci, J. (2015, November 10). The right to privacy in the digital age. Presentation at the Internet Governance Forum, Jôao Pessoa, Brazil.
  • Cannataci, J. A. (2016, March 8). Report of the special rapporteur on privacy, Joseph A Cannataci. Geneva: Human Rights Council.
  • Cohen, J. E. (2014). Between truth and power. In Mireille Hildebrandt & Bibi Van Den Berg (Eds.), Freedom and property of information: The philosophy of law meets the philosophy of technology (pp. 57–80). Abingdon, Oxon.
  • Dahlberg, L. (2007). Rethinking the fragmentation of the cyberpublic: From consensus to contestation. New Media & Society, 9, 827–847. doi: 10.1177/1461444807081228
  • Earl, J., & Kimport, K. (2011). Digitally enabled social change: Activism in the Internet age. Cambridge, MA: MIT Press.
  • Elkin-Koren, N. (2012). Affordances of freedom: Theorizing the rights of users in the digital era. Jerusalem Review of Legal Studies, 6, 96–109. doi: 10.1093/jrls/jls011
  • Elkin-Koren, N., & Weinstock Netanel, N. (2002a). The commodification of information. New York, NY: Kluwer Law International.
  • Elkin-Koren, N., & Weinstock Netanel, N. (2002b). Introduction: The commodification of information. In N. Elkin-Koren & N. Weinstock Netanel (Eds.), The commodification of information (pp. vii–xi). New York, NY: Kluwer Law International.
  • Fuchs, C. (2015).Culture and economy in the age of social media. New York: Routledge.
  • Gillespie, T. L. (2010). The politics of platforms. New Media & Society, 12, 347–364. doi: 10.1177/1461444809342738
  • Goldberg, G. (2011). Rethinking the public/virtual sphere: The problem with participation. New Media & Society, 13, 739–754. doi: 10.1177/1461444810379862
  • Granham, N. (2000). Emancipation, the media, and modernity. Oxford: Oxford University Press.
  • Habermas, J. (1989). The structural transformation of the public sphere. Cambridge: MIT Press.
  • Habermas, J. (1996). Between facts and norms. Trans. William Rehg. Cambridge: Polity Press.
  • Hamelink, C. J. (2000). The ethics of cyberspace. London: Sage.
  • Hansen, E. (2011). Mobile distributed public spheres. Crossing Boundaries Conference, Berkeley, March 17–18.
  • Jørgensen, R. F. (2013). Framing the net – the internet and human rights. Cheltenham: Edward Elgar Publishing.
  • Kaye, D. (2015, October 23). Keynote speech. Workshop on human rights and new technologies, University of Connecticut School of Law.
  • Kaye, D. (2016, May 11). Report of the special rapporteur on the promotion and protection of the right to freedom of opinion and expression, David Kaye. Geneva: Human Rights Council.
  • Kim, N. S., & Telman, J. (2015). Internet giants as quasi-governmental actors and limits of contractual consent. Missouri Law Review, 80, 723–771.
  • Knox, J. H. (2008). Horizontal human rights law. American Journal of International Law, 102, 1–47.
  • Mackinnon, R. (2012). Consent of the networked: The world-wide struggle for internet freedom. New York, NY: Basic Books.
  • Maclay, C. M. (2014). An improbable coalition: How businesses, non-governmental organizations, investors and academics formed the global network initiative to promote privacy and free expression online (PhD dissertation). Northeastern University, Boston, MA.
  • Mansell, R. (2004). Political economy, power and new media. New Media & Society, 6, 96–105. doi: 10.1177/1461444804039910
  • Meyrowitz, J. (1985). No sense of place: The impact of electronic media on social behavior. New York, NY: Oxford University Press.
  • Morozov, E. (2011). The net delusion: The dark side of Internet freedom. New York, NY: PublicAffairs.
  • Papacharissi, Z. (2003). Virtual sphere: The Internet as a public sphere. Educational Administration Abstracts, 38, 147–282.
  • Papacharissi, Z. (2010). A private sphere: Democracy in a digital age. Cambridge: Polity.
  • Powers, S. M., & Jablonski, M. (2015).The real cyber war: The political economy of Internet freedom. Champaign, IL: UI Press.
  • Rasmusssen, T. (2008). The internet and differentiation in the political public sphere. Nordicom Review, 2008, 73–83.
  • Rosen, J. (2012). The deciders: The future of privacy and free speech in the age of Facebook and Google. Fordham Law Review, 80, 1525–1538.
  • Schneier, B. (2015). Data and Goliath: The hidden battles to capture your data and control your World. New York: W. W. Norton.
  • Silver, D. (2000). Looking backwards, looking forward: Cyberculture studies. In D. Gauntlett (Ed.), Web.studies: rewiring media studies for the digital age (pp. 19–30). London: Oxford University Press.
  • Sterne, J. (2006). The histiography of cyberculture. In D. Silver & A. Massanari (Eds.), Critical cyberculture studies (pp. 17–28). New York: New York University Press.
  • Turrow, J. (2011). The daily you. New Haven, CT: Yale University Press.
  • United Nations Human Rights Council. (2011, March 21). Report of the special representative John Ruggie. Guiding principles on business and human rights: Implementing the United Nations ‘protect, respect and remedy’ framework. New York, NY : United Nations.
  • United Nations Human Rights Council. (2012, July 16). The promotion, protection and enjoyment of human rights on the internet. A/HRC/20/8. Geneva: United Nations.
  • Valtysson, B. (2012). Facebook as a digital public sphere: Processes of colonization and emancipation. TripleC, 10(1), 77–91.
  • Van Dijck, J., & Poll, T. (2013). Understanding social media logic. Media and Communication, 1, 2–14. doi: 10.17645/mac.v1i1.70
  • Verstraeten, H. (2007). Media, democracy and the public sphere: Towards a reconceptualisation of the public sphere. South African Journal for Communication Theory and Research, 26, 73–83.
  • Yin, R. K. (2009). Case study research: Design and methods. Thousand Oaks, CA: Sage.
  • Zuboff, S. (2015). Big other: Surveillance capitalism and the prospects of an information civilization. Journal of Information Technology, 30, 75–89. doi: 10.1057/jit.2015.5
  • Zuckerberg, M. (2014, July 7). Mark Zuckerberg on a future where the Internet is available to all. The Wall Street Journal.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.