References
- Berlatsky, N. (2015, January 7). Hashtag activism isn’t a copout. The Atlantic. Retrieved August 4, 2015, from http://theatlantic.com
- Buchanan, I. (2007). Deleuze and the internet. Australian Humanities Review, 43. Retrieved from http://www.australianhumanitiesreview.org
- Burnett, K. (1993). Toward a theory of hypertextual design. Postmodern Culture, 3(2). Web. Retrieved from July 12, 2015.
- CAE. (1994). The electronic disturbance. New York, NY: Autonomedia.
- Carr, D. (2012, March 25). Hashtag activism and its limits. New York Times. Retrieved August 4, 2015 from http://www.nytimes.com
- Deleuze, G., & Guattari, F. (1987). A thousand plateaus: Capitalism and schizophrenia. (B. Massumi, Trans.). Minneapolis: University of Minnesota Press.
- Deleuze, G. (1992). Postscript on the societies of control. October, 59, 3–7.
- Fieni, D. (2012). What a wall wants or how graffiti thinks: Nomad grammatology in the French banlieue. Diacritics, 40, 72–93.
- Frohmann, B. (2007). Foucault, Deleuze, and the ethics of digital networks. In R. Capurro, J. Fruhbauer, & T. Hausmanninger (Eds.), Localizing the internet. Ethical aspects in intercultural perspective (pp. 57–68). Munich: Fink.
- Gellman, B., & Poitras, L. (2013, June 7). U.S., British intelligence mining data from nine U.S. Internet companies in broad secret program. The Washington Post. Retrieved August 15, 2013 from http://www.washingtonpost.com
- Gibson, W. (1984). Neuromancer. New York, NY: Ace Books.
- Goodrum, A. & Manion, M. (2000). The ethics of hacktivism. Journal of Information Ethics, 9, 51–59.
- Greenberg, A., & Grauer, Y. (2015). Security Bill Passes Senate with Privacy Flaws Unfixed. Wired 27 October. Retrieved October 27, 2015 from https://www.wired.com
- Gosztola, K. (2015, July 31). During Baltimore uprising, city officals criminalized hashtags & labeled social media postings as ‘threats’. ShadowProof. Retrieved August 1, 2015 from http://shadowproof.com
- Huschle, B. (2002). Cyber disobedience. International Journal of Applied Philosophy, 16, 69–83.
- Jarrett, H. M., & Bailie, M. W. (2010). Prosecuting computer crimes. Office of Legal Education Executive Office for United States Attorneys Accessible from US Justice Department. Retrieved October 27, 2015 from http://www.justice.gov
- Jordan, T., & Taylor, P. (2004). Hacktivism and cyberwars: Rebels without a cause? New York, NY: Routledge.
- Lucas, D. (2014). The legendary #Anonymous PayPal 14 speak out post-sentencing. The Cryptosphere. Retrieved October 23, 2015 from thecryptosphere.com
- Nunes, M. (1999). Virtual topographies: Smooth and striated cyberspace. In M. L. Ryan (Ed.). Cyberspace textuality: Computer technology and literary theory (pp. 61–77). Indianapolis: Indiana University Press.
- Russell, J. (2012, April 16). Anonymous says it took the CIA website offline again with a new DDoS attack. TNW News. Retrieved October 23, 2015 from http://thenextweb.com
- Sauter, M. (2014). The coming swarm: DDoS actions, hacktivism, and civil disobedience on the internet. London: Bloomsbury.
- Speer, M. (2014). The complementary aspects of Marshall McLuhan and postmodernism in the literary study of the internet: Exemplified in the rhizome theory of Gilles Deleuze and Felix Guattari. In C. Birkle, A. Krewani, & M. Kuester (Es.). McLuhan’s global village (pp. 47–57). London: Routledge.
- Vieira, L. M. M., & Ferasso, M. (2010). The rhizomatic structure of cyberspace: Virtuality and its possibilities. International Journal of Networking and Virtual Organisations, 7, 549–559.10.1504/IJNVO.2010.035405
- Wade, A. G. (2015). There’s a hack for that: Subverting repression through hacktivist modes of freedom. Powerlines, 3(1). Retrieved August 14, 2015, from http://amst.umd.edu/powerlines