References
- Allan, S. (2013). Citizen witnessing: Revisioning journalism in times of crisis. Cambridge: Polity.
- Andrejevic, M. (2012). Exploitation in the data mine. In C. Fuchs, K. Boersma, A. Albrechtslund, & M. Sandoval (Eds.), Internet and surveillance: The challenges of web 2.0 and social media (pp. 71–88). Abingdon: Routledge.
- Article 19. (2013). The right to blog, policy brief. London: Author.
- Assange, J. (2014). When google met Wikileaks. Newyork: OR Books.
- Atton, C. (2001). Alternative media. London: Sage.
- Barlow, J. P. (1996). A declaration of the independence of cyberspace. Retrieved from http://homes.eff.org/~barlow/Declaration-Final.html
- Benkler, Y. (2006). The wealth of networks: How social production transforms markets and freedom. New Haven: Yale University Press.
- Benkler, Y. (2011). A free irresponsible press: WikiLeaks and the battle over the soul of the networked fourth Estate. Retrieved from http://www.benkler.org/Benkler_Wikileaks_current.pdf
- Bloodworth, J. (2015, January 1). Katie Hopkins’ views are now considered matters for law enforcement, and it is utterly terrifying. Independent. Retrieved from http://www.independent.co.uk/voices/comment/katie-hopkins-views-are-now-considered-matters-for-law-enforcement-and-it-is-utterly-terrifying-9953339.html
- Bonnington, C., & Ackerman, S. (2012, August 30). Apple rejects app that tracks U.S. drone strikes. Wired. Retrieved from: http://www.wired.com/2012/08/drone-app/
- Boyle, J. (2003). The second enclosure movement and the construction of the public domain. Law and Contemporary Problems, 66 (1–2), 33–74.
- Braman, S. (2006). Change of state: Information, policy, and power. Cambridge: MIT Press.
- Brandom, R. (2014, September 2). Facebook's report abuse button has become a tool of global oppression. The Verge. Retrieved from http://www.theverge.com/2014/9/2/6083647/facebook-s-report-abuse-button-has-become-a-tool-of-global-oppression
- Cerf, V. G. (2004). First, do no harm. In D. MacLean (Eds.), Internet governance: A grand collaboration (pp. 13–15). New York, NY: United Nations ICT Task Force.
- Christensen, C. (2011). Twitter revolutions? Addressing social media and dissent. The Communication Review, 14(3), 155–157. doi:10.1080/10714421.2011.597235
- Cohen, N. (2008). The valorization of surveillance: Towards a political economy of Facebook. Democratic Communiqué, 22 (1), 5–22.
- Crouch, C. (2004). Post-democracy. Cambridge: Polity.
- Deibert, R. (2009). The geopolitics of Internet control: Censorship, sovereignty, and cyberspace. In A. Chadwick & P. Howard (Eds.), The Routledge handbook of Internet politics (pp. 323–336). London: Routledge.
- Deibert, R. J., Palfrey, J. G., Rohozinski, R., & Zittrain, J. (2008). Access denied: The practice and policy of global Internet filtering. Cambridge: MIT Press.
- DeNardis, L. (2009). Protocol politics: The globalization of Internet governance. Cambridge: MIT Press.
- Dencik, L. (2014, January 13). Why Facebook censorship matters. JOMEC Blog. Retrieved from http://www.jomec.co.uk/blog/why-facebook-censorship-matters/
- Dencik, L., Hintz, A., Carey, Z., & Pandya, H. (2015). Managing ‘threats’: Uses of social media for policing domestic extremism and disorder in the UK. Project report. Cardiff University. Retrieved from http://www.dcssproject.net/files/2015/12/Managing-Threats-Project-Report.pdf
- Dencik, L., & Leistert, O. (2015). Introduction. In L. Dencik & O. Leistert (Eds.), Critical perspectives on social media and protest: Between control and emancipation (pp. 1–12). Lanham: Rowman and Littlefield.
- Diamond, L. (2010). Liberation technology. Journal of Democracy, 21(3), 69–83. doi: 10.1353/jod.0.0190
- Downing, J. D. H. (Ed.). (2011). Encyclopedia of social movement media. London: Sage.
- Flaim, S. M. (2012, April). Op-ed: Imminent ‘six strikes’ Copyright Alert System needs antitrust scrutiny. Ars technica. Retrieved from http://arstechnica.com/tech-policy/news/2012/03/op-ed-imminent-six-strikes-copyright-alert-system-needs-antitrust-scrutiny.ars
- Fuchs, C. (2014). Social media: A critical introduction. London: Sage.
- Goldsmith, J., & Wu, T. (2006). Who controls the Internet? Illusions of a borderless world. Oxford: Oxford University Press.
- Google, (2014). Transparency report 2014. Retrieved from http://www.google.co.uk/transparencyreport/.
- Greenwald, G. (2015, January 2006). With power of social media growing, police now monitoring and criminalizing online speech. The Intercept. Retrieved from https://firstlook.org/theintercept/2015/01/06/police-increasingly-monitoring-criminalizing-online-speech/
- Guardian. (2011, August 16). Facebook riot calls earn men four-year jail terms amid sentencing outcry. Guardian. Retrieved from http://www.guardian.co.uk/uk/2011/aug/16/facebook-riot-calls-men-jailed
- Guardian. (2015a, January 16). Facebook and Twitter have social responsibility to help fight terrorism, says Cameron. Guardian. Retrieved from http://www.theguardian.com/world/2015/jan/16/cameron-interrupt-terrorists-cybersecurity-cyberattack-threat
- Guardian. (2015b). The NSA Files. Guardian. Retrieved from http://www.theguardian.com/us-news/the-nsa-files
- Haggerty, K. D., & Ericson, R. V. (2000). The surveillant assemblage. British Journal of Sociology, 51(4), 605–622. doi:10.1080/00071310020015280
- Hannigan, R. (2014, November 3). The web is a terrorist's command-and-control network of choice. Financial Times. Retrieved from http://www.ft.com/cms/s/2/c89b6c58-6342-11e4-8a63-00144feabdc0.html#axzz3TywRsOQ2
- Haunss, S. (2015). Promise and practice in the study of social media and movements. In L. Dencik & O. Leistert (Eds.), Critical perspectives on social media and protest: Between control and emancipation (pp. 13–34). Lanham: Rowman and Littlefield.
- Held, D., & McGrew, A. C. (2003). The great globalization debate. In D. Held & A. G. McGrew (Eds.), The global transformations reader (pp. 1–50). Cambridge: Polity Press.
- Hintz, A. (2009). Civil society media and global governance: Intervening into the World Summit on the Information Society. Münster: Lit Verlag.
- Hintz, A. (2014). Independent media center. In K. Harvey (Eds.), Encyclopedia of social media and politics (pp. 653–654). London: Sage.
- Hintz, A. (2016). Policy hacking: Citizen-based policymaking and media reform. In D. Freedman & R. McChesney (Eds.), Strategies for media reform: International perspectives. New York: Fordham University Press.
- Hintz, A., & Milan, S. (2009). At the margins of Internet governance: Grassroots tech groups and communication policy. International Journal of Media & Cultural Politics, 5(1), 23–38. doi: 10.1386/macp.5.1-2.23_1
- Hintz, A., & Milan, S. (2011). User rights for the Internet age: Communications policy according to Netizens. In R. Mansell, & M. Raboy (Eds.), The handbook of global media and communication policy (pp. 230–241). Oxford: Wiley-Blackwell.
- Hintz, A., & Milan, S. (2013). Networked collective action and the institutionalised policy debate: Bringing cyberactivism to the policy arena? Policy & Internet, 5(1), 7–26.
- Hofheinz, A. (2011). Nextopia? Beyond revolution 2.0. International Journal of Communication, 5, 1417–1434. Retrieved from http://ijoc.org/ojs/index.php/ijoc/article/view/1186
- Howard, P. N., Agarwal, S. D., & Hussain, M. M. (2011). When do states disconnect their digital networks? Regime responses to the political use of social media. The Communication Review, 14(3), 216–232. doi:10.1080/10714421.2011.597254
- Jenkins, H. (2008). Convergence culture: Where old and new media collide. New York: New York University Press.
- Johnson, D. R., & Post, D. (1996). Law and borders: The rise of law in cyberspace. Stanford Law Review, 48(5), 1367–1402. doi:10.2307/1229390
- Keck, M. E., & Sikkink, K. (1998). Activists beyond Borders. Advocacy networks in international politics. Ithaca, NY: Cornell University Press.
- Khamis, S., & Vaughn, K. (2011). Cyberactivism in the Egyptian revolution: How civic engagement and citizen journalism tilted the balance. Arab Media & Society, 14. Retrieved from http://www.arabmediasociety.com/?article=769
- Kidd, D., Rodriguez, C., & Stein, L. (Eds.). (2009). Making our media: Global initiatives toward a democratic public sphere. Cresskill: Hampton Press.
- Kitchin, R. (2014). Thinking critically about and researching algorithms. The Programmable City (Working Paper No. 5). Retrieved from http://eprints.maynoothuniversity.ie/5715/1/RK_Thinking-Critically.pdf.
- Kreimer, S. F. (2006). Censorship by Proxy: The first amendment, Internet intermediaries, and the problem of the weakest link. University of Pennsylvania Law Review, 155(11), 11–101. doi: 10.2307/40041302
- Leistert, O. (2015). The revolution will not be liked: On the systematic constraints of corporate social media platforms for protest. In L. Dencik, & O. Leistert (Eds.), Critical perspectives on social media and protest: Between control and emancipation (pp. 35–52). Lanham: Rowman and Littlefield.
- Leistert, O., & Rohle, T. (2011). Identifizieren, Verbinden, Verkaufen. Einleitendes zur Maschine Facebook, ihren Konsequenzen und den Beiträgen in diesem Band. In O. Leistert, & T. Rohle (Eds.), Generation Facebook: Über das Leben im social net (pp. 7–30). Bielefeld: Transcript.
- Lessig, L. (1999). Code and other laws of Cyberspace. New York, NY: Basic Books.
- Lessig, L. (2008). Remix: Making art and commerce thrive in the hybrid economy. London: Bloomsbury.
- Lyon, D. (2007). Surveillance, power, and everyday life. In R. Mansell, C. Anthi Avgerou, D. Quah & R. Silverstone (Eds.), The Oxford handbook of information and communication technologies (pp. 449–472). Oxford: Oxford University Press.
- Lyon, D. (2014). Surveillance, Snowden, and big data: Capacities, consequences, critique. Big Data & Society, (July-December), 1–13. doi:10.1177/2053951714541861
- Mann, S., Nolan, J., & Wellman, B. (2003). Sousveillance: Inventing and using wearable computing devices for data collection in surveillance environments. Surveillance and Society, 1 (3), 331–355.
- May, C. (2009). Globalizing the logic of openness: Open source software and the global governance of intellectual property. In A. Chadwick, & P. Howard (Eds.), The Routledge handbook of Internet politics (pp. 364–375). London: Routledge.
- Morozov, E. (2011). The net delusion: The dark side of Internet freedom. New York, NY: Public Affairs.
- Moyer, E. (2015, November 8). Twitter teams with women's group on anti-harassment tool. Cnet. Retrieved from http://www.cnet.com/news/twitter-teams-up-with-womens-group-on-anti-harassment-tool.
- Mueller, M. (2010). Networks and states: The global politics of Internet governance. Cambridge: MIT Press.
- Norton, B. (2014, January 10–12). Fascist Facebook? The social network Giant's double standards. Counterpunch. Retrieved from http://www.counterpunch.org/2014/01/10/fascist-facebook/.
- Open Net Initiative. (2012, April 3). Global Internet filtering in 2012 at a Glance. Open Net. Retrieved from http://opennet.net/blog/2012/04/global-internet-filtering-2012-glance.
- Open Secrets. (2015, October 23). Google Inc. Retrieved from https://www.opensecrets.org/lobby/clientsum.php?id=D000022008.
- Papacharissi, Z. (2010). A private sphere: Democracy in a digital age. Cambridge: Polity.
- Patelis, K. (2013). Political economy and Monopoly abstractions: What social media demand. In G. Lovink, & M. Rasch (Eds.), Unlike us reader: Social media monopolies and their alternatives (pp. 117–126). Amsterdam: Institute of Network Cultures.
- Raboy, M. (2002). Global media policy in the new millennium. Luton: University of Luton Press.
- Raboy, M., & Padovani, C. (2010). Mapping global media policy: Concepts, frameworks, methods. Retrieved from http://www.globalmediapolicy.net/sites/default/files/Raboy&Padovani%202010_long%20version_final.pdf.
- Rennie, E. (2006). Community media: A global introduction. Lanham: Rowman & Littlefield.
- Salter, L. (2009). Indymedia and the law: Issues for citizen journalism. In S. Allan, & E. Thorsen (Eds.), Citizen Journalism: Global perspectives (pp. 175–186). New York, NY: Peter Lang.
- Sifry, M. (2014, October 31). Facebook wants you to vote on Tuesday. Here's how it messed with your feed in 2012. Mother Jones. Retrieved from http://www.motherjones.com/politics/2014/10/can-voting-facebook-button-improve-voter-turnout.
- Treré, E. (2015). The struggle within: Discord, conflict and Paranoia in social media protest. In L. Dencik, & O. Leistert (Eds.), Critical perspectives on social media and protest: Between control and emancipation (pp. 163–180). Lanham: Rowman and Littlefield.
- Trottier, D., & Lyon, D. (2012). Key features of social media surveillance. In C. Fuchs, K. Boersma, A. Albrechtslund, & M. Sandoval (Eds.), Internet and surveillance: The challenges of web 2.0 and social media (pp. 89–105). Abingdon: Routledge.
- UN General Assembly. (2013, April 17). Report of the special Rapporteur on the promotion and protection of the right to freedom of expression. Frank La Rue. Retrieved from http://www.ohchr.org/Documents/HRBodies/HRCouncil/RegularSession/Session23/A.HRC.23.40_EN.pdf.
- Villeneuve, N. (2006). The filtering matrix: Integrated mechanisms of information control and the demarcation of borders in cyberspace. First Monday, 11(1–2). Retrieved from http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/1307/1227.
- Villeneuve, N. (2012, April 20). Fake skype encryption software Cloaks DarkComet Trojan. Trend Micro Malware Blog. Retrieved from http://blog.trendmicro.com/fake-skype-encryption-software-cloaks-darkcomet-trojan/.
- Watson, S. (2015, March 2). Google moving to shut down alternative media by ranking sites on ‘Facts’ Rather than Popularity. Global Research. Retrieved from http://www.globalresearch.ca/google-moving-to-shut-down-alternative-media-by-ranking-sites-on-facts-rather-than-popularity/5434328.
- Webster, S. C. (2011, January 28). Vodaphone confirms role in Egypt's cellular, Internet blackout. The Raw Story. Retrieved from http://www.rawstory.com/rs/2011/01/28/vodafone-confirms-role-egypts-cellular-internet-blackout/.
- Wizner, B. (2015). Keynote address to the conference ‘surveillance and citizenship’, Cardiff, 18 June.
- Youmans, W. L., & York, J. C. (2012). Social media and the activist toolkit: User agreements, corporate interests, and the information infrastructure of modern social movements. Journal of Communication, 62, 315–329. doi:10.1111/j.1460-2466.2012.01636.x