Geography Reference
In-Depth Information
Bernstein, J. (1995). Recovering ethical life: Jürgen Habermas and the future of critical theory.
New York: Routledge.
Barry, E. (2009). In Azerbaijan, a donkey suit leads to laughs, questions and possibly arrests.
New York Times, July 15, p. A49.
Bi, J. (2001). The internet revolution in China: The significance for traditional forms of
communist control. International Journal, 56(3), 421-441.
Burnett,
P.
(2005).
Internet
censorship
on
the
rise
in
Africa?
Retrieved
from
http://
www.worldhunger.org/articles/06/africa/burnett.htm
Calhoun, C. (1992). Habermas and the public sphere. Cambridge: MIT Press.
Crampton, J. (2003). The political mapping of cyberspace. Edinburgh: Edinburgh University
Press.
Crampton, J. (2007). The biopolitical justification for geosurveillance. Geographical Review,
97(3), 389-493.
Crovitz, G. (2010). China's web crackdown continues. Wall Street Journal, Jan 11. Retrieved
from http://online.wsj.com/article/SB10001424052748703948504574649021577882240.html
Conway, M. (2007). Terrorism and internet governance: Core issues. Retrieved from http://
www.unidir.ch/pdf/articles/pdf-art2644.pdf
Cortés, M. (2000). Internet censorship around the world.Retrieved from http://www.isoc.org/
inet2000/cdproceedings/8k/8k_4.htm
Cunningham, K. (2002). Factors influencing Jordan's information revolution: Implications for
democracy. Middle East Journal, 56(2), 240-256.
Dann, D., & Haddow, N. (2008). Just doing business or doing just business? Google, Microsoft,
Yahoo! and the business of censoring China's internet. Journal of Business Ethics, 79(3),
219-234.
Deibert, R., & Rohozinski, R. (2008). Good for liberty, bad for security? Global civil society and the
securitization of the internet. In R. Deibert, J. Palfrey, R. Rohozinksi, & J. Zittrain (Eds.), Access
denied: The practice and policy of global internet filtering (pp. 123-150). Cambridge, MA: MIT
Press.
Dobson, J., & Fisher, P. (2007). The panopticon's changing geography. Geographical Review,
97(3), 307-323.
Dunn, M. (2000). The information revolution and the middle East: An overview of the early
literature. Middle East Journal, 54(3), 465-476.
Eriksson,
J.,
&
Giacomello,
G.
(2009).
Who
controls
what,
and
under
what
conditions?
International Studies Review, 11, 206-210.
Eurasianet.org. (2007). In Turkemenistan, Internet access comes with soldiers Retrieved from
http://www.eurasianet.org/departments/insight/articles/eav030807.shtml
Fandy, M. (1999). Cyberresistance: Saudi opposition between globalization and localization.
Comparative Studies in Society and History, 41, 124-147.
Froomkin, A. (2003). Habermas@Discourse.net. Toward a critical theory of cyberspace. Harvard
Law Review, 116(3), 740-873.
Gauch, S. (2001). Effects of Arab censorship blunted by the internet. Christian Science Monitor
Jan 29, 1.
Gellman, B. (2005). The FBI's secret scrutiny: In hunt for terrorists, bureau examines records of
ordinary Americans. Washington Post November 6 A1.
Ghareeb, E. (2000). New media and the information revolution in the Arab world: An assessment.
Middle East Journal, 54(3), 395-418.
Ghattas, K. (2002). Surfing the net in Iraq. Retrieved from BBC News, May 1. http://news.
bbc.co.uk/1/hi/world/middle_east/1959481.stm
Goldsmith, J. (1998). Against cyberanarchy. University of Chicago Law Review, 1199, 1217-1222.
Goldsmith, J., & Wu, T. (2006). Who controls the internet? illusion of a borderless world. New
York: Oxford University Press.
Habermas, J. (1979). Communication and the evolution of society. Boston: Beacon Press.
Habermas, J. (1989). The structural transformation of the public sphere: An inquiry into a
category of bourgeois society. Oxford: Blackwell.
Search WWH ::




Custom Search