SEARCH

SEARCH BY CITATION

References

  • Ackerman, J. M. and Sandoval-Ballesteros, I. E. (2006). The global explosion of Freedom of Information laws. Administrative Law Review, 58(1), 85130.
  • Arquilla, J. and Ronfeld, D. (2001). Networks and netwars: The future of terror, crime and militancy. Santa Monica: RAND.
  • Assange, J. (2010, 8 December). Don't shoot messenger for revealing uncomfortable truths. The Australian. Accessed 28 May 2013 from http://www.theaustralian.com.au/in-depth/wikileaks/dont-shoot-messenger-for-revealing-uncomfortable-truths/story-fn775xjq-1225967241332
  • Assange, J. (2011, 11 May). A Q&A with Julian Assange (part I): on the Arab Spring, phone hacking, and WikiLeaks' ethics. Frontline Club. Accessed 28 May 2013 from http://www.frontlineclub.com/a_qa_with_julian_assange_part_i_on_the_arab_spring_phone_hacking_and_wikileaks_ethics/
  • Benkler, Y. (2011). Networks of power, degrees of freedom. International Journal of Communication, 5, 72155.
  • Brooke, H. (2011). Fess up - or face a future of leaks. British Journalism Review, 22(1), 179.
  • Burns, J. F. and Somaiya, R. (2010, 23 October). WikiLeaks founder on the run, trailed by notoriety. New York Times. Accessed 28 May 2013 from http://www.nytimes.com/2010/10/24/world/24assange.html?pagewanted=all
  • Cammaerts, B. (2011). Disruptive sharing in a digital age: Rejecting neoliberalism? Continuum: Journal of Media and Cultural Studies, 25(1), 4762.
  • Chadwick, A. (2006). Internet politics: States, citizens, and new communication technologies. Oxford: Oxford University Press.
  • Collins, B. S. and Mansell R. (2005). Cyber trust and crime prevention. In R. Mansell & B. S. Collins (Eds.), Trust and crime in the information society (pp. 1155). Cheltenham: Edward Elgar Publishers.
  • Conway, M. (2007). Cyberterrorism: Hype and reality. In L. Armistead (Ed.), Information warfare: Separating hype from reality (pp. 7394). Washington, DC: Potomac Books.
  • Crovitz, G. L. (2010, 6 December). Julian Assange, Information Anarchist. The Wall Street Journal. Accessed 28 May 2013 from http://online.wsj.com/article/SB10001424052748703989004575653113548361870.html
  • della Porta, D. and Diani, M. (2006). Social movements: An introduction (2nd ed.). Oxford: Blackwell Publishing.
  • Domscheit-Berg, D. (2011). Inside WikiLeaks: My time with Julian Assange at the world's most dangerous website. New York: Crown.
  • Fenster, M. (2011, 28 March). Disclosure's effects: WikiLeaks and transparency. SSRN Working Paper Series. Accessed 28 May 2013 from http://ssrn.com/abstract=1797945
  • Ferree, M. M., Gamson, W. A., Gerhards, J. and Rucht, D. (2002). Shaping abortion discourse: Democracy and the public sphere in Germany and the United States. Cambridge: Cambridge University Press.
  • Florini, A. (2003). The coming democracy: New rules for running a new world. Wahsington, DC: Island Press.
  • Gamson, W. A. (1992). Talking politics. Cambridge: Cambridge University Press.
  • Garnham, N. (2005). The information society debate revisited. In J. Curran and M. Gurevitch (Eds.), Mass media and society (4th ed., pp. 287302). London: Hodder Arnold.
  • Halliday, J. & Arthur, C. (2010, 8 December). WikiLeaks: Who are the hackers behind Operation Payback? The Guardian. Accessed 28 May 2013 from http://www.guardian.co.uk/media/2010/dec/08/anonymous-4chan-wikileaks-mastercard-paypal
  • Haythornthwaite, C. (2005). Social networks and Internet connectivity effects, Information, Communication & Society, 8(2), 12547.
  • Jordan, T. (2008). Hacking: Digital media and technological determinism. Cambridge: Polity Press.
  • Keller, B. (2011). The boy who kicked the hornet's nest. In A. Star (Ed.), Open secrets: WikiLeaks, war and American diplomacy (pp. 626). New York: New York Times.
  • Kierkegaard, S. (2009). Open access to public documents: More secrecy, less transparency! Computer Law & Security Review, 25, 327.
  • Koopmans, R. (1999). Political. Opportunity. Structure: Some splitting to balance the lumping. Sociological Forum, 14(1), 93105.
  • Korsgaard, C. M. (1989). The right to lie: Kant on dealing with evil. Philosophy & Public Affairs, 15(4), 32549.
  • Leigh, D. & Harding, L. (2011). WikiLeaks: Inside Julian Assange's war on secrecy. London: Guardian Books.
  • Leigh, D., Harding, L., Hirsch, A. & MacAskill, E. (2010, 30 November). WikiLeaks: Interpol issues wanted notice for Julian Assange. The Guardian. Accessed 28 May 2013 from http://www.guardian.co.uk/media/2010/nov/30/interpol-wanted-notice-julian-assange
  • Livingstone, S. (2007). On the material and the symbolic: Silverstone's double articulation of research traditions in new media studies. New Media and Society, 9(1), 1624.
  • Ludlow, P. (2010, 4 October). WikiLeaks and hacktivist culture. The Nation (pp. 2526).
  • Lundby, K. (2009). Introduction: “Mediatization” as key. In K. Lundby (Ed.), Mediatization: Concept, changes, consequences (pp. 120). New York: Peter Lang.
  • Martin, B. (1999). Whistleblowing and nonviolence. Peace & Change, 24(1), 1528.
    Direct Link:
  • Mayer-Schoönberger, V. & Lazer, D. (2007). Governance and information technology: From electronic government to information government. Cambridge, MA: MITpress.
  • McMillan, Robert (2010, 30 December). FBI raids ISP in Anonymous DDoS investigation. Computer World. Accessed 28 May 2013 from http://www.computerworld.com/s/article/9202838/FBI_raids_ISP_in_Anonymous_DDoS_investigation
  • Poulsen, K. (2010, 2 December). Lieberman introduces anti-WikiLeaks legislation. Wired. Accessed 28 May 2013 from http://www.wired.com/threatlevel/2010/12/shield/
  • Rana, K. S. & Kurbalija, J. (eds) (2007). Foreign ministries: Managing diplomatic networks and optimizing value. Geneva: DiploFoundation.
  • Rice, X. (2007, 31 August). The looting of Kenya. The Guardian. Accessed 28 May 2013 from http://www.guardian.co.uk/world/2007/aug/31/kenya.topstories3
  • Rucht, D. (2004). The quadruple “A”: Media strategies of protest movements since the 1960s. In W. van de Donk, B. D. Loader, P. G. Nixon & D. Rucht, (Eds.) Cyberprotest: New media, citizens, and social movements (pp. 2958). London: Routledge.
  • Snow, D. A. & Benford, R. D. (1988). Ideology, frame resonance, and participant mobilization. International Social Movement Research, 1, 197217.
  • Sterner, E. (2011, February). WikiLeaks and cyberspace cultures in conflict. Marshall Institute Policy Outlook. Accessed 28 May 2013 from http://www.marshall.org/pdf/materials/931.pdf
  • Stiglitz, J. (1999, 27 January). On liberty, the right to know, and public discourse: The role of transparency in public life. Oxford Amnesty Lecture. Accessed 28 May 2013 from http://siteresources.worldbank.org/NEWS/Resources/oxford-amnesty.pdf
  • Tarrow, S. (1994). Power in movement: Social movements, collective action and mass politics in the modern state. Cambridge: Cambridge University Press.