Soar, Daniel Short Cuts
// London Review of Books, August 14, 2008. Soghoian, Christopher Caught in the Cloud: Privacy, Encryption, and Government Back Doors in the Web 2.0 Era // Journalof Telecommunications and High Technology Law, August 17, 2009.
Soghoian, Christopher Exclusive: Widespread Cell Phone Lo-cation Snooping by NSA?
// Surveillance State, CNET News, September 8, 2008. news.cnet.com/8301-13739_3-10030134-46. html?tag=mncol;title.Solove, Daniel J. The Digital Person: Technology and Privacy in the Information Age. Ex Machina
. New York: New York University Press, 2004.Solove, Daniel J. Do Social Networks Bring the End of Privacy?
// Scientific American, September 2008.Solove, Daniel J. I’ve Got Nothing to Hide and Other Misunder-standings of Privacy
// San Diego Law Review 44 (2007): 745. Solove, Daniel J. Understanding Privacy. Cambridge, MA: HarvardUniversity Press, 2008.
Sternstein, Aliya Lawmaker Questions White House Official’s Use of Gmail
// Nextgov, April 12, 2010. www.nextgov.com/next-gov/ng_20100412_6003.php.Stone, Brad T. M. I.? Not for Sites Focused on Sharing
// New York Times, April 22, 2010.Timmons, Heather India Wary of Chinese Telecom Equipment
// New York Times, April 30, 2010.Vietnam: Farmers to Get Free Computers in Plan to Boost Production
// Thai Press Reports, April 14, 2010.Vietnam Launches Own Social Network Site
// Agence France-Presse, May 22, 2010.Vietnam Politics: A State-Run Social Networking Website Is Launched
// EIU ViewsWire, June 7, 2010.Vietnam Steps Up China-Style Internet Control
// Agence France-Pres-se, July 1, 2010.Villeneuve, Nart, and Greg Walton “
0day”: Civil Society and Cyber Security. Malware Lab, October 28, 2009. malwarelab. org/2009/10/0day-civil-society-and-cyber-security/.Wells-Dang, A. Political Space in Vietnam: A View from the “Rice-Roots”
// Pacific Review 23, no. 1 (2010): 93–112.Wigglesworth, Robin UAE Comments Raise Fears of Crackdown on Black-Berry
// Financial Times, July 26, 2010.Wines, Michael In Restive Chinese Area, Cameras Keep Watch
// New York Times, August 2, 2010.Wondracek, G., Holz, T., Kirda, E., Antipolis, S., and
C. Kruegel A Practical Attack to De-Anonymize Social Net-work Users / In: 2010 IEEE Symposium on Security and Privacy
, 223–238. 2010.Young, Martin J. Vietnam Strengthens Firewall // Asia Times On-line, June 19, 2010. www.atimes.com/atimes/Global_Economy/ LF19Dj03.html.
Zetter, Kim Tor Researcher Who Exposed Embassy E-mail Passwords Gets Raided by Swedish FBI and CIA
// Threat Level, Wired, No-vember 14, 2007. www.wired.com/threatlevel/2007/11/swedish-researc/.Глава 7. Кьеркегор против диванных активистовAgre, P. E. The Practical Republic: Social Skills and the Progress of Citi-zenship
// Community in the Digital Age: Philosophy and Practice (2004): 201–223.Alexander, M. G., and S. Levin Theoretical, Empirical, and
Practical Approaches to Intergroup Conflict
// Journal of Social Is-sues 54, no. 4 (1998): 629–639.Alinsky, Saul David Rules for Radicals: A Practical Primer for Re-alistic Radicals
. New York: Vintage Books, 1989.Arguello, J., Butler, B. S., Joyce, E., Kraut, R., Ling,
K. S., RosÉ, C., and X. Wang Talk to Me: Foundations for Successful Individual-Group Interactions in Online Communities
/ In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 968. 2006.Bakardjieva, M. Virtual Togetherness: An Everyday-Life Perspective
//Media, Culture & Society 25, no. 3 (2003): 291.
Bargh, J. A., and K. Y. McKenna The Internet and Social Life
//Annual Review of Psychology 55 (2004): 573.
Beenen, G., Ling, K., Wang, X., Chang, K., Frankowski, D.,