Fandy, M. Information Technology, Trust, and Social Change in the Arab World
// Middle East Journal (2000): 378–394.Fletcher, Owen Apple Censors Dalai Lama iPhone Apps in China
// IDG News Service, December 30, 2009.Fox, J. The Uncertain Relationship Between Transparency and Account-ability
// Development in Practice 17, no. 4 (2007): 663–671.Franzese, P. W. Sovereignty in Cyberspace: Can It Exist?
// Air Force Law Review 64 (2009): 1.Fuchs, C. Some Reflections on Manuel Castells’ Book “Communication Power” // Triple C: Cognition, Communication, Co-operation 7, no. 1 (2009): 94.
Garnham, N. The Mass Media, Cultural Identity, and the Public
Sphere in the Modern World
// Public Culture 5, no. 2 (1993): 251. Gilboa, E. The CNN Effect: The Search for a Communication Theory of International Relations // Political Communication 22, no. 1 (2005): 27–44.Gilboa, E. Global Communication and Foreign Policy
// Journal of Communication 52, no. 4 (2002): 731–748.Glassman, James K., and Michael Doran How to Help
Iran’s Green Revolution
// Wall Street Journal, January 21, 2010. Glenny, Misha BlackBerry is but a Skirmish in the Battle for theWeb
// Financial Times, August 6, 2010.Goldsmith, J. L., and T. Wu Digital Borders
// Legal Affairs (2006): 40.Goldsmith, J. L., and T. Wu Who Controls the Internet: Illu-sions of a Borderless World
. New York: Oxford University Press, 2006.Gunaratne, S. A. De-Westernizing Communication/Social Science Research: Opportunities and Limitations
// Media, Culture & Soci-ety 32, no. 3 (2010): 473.Guynn, J. Twitter Hires Obama Administration’s Katie Stanton
// Los Angeles Times, July 10, 2010.Hardy, M. In-Q-Tel, Google Invest in Recorded Future
// Government Computer News, July 29, 2010. gcn.com/articles/2010/ 07/29/inqtel-google-fund-web-analysis-firm.aspx.Hawkins, V. The Other Side of the CNN Factor: The Media and Con-flict
// Journalism Studies 3, no. 2 (2002): 225–240.Himma, K. E. Hacking as Politically Motivated Digital Civil Disobedience: Is Hacktivism Morally Justified?
// Internet Security: Hacking, Counterhacking, and Society (2007): 73.Hindman, M. The Myth of Digital Democracy
. Princeton, NJ: Princeton University Press, 2009.Hofmann, J. The Libertarian Origins of Cybercrime: Unintended Side-Effects of a Political Utopia
// ESRC Research Centre Discus-sion Paper no. 62, 2010. w.lse.ac.uk/collections/CARR/pdf/DPs/ Disspaper62.pdf.Holmes, A. Defining Transparency
// Nextgov, September 3, 2009. www.nextgov.com/nextgov/ng_20090903_7217.php.Holmes, A. The Risks of Open Government
// Nextgov, September 14, 2009. www.nextgov.com/nextgov/ng_20090914_3118.php.Howe, J. P. Obama and Crowdsourcing: A Failed Relationship?
// Wired Epicenter Blog, April 1, 2009. www.wired.com/epicenter/ 2009/04/obama-and-crowd/.Ibahrine, M. Mobile Communication and Sociopolitical Change in the Arab World
// Quaderns de la Mediterránia 11 (2009): 51–60.Interview with Indira Lakshmanan of Bloomberg TV
. U. S. Department of State, March 19, 2010.Issa, A. Palestine: Twitter Accused of Silencing Gaza Tribute
// Global Voices, December 29, 2009. globalvoicesonline.org/2009/12/29/ palestine-twitter-accused-of-silencing-gaza-tribute/.Jaeger, P. T., Lin, J., Grimes, J. M., and S. N. Simmons Where Is the Cloud? Geography, Economics, Environment, and Jurisdiction in Cloud Computing
// First Monday 14, no. 5 (2009).Jakobsen, P. V. Focus on the CNN Effect Misses the Point: The Real Media Impact on Conflict Management Is Invisible and Indirect
// Journal of Peace Research 37, no. 2 (2000): 131.