Jenkins, H. The Chinese Columbine
// Technology Review, August 2, 2002. www.technologyreview.com/read_article.aspx?id=12913&ch= infotech.Johnson, D. G. Is the Global Information Infrastructure a Demo-cratic Technology?
// Readings in Cyberethics 18 (2004): 121. Katz, J. E., and C. H. Lai News Blogging in Cross-Cultural Con-texts: A Report on the Struggle for Voice // Knowledge, Technology & Policy 22, no. 2 (2009): 95–107.Kenner, D. Useless Democracy Promotion Efforts? There’s an App for That
// FP Passport, Foreign Policy, December 31, 2009. blog. foreignpolicy.com/posts/2009/12/31/useless_democracy_promotion_efforts_theres_an_app_for_that.Khouri, R. G. When Arabs Tweet
// International Herald Tribune, July 22, 2010.Kingsbury, P., and J. P. Jones III Walter Benjamin’s Diony-sian Adventures on Google Earth
// Geoforum 40, no. 4 (2009): 502–513.Kirkpatrick, M. Jordan Says It Will Begin Censoring Websites
// Read-WriteWeb, January 14, 2010. www.readwriteweb.com/ archives/jordan_to_censor_websites.php.Klang, M. Civil Disobedience Online
// Journal of Information, Communication & Ethics in Society 2, no. 2 (2008): 2.Kleine D., and T. Unwin Technological Revolution, Evolution and New Dependencies: What’s New About ict
4d? // Third World Quarterly 30, no. 5 (2009): 1045–1067.Kleinz, T., and C. Morris Higher Regional Court Says Online Demonstration Is Not Force
// Heise Online, June 2, 2006. www. heise.de/english/newsticker/news/73827.Kluver, R. US and Chinese Policy Expectations of the Internet
// China Information 19, no. 2 (2005): 299.Kluver, R., and P. H. Cheong Technological Modernization, the Internet, and Religion in Singapore
// Journal of Computer-Medi-ated Communication 12, no. 3 (2007): 1122–1142.Lagerkvist, J. Global Media for Global Citizenship in India and China
// Peace Review 21, no. 3 (2009): 367–375.Land, M. B. Peer Producing Human Rights
// Alberta Law Review 46, no. 4 (2009).Landler, Mark U. S. Hopes Exports Will Help Open Closed Socie-ties
// New York Times, March 7, 2010.Lee, Tae-hoon Lawmaker Calls for Stricter Access to NK Sites
// Korea Times, October 6, 2009.Lessig, L. Against Transparency
// New Republic 9 (2010).Lewis, J. Sovereignty and the Role of Government in Cyberspace
//The Brown Journal of World Affairs 16, no. 2 (2010). Lichtenstein, J. Digital Diplomacy
// New York Times Magazine,July 16, 2010.
Loftus, M. People Use Social Networking to Fight Violence, Extre-mism
. U. S. Department of Defense, December 2, 2008.Lonkila, M., and B. Gladarev Social Networks and Cellphone Use in Russia: Local Consequences of Global Communication Tech-nology
// New Media & Society 10, no. 2 (2008): 273.Luhr, N. L. Iran, Social Media, and US Trade Sanctions: The First Amendment Implications of US Foreign Policy
// First Amendment Law Review 8 (2010): 500–533.Lynch, M. Blogging the New Arab Public
// Arab Media & Society 1, no. 1 (2007).Lynch, M. The Internet Freedom Agenda
// Abu Aardvark’s Middle East Blog, January 22, 2010. lynch.foreignpolicy.com/posts/2010/01/ 22/the_internet_freedom_agenda.MacKinnon, R. China’s Censorship
2.0: How companies censor blog-gers // First Monday 14, no. 2–2 (2009).MacKinnon, R. The Great Chinese Censorship Hoax
// RCon-versation, March 14, 2006. rconversation.blogs.com/rconversation/2006/03/the_great_chine.html.MacKinnon, R. Liberty or Safety? Both – or Neither
// IEEE Spec-trum, May 2010. spectrum.ieee.org/telecom/internet/liberty-or-safety-bothor-neither.Markoff, J. U. S. and Russian Accord on Display at Internet Meeting
// New York Times, April 15, 2010.Marosi, R. UC San Diego Professor Who Studies Disobedience Gains