Skip to main content Accessibility help
×
Hostname: page-component-848d4c4894-8kt4b Total loading time: 0 Render date: 2024-07-02T00:42:12.085Z Has data issue: false hasContentIssue false

Selected Bibliography

Published online by Cambridge University Press:  05 July 2015

Raphael Cohen-Almagor
Affiliation:
University of Hull
Get access

Summary

Image of the first page of this content. For PDF version, please use the ‘Save PDF’ preceeding this image.'
Type
Chapter
Information
Confronting the Internet's Dark Side
Moral and Social Responsibility on the Free Highway
, pp. 349 - 372
Publisher: Cambridge University Press
Print publication year: 2015

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Abbate, Janet. Inventing the Internet. Cambridge, MA: MIT Press, 2000.Google Scholar
Abel, Richard L. Speaking Respect, Respecting Speech. Chicago: University of Chicago Press, 1998.Google Scholar
Abend, Gabriel. The Moral Background: An Inquiry into the History of Business Ethics. Princeton, NJ: Princeton University Press, 2014.CrossRefGoogle Scholar
Ackerman, Bruce A. Social Justice in the Liberal State. New Haven, CT: Yale University Press, 1980.Google Scholar
Allport, Gordon W. The Nature of Prejudice. Cambridge, MA: Addison-Wesley, 1954.Google Scholar
Amichai-Hamburger, Yair, ed. The Social Net: Understanding Human Behavior in Cyberspace. Oxford: Oxford University Press, 2005.Google Scholar
Aristotle, . Nicomachean Ethics. Edited and translated by Ostwald, Martin. Indianapolis, IN: Bobbs-Merrill, 1962.Google Scholar
Bader, Eleanor J. “The Patriot Act Has Led to Increased Censorship in the United States.” In Censorship: Opposing Viewpoints, edited by Nakaya, Andrea C., 103–7. Farmington Hill, MI: Greenhaven, 2005.Google Scholar
Balkin, Jack M., Noveck, Beth S., and Roosevelt, Kermit. “Filtering the Internet: A Best Practices Model.” In Protecting Our Children on the Internet: Towards a New Culture of Responsibility, edited by Waltermann, Jens and Machill, Marcel, 199–261. Gütersloh, Germany: Bertelsmann Foundation, 2000.Google Scholar
Barak, Aharon. “Freedom of Expression and Its Limitations.” In Challenges to Democracy: Essays in Honour and Memory of Professor Sir Isaiah Berlin, edited by Cohen-Almagor, Raphael, 167–88. Aldershot, UK: Ashgate, 2000.Google Scholar
Baran, Paul. “On Distributed Communications.” Memorandum RM-3420-PR, RAND, Santa Monica, CA, 1964, http://www.rand.org/content/dam/rand/pubs/research_memoranda/2006/RM3420.pdf .
Barendt, Eric. Freedom of Speech. New York: Oxford University Press, 2007.CrossRefGoogle Scholar
Beckett, David. “Internet Technology.” In Internet Ethics, edited by Langford, Duncan, 13–46. New York: St. Martin's Press, 2000.Google Scholar
Belkin, Danny. “The Internet Will Speed Up Human Evolution.” In The Future of the Internet, edited by Head, Tom, 33–42. Farmington Hills, MI: Greenhaven Press, 2005.Google Scholar
Benedek, Wolfgang, and Kettemann, Matthias C.. Freedom of Expression and the Internet. Strasbourg, France: Council of Europe Publishing, 2014.Google Scholar
Benkler, Yochai. The Wealth of Networks: How Social Production Transforms Markets and Freedom. New Haven, CT: Yale University Press, 2006.Google Scholar
Bessette, Joseph. The Mild Voice of Reason: Deliberative Democracy and American National Government. Chicago: University of Chicago Press, 1994.Google Scholar
Biddle, Lucy, Donovan, Jenny, Hawton, Keith, Kapur, Navneet, and Gunnell, David. “Suicide and the Internet,” British Medical Journal 336, no. 7648 (2008): 800–802.CrossRefGoogle ScholarPubMed
Black, Hugo L.The Bill of Rights.” New York University Law Review 35 (1960): 865–81.Google Scholar
Boatright, John R. Ethics and the Conduct of Business. Upper Saddle River, NJ: Pearson Prentice Hall, 2009.Google Scholar
boyd, danah m., and Ellison, Nicole B.. “Social Networks Sites: Definition, History, and Scholarship.” Journal of Computer-Mediated Communication 13, no. 1 (2007): 210–30. http://onlinelibrary.wiley.com/doi/10.1111/j.1083-6101.2007.00393.x/abstract .CrossRefGoogle Scholar
Brenkert, George G., and Beauchamp, Tom L., eds. The Oxford Handbook of Business Ethics. New York: Oxford University Press, 2010.Google Scholar
Bryce, James. Modern Democracies. London: Macmillan, 1924.Google Scholar
Buckingham, David, ed. Youth, Identity, and Digital Media. Cambridge, MA: MIT Press, 2008.Google Scholar
Bunt, Gary R. Islam in the Digital Age: E-Jihad, Online Fatwas, and Cyber Islamic Environments. London: Pluto Press, 2003.Google Scholar
Bush, Vannevar. “As We May Think.” Atlantic Monthly 176, no. 1 (1945): 101–8.Google Scholar
Bynum, Terrell Ward. “Norbert Wiener's Vision: The Impact of ‘the Automatic Age’ on Our Moral Lives.” In The Impact of the Internet on Our Moral Lives, edited by Cavalier, Robert J., 11–25. Albany: State University of New York Press, 2005.Google Scholar
Campbell, Tom, and Miller, Seumas, eds. Human Rights and the Moral Responsibilities of Corporate and Public Sector Organisations. Dordrecht, Netherlands: Kluwer, 2004.Google Scholar
Carroll, Archie B. Business and Society: Managing Corporate Social Performance. Boston: Little, Brown, 1981.Google Scholar
Carroll, Archie B. “Corporate Social Responsibility.” Business and Society 38, no. 3 (1999): 268–95.CrossRefGoogle Scholar
Carroll, Archie B. “The Pyramid of Corporate Social Responsibility: Toward the Moral Management of Organizational Stakeholders.” Business Horizons 34, no. 4 (1991): 39–48.CrossRefGoogle Scholar
Carroll, Archie B. “A Three-Dimensional Conceptual Model of Corporate Social Performance.” Academy of Management Review 4, no. 4 (1979): 497–505.CrossRefGoogle Scholar
Carroll, Archie B., and Buchholtz, Ann K.. Business and Society: Ethics, Sustainability, and Stakeholder Management. th ed. New York: South-Western College, 2011.Google Scholar
Castells, Manuel. Communication Power. Oxford: Oxford University Press, 2009.Google Scholar
Castells, Manuel. The Internet Galaxy: Reflections on the Internet, Business, and Society. Oxford: Oxford University Press, 2001.CrossRefGoogle Scholar
Cavalier, Robert J., ed. The Impact of the Internet on Our Moral Lives. Albany: State University of New York Press, 2005.Google Scholar
Cerf, Vinton G. “Computer Networking: Global Infrastructure for the 21st Century.” Computing Research Association, Washington, DC, 1995. http://www.cs.washington.edu/homes/lazowska/cra/networks.html .
Cerf, Vinton G.. “First, Do No Harm.” Philosophy and Technology 24, no. 4 (2011): 463–65.CrossRefGoogle Scholar
Cerf, Vinton G.. “The Scope of Internet Governance.” In Internet Governance Forum (IGF): The First Two Years, edited by Doria, Avri and Kleinwäcther, Wolfgang, 51–56. Geneva: IGF Office, 2008.Google Scholar
Cerf, Vinton G., and Kahn, Robert. “A Protocol for Packet Network Interconnection.” IEEE Transactions on Communications 22, no. 5 (1974): 637–48.CrossRefGoogle Scholar
Ceruzzi, Paul E. A History of Modern Computing. nd ed. Cambridge, MA: MIT Press, 2003.Google Scholar
Chappell, Zsuzsanna. Deliberative Democracy: A Critical Introduction. Houndmills, UK: Palgrave-Macmillan, 2012.CrossRefGoogle Scholar
Christians, Clifford G. “Self-Regulation: A Critical Role for Codes of Ethics.” In Media Freedom and Accountability, edited by Dennis, Everette E., Gillmor, Donald M., and Glasser, Theodore L., 35–53. Westport, CT: Greenwood, 1989.Google Scholar
Christians, Clifford G., Ferré, John P., and Fackler, P. Mark. Good News: Social Ethics and the Press. New York: Oxford University Press, 1993.Google Scholar
Christians, Clifford G., and Nordenstreng, Kaarle. “Social Responsibility Worldwide.” Journal of Mass Media Ethics 19, no. 1 (2004): 3–28.CrossRefGoogle Scholar
Christians, Clifford G., and Traber, Michael, eds. Communication Ethics and Universal Values. Thousand Oaks, CA: Sage, 1997.Google Scholar
Citron, Danielle Keats. “Cyber Civil Rights.” Boston University Law Review 89 (2009): 61–125.Google Scholar
Clark, David, Field, Frank, and Richards, Matt. “Computer Networks and the Internet: A Brief History of Predicting Their Future.” Advanced Network Architecture, Massachusetts Institute of Technology, Cambridge, MA, January 2010. http://groups.csail.mit.edu/ana/People/DDC/Predicting-the-future-3-0.pdf .
Coates, Joseph H. “The Internet Will Enhance Human Life.” In The Future of the Internet, edited by Head, Tom, 10–18. Farmington Hills, MI: Greenhaven Press, 2005.Google Scholar
Cohen, Joshua. “Deliberation and Democratic Legitimacy.” In The Good Polity: Normative Analysis of the State, edited by Hamlin, Alan and Petit, Philip, 17–34. Oxford: Blackwell, 1989. http://philosophyfaculty.ucsd.edu/faculty/rarneson/JCOHENDELIBERATIVE%20DEM.pdf .Google Scholar
Cohen, Stanley. Folk Devils and Moral Panics. London: Routledge, 1987.Google Scholar
Cohen-Almagor, Raphael. “Between Autonomy and State Regulation: J. S. Mill's Elastic Paternalism.” Philosophy 87, no. 4 (2012): 557–82.CrossRefGoogle Scholar
Cohen-Almagor, Raphael. The Boundaries of Liberty and Tolerance: The Struggle against Kahanism in Israel. Gainesville: University Press of Florida, 1994.Google Scholar
Cohen-Almagor, Raphael, ed. Challenges to Democracy: Essays in Honour and Memory of Professor Sir Isaiah Berlin. Aldershot, UK: Ashgate, 2000.Google Scholar
Cohen-Almagor, Raphael. “Content Net Neutrality: A Critique.” In Luciano Floridi's Philosophy of Technology: Critical Reflections, edited by Demir, Hilmi, 151–67. Dordrecht, Netherlands: Springer, 2012.Google Scholar
Cohen-Almagor, Raphael. The Democratic Catch: Free Speech and Its Limits [in Hebrew]. Tel Aviv: Maariv, 2007.Google Scholar
Cohen-Almagor, Raphael. “In Internet's Way.” In Ethics and Evil in the Public Sphere: Media, Universal Values, and Global Development, edited by Fortner, Robert S. and Fackler, P. Mark, 93–115. Cresskill, NJ: Hampton Press, 2010.Google Scholar
Cohen-Almagor, Raphael. “Internet Responsibility and Business Ethics: The Yahoo! Saga and Its Aftermath.” Journal of Business Ethics 106, no. 3 (2012): 353–65.CrossRefGoogle Scholar
Cohen-Almagor, Raphael. “Responsibility of and Trust in ISPs.” Knowledge, Technology, and Policy 23, no. 3 (2010): 381–96.CrossRefGoogle Scholar
Cohen-Almagor, Raphael. “Responsibility of Net Users.” In The Handbook of Global Communication and Media Ethics, vol. 1, edited by Fortner, Robert S. and Fackler, P. Mark, 415–33. Oxford: Wiley-Blackwell, 2011.Google Scholar
Cohen-Almagor, Raphael. The Scope of Tolerance: Studies on the Costs of Free Expression and Freedom of the Press. London: Routledge, 2006.Google Scholar
Cohen-Almagor, Raphael. Speech, Media, and Ethics: The Limits of Free Expression. Houndmills, UK: Palgrave, 2005.Google Scholar
Cohen-Almagor, Raphael, Arbel-Ganz, Ori, and Kasher, Asa, eds. Public Responsibility in Israel [in Hebrew]. Tel Aviv and Jerusalem: Hakibbutz Hameuchad and Mishkanot Shaananim, 2012.Google Scholar
Conn, Kathleen. The Internet and the Law: What Educators Need to Know. Alexandria, VA: Association for Supervision and Curriculum Development, 2002.Google Scholar
Connolly, Dan. “A Little History of the World Wide Web,” World Wide Web Consortium, 2000. http://www.w3.org/History.html .
Consalvo, Mia, and Ess, Charles, eds. The Handbook of Internet Studies. Chichester, UK: Wiley, 2011.CrossRefGoogle Scholar
Coppel, Philip. Information Rights: Law and Practice. Oxford: Hart, 2010.Google Scholar
Crane, Andrew, Matten, Dirk, McWilliams, Abagail, Moon, Jeremy, and Siegel, Donald S., eds. The Oxford Handbook of Corporate Social Responsibility. Oxford: Oxford University Press, 2009.CrossRefGoogle Scholar
Curran, James, and Seaton, Jean. Power without Responsibility: How Congress Abuses the People through Delegation. London: Routledge, 2009.Google Scholar
Daniels, Peggy, ed. Policing the Internet. Farmington Hills, MI: Greenhaven, 2007.Google Scholar
Dann, G. Elijah, and Haddow, Neil. “Just Doing Business or Doing Just Business: Google, Microsoft, Yahoo!, and the Business of Censoring China's Internet.” Journal of Business Ethics 79, no. 3 (2008): 219–34.CrossRefGoogle Scholar
Darwall, Stephen L.Two Kinds of Respect.” Ethics 88, no. 1 (1977): 36–49.CrossRefGoogle Scholar
Deibert, Ronald J., and Villeneuve, Nart. “Firewalls and Power: An Overview of Global State Censorship of the Internet.” In Human Rights in the Digital Age, edited by Klang, Mathias and Murray, Andrew, 111–24. London: GlassHouse, 2005.Google Scholar
Deibert, Ronald, Palfrey, John, Rohozinski, Rafal, and Zittrain, Jonathan, eds. Access Denied: The Practice and Policy of Global Internet Filtering. Cambridge, MA: MIT Press, 2008.Google Scholar
De Laat, Paul B.Trusting Virtual Trust.” Ethics and Information Technology 7, no. 3 (2005): 167–80.CrossRefGoogle Scholar
Demir, Hilmi, ed. Luciano Floridi's Philosophy of Technology: Critical Reflections. Dordrecht, Netherlands: Springer, 2012.CrossRefGoogle Scholar
DeMott, Andrea B., ed. The Internet. San Diego, CA: Greenhaven Press, 2007.Google Scholar
Denning, Dorothy E.Comments on Responsibility of and Trust in ISPs.” Knowledge, Technology, and Policy 23, no. 3 (2010): 399–401.CrossRefGoogle Scholar
de Sola Pool, Ithiel. Technologies of Freedom: Our Free Speech in an Electronic Age. Cambridge, MA: Harvard University Press, 1983.Google Scholar
Doria, Avri, and Kleinwächter, Wolfgang, eds. Internet Governance Forum (IGF): The First Two Years. Geneva: IGF Office, 2008. http://www.intgovforum.org/cms/documents/publications/172-internet-governance-forum-igf-the-first-two-years/file .Google Scholar
Dovidio, John F., Glick, Peter, and Rudman, Laurie A., eds. On the Nature of Prejudice: Fifty Years after Allport. Oxford: Blackwell, 2005.CrossRefGoogle Scholar
Dryzek, John S. Deliberative Democracy and Beyond: Liberals, Critics, Contestations. Oxford: Oxford University Press, 2002.CrossRefGoogle Scholar
Dryzek, John S. Foundations and Frontiers of Deliberative Governance. Oxford: Oxford University Press, 2012.Google Scholar
Dubow, Charles. “The Internet: An Overview.” In Does the Internet Benefit Society?, edited by Mur, Cindy, 7–13. Detroit, MI: Greenhaven Press, 2005.Google Scholar
Duff, Alistair S. A Normative Theory of the Information Society. New York: Routledge, 2012.Google Scholar
Dutton, William H., and Shepherd, Adrian. “Trust in the Internet as an Experience Technology,” Information, Communication, and Society 9, no. 4 (2006): 433–51.CrossRefGoogle Scholar
Düwell, Marcus, Braarvig, Jens, Brownsword, Roger, and Mieth, Dietmar, eds. The Cambridge Handbook of Human Dignity: Interdisciplinary Perspectives. Cambridge: Cambridge University Press, 2014.CrossRefGoogle Scholar
Dworkin, Ronald. Justice for Hedgehogs. Cambridge, MA: Harvard University Press, 2011.Google Scholar
Dworkin, Ronald. Sovereign Virtue: The Theory and Practice of Equality. Boston: Harvard University Press, 2002.Google Scholar
Dworkin, Ronald. Taking Rights Seriously. London: Duckworth, 1977.Google Scholar
Dwyer, Susan. “Enter Here – At Your Own Risk: The Moral Dangers of Cyberporn.” In The Impact of the Internet on Our Moral Lives, edited by Cavalier, Robert J., 69–94. Albany: State University of New York Press, 2005.Google Scholar
Edwards, Lilian, and Waelde, Charlotte, eds. Law and the Internet: Regulating Cyberspace. Oxford: Hart, 1997.Google Scholar
Ehrlich, Howard J. Campus Ethnoviolence and the Policy Options. Baltimore: National Institute against Prejudice and Violence, 1990.Google Scholar
Elster, Jon, ed. Deliberative Democracy. Cambridge: Cambridge University Press, 1998.CrossRefGoogle Scholar
Emerson, Thomas I. The System of Freedom of Expression. New York: Random House, 1970.Google Scholar
Esler, Brian W. “Filtering, Blocking, and Rating: Chaperones or Censorship?” In Human Rights in the Digital Age, edited by Klang, Mathias and Murray, Andrew, 99–110. London: GlassHouse, 2005.Google Scholar
Ess, Charles. “Moral Imperatives for Life in an Intercultural Global Village.” In The Impact of the Internet on Our Moral Lives, edited by Cavalier, Robert J., 161–93. Albany: State University of New York Press, 2005.Google Scholar
Feinberg, Joel. “Legal Paternalism.” Canadian Journal of Philosophy 1, no. 1 (1971): 105–24.CrossRefGoogle Scholar
Fenton, Natalie, “The Internet and Social Networking.” In Misunderstanding the Internet, edited by Curran, James, Fenton, Natalie, and Freedman, Des, 123–48. Abingdon, UK: Routledge, 2012.Google Scholar
Fielding, Nigel, Lee, Raymond M., and Blank, Grant, eds. The Sage Handbook of Online Research Methods. Thousand Oaks, CA: Sage, 2008.CrossRefGoogle Scholar
Fishkin, James S., and Laslett, Peter. Debating Deliberative Democracy. Oxford: Wiley-Blackwell, 2003.CrossRefGoogle Scholar
FitzPatrick, William J.Moral Responsibility and Normative Ignorance: Answering a New Skeptical Challenge.” Ethics 118, no. 4 (2008): 589–613.CrossRefGoogle Scholar
Floridi, Luciano. The Ethics of Information. Oxford: Oxford University Press, 2013.CrossRefGoogle Scholar
Floridi, Luciano. The Fourth Revolution: How the Infosphere Is Reshaping Human Reality. Oxford: Oxford University Press, 2014.Google Scholar
Floridi, Luciano, ed. The Cambridge Handbook of Information and Computer Ethics. Cambridge: Cambridge University Press, 2010.CrossRefGoogle Scholar
Floridi, Luciano. Information: A Very Short Introduction. Oxford: Oxford University Press, 2010.CrossRefGoogle Scholar
Floridi, Luciano, and Sanders, J. W.. “Internet Ethics: The Constructionist Values of Homo Poieticus.” In The Impact of the Internet on Our Moral Lives, edited by Cavalier, Robert J., 195–214. Albany: State University of New York Press, 2005.Google Scholar
Fortner, Robert S., and Fackler, P. Mark, eds. Ethics and Evil in the Public Sphere: Media, Universal Values, and Global Development. Cresskill, NJ: Hampton Press, 2010.Google Scholar
Fortner, Robert S., and Fackler, P. Mark, eds. The Handbook of Global Communication and Media Ethics. Oxford: Wiley-Blackwell, 2011.CrossRefGoogle Scholar
Friedman, Lauri S., ed. The Internet: Introducing Issues with Opposing Viewpoints. Farmington Hills, MI: Greenhaven, 2008.Google Scholar
Fukuyama, Francis. Trust: The Social Virtues of and the Creation of Prosperity. New York: Free Press, 1995.Google Scholar
Galbreath, Jeremy. “Drivers of Corporate Social Responsibility: The Role of Formal Strategic Planning and Firm Culture.” British Journal of Management 21, no. 2 (2010): 511–25.Google Scholar
Gane, Nicholas, and Beer, David. New Media: The Key Concepts. Oxford: Berg, 2008.Google Scholar
Garfinkel, Simson L. PGP: Pretty Good Privacy. Sebastopol, CA: O'Reilly, 1995.Google Scholar
Gentile, Douglas A., ed. Media Violence and Children: A Complete Guide for Parents and Professionals. Westport, CT: Praeger, 2003.Google Scholar
Goldsmith, Jack L.Against Cyberanarchy.” University of Chicago Law Review 65, no. 4 (1998): 1199–1250.CrossRefGoogle Scholar
Goldsmith, Jack L., and Wu, Tim. Who Controls the Internet? Illusions of a Borderless World. New York: Oxford University Press, 2006.Google Scholar
Graham, Mark, and Dutton, William. H., eds. Society and the Internet: How Networks of Information and Communication Are Changing Our Lives. Oxford: Oxford University Press, 2014.CrossRefGoogle Scholar
Gralla, Preston. How the Internet Works. th ed. Indianapolis, IN: Que, 2007.Google Scholar
Gruen, Madeleine. “Innovative Recruitment and Indoctrination Tactics by Extremists: Video Games, Hip-Hop, and the World Wide Web.” In The Making of a Terrorist: Recruitment, Training, and Root Causes, edited by F. Forest, James J., 11–22. Westport, CT: Praeger, 2006.Google Scholar
Gruen, Madeleine. “White Ethnonationalist and Political Islamist Methods of Fund-Raising and Propaganda on the Internet.” In The Changing Face of Terrorism, edited by Gunaratna, Rohan, 127–45. Singapore: Marshall Cavendish, 2004.Google Scholar
Gutmann, Amy, and Thompson, Dennis F.. Why Deliberative Democracy?Princeton, NJ: Princeton University Press, 2004.CrossRefGoogle Scholar
Haas, Larry. Safeguarding Your Child Online: How to Deal with Stranger Contact and Pornography on the Internet. Philadelphia: Xlibris, 2000.Google Scholar
Habermas, Jürgen. Between Facts and Norms: Contributions to a Discourse Theory of Law and Democracy. Cambridge: Polity, 1996.Google Scholar
Habermas, Jürgen. Moral Consciousness and Communicative Action. Cambridge, MA: MIT Press, 1990.Google Scholar
Hafner, Katie, and Lyon, Matthew. Where Wizards Stay Up Late: The Origins of the Internet. New York: Simon & Schuster, 1996.Google Scholar
Hamdani, Assaf. “Who's Liable for Cyberwrongs?Cornell Law Review 87, no. 4 (2002): 901–57.Google Scholar
Hamlin, Alan, and Petit, Philip, eds. The Good Polity: Normative Analysis of the State. Oxford: Blackwell, 1989.Google Scholar
Haney, Craig, Banks, Curtis, and Zimbardo, Philip. “Interpersonal Dynamics in a Simulated Prison.” International Journal of Criminology and Penology 1 (1973): 69–97.Google Scholar
Harding, Matthew. “Manifesting Trust.” Oxford Journal of Legal Studies 29, no. 2 (2009): 245–65.CrossRefGoogle Scholar
Harding, Matthew. “Responding to Trust.” Ratio Juris 24, no. 1 (2011): 75–87.CrossRefGoogle Scholar
Hauben, Michael, and Hauben, Ronda. Netizens: On the History and Impact of Usenet and the Internet. Los Alamitos, CA: IEEE Computer Society Press, 1997.Google Scholar
Henderson, Harry. Internet Predators. New York: Facts on File, 2005.Google Scholar
Henthoff, Nat. Free Speech for Me – But Not for Thee: How the American Left and Right Relentlessly Censor Each Other. New York: Harper Collins, 1992.Google Scholar
Heyman, Steven J. Free Speech and Human Dignity. New Haven, CT: Yale University Press, 2008.Google Scholar
Hier, Sean P., ed. Moral Panic and the Politics of Anxiety. London: Routledge, 2011.Google Scholar
Horrigan, Bryan. Corporate Social Responsibility in the 21st Century: Debates, Models, and Practices across Government, Law, and Business. Northampton, MA: Edward Elgar, 2010.CrossRefGoogle Scholar
Ihlen, Øyvind, Bartlett, Jennifer L., and May, Steve, eds. The Handbook of Communication and Corporate Social Responsibility. Chichester, UK: Wiley-Blackwell, 2011.CrossRefGoogle Scholar
Jacquette, Dale. Journalistic Ethics: Moral Responsibility in the Media. Upper Saddle River, NJ: Pearson, 2007.Google Scholar
Jaffe, J. Michael. “Riding the Electronic Tiger: Censorship in Global, Distributed Networks.” In Liberal Democracy and the Limits of Tolerance: Essays in Honor and Memory of Yitzhak Rabin, edited by Cohen-Almagor, Raphael, 275–94. Ann Arbor: University of Michigan Press, 2000.Google Scholar
Jensen, Michael C.Value Maximization, Stakeholder Theory, and the Corporate Objective Function.” Business Ethics Quarterly 12, no. 2 (2002): 235–56.CrossRefGoogle Scholar
Johnson, David R., and Post, David G.. “Law and Borders: The Rise of Law in Cyberspace.” Stanford Law Review 48, no. 5 (1996): 1367–1402.CrossRefGoogle Scholar
Johnson, Deborah G., and Miller, Keith W.. Computer Ethics. Upper Saddle River, NJ: Pearson, 2009.Google Scholar
Jonas, Hans. The Imperative of Responsibility: In Search of an Ethics for the Technological Age. Chicago: University of Chicago Press, 1984.Google Scholar
Kant, Immanuel. Foundations of the Metaphysics of Morals, edited by Wolff, Robert Paul. Indianapolis, IN: Bobbs-Merrill, 1969.Google Scholar
Karatzogianni, Athina. The Politics of Cyberconflict. London: Routledge, 2006.Google Scholar
Karst, Kenneth L.Threats and Meanings: How the Facts Govern First Amendment Doctrine.” Stanford Law Review 58, no. 5 (2006): 1337–1412.Google Scholar
Kellerman, Aharon. The Internet on Earth: A Geography of Information. Oxford: Wiley, 2002.Google Scholar
Kerr, Michael, Janda, Richard, and Pitts, Chip. Corporate Social Responsibility: A Legal Analysis. Markham, ON: LexisNexis, 2009.Google Scholar
Kiesler, Sara, ed. Culture of the Internet. Mahwah, NJ: Lawrence Erlbaum Associates, 1997.Google Scholar
Kizza, Joseph Migga. Ethical and Social Issues in the Information Age. London: Springer, 2007.Google Scholar
Klang, Mathias, and Murray, Andrew, eds. Human Rights in the Digital Age. London: GlassHouse, 2005.Google Scholar
Kleinrock, Leonard. “Creating a Mathematical Theory of Computer Networks.” Operations Research 50, no. 1 (2002): 125–31.CrossRefGoogle Scholar
Kleinrock, Leonard. “An Early History of the Internet.” IEEE Communications Magazine 48, no. 8 (2010): 26–36.CrossRefGoogle Scholar
Kleinrock, Leonard. “History of the Internet and Its Flexible Future.” IEEE Wireless Communications 15, no. 1 (2008): 8–18.CrossRefGoogle Scholar
Kleinrock, Leonard. “Information Flow in Large Communication Nets.” PhD thesis proposal, Massachusetts Institute of Technology, Cambridge, MA, May 31, 1961, http://www.lk.cs.ucla.edu/data/files/Kleinrock/Information%20Flow%20in%20Large%20Communication%20Nets.pdf .
Köcher, Renate. “Representative Survey on Internet Content Concerns in Australia, Germany, and the United States of America.” In Protecting Our Children on the Internet: Towards a New Culture of Responsibility, edited by Waltermann, Jens and Machill, Marcel, 401–56. Gütersloh, Germany: Bertelsmann Foundation, 2000.Google Scholar
Kohl, Uta. Jurisdiction and the Internet: A Study of Regulatory Competence over Online Activity. Cambridge: Cambridge University Press, 2007.CrossRefGoogle Scholar
Kohlberg, Lawrence. The Philosophy of Moral Development: Moral Stages and the Idea of Justice. Vol. 1 of Essays on Moral Development. San Francisco: Harper & Row, 1981.Google Scholar
Kohn, Marek. Trust: Self-Interest and the Common Good. New York: Oxford University Press, 2008.Google Scholar
Kotler, Philip, and Lee, Nancy. Corporate Social Responsibility: Doing the Most Good for Your Company and Your Cause. Hoboken, NJ: Wiley, 2005.Google Scholar
Kouzes, Richard T., Myers, James D., and Wulf, William. “Collaboratories: Doing Science on the Internet.” IEEE Computer 29, no. 8 (1996): 40–46.CrossRefGoogle Scholar
Kueng, Lucy, Picard, Robert G., and Towse, Ruth, eds. The Internet and the Mass Media. Thousand Oaks, CA: Sage, 2008.Google Scholar
Langford, Duncan, ed. Internet Ethics. New York: St. Martin's Press, 2000.Google Scholar
Larmore, Charles. Patterns of Moral Complexity. Cambridge: Cambridge University Press, 1987.CrossRefGoogle Scholar
Lee, Ki-Hoon, and Shin, Dongyoung. “Consumers’ Responses to CSR Activities: The Linkage between Increased Awareness and Purchase Intention.” Public Relations Review 36, no. 2 (2010): 193–95.CrossRefGoogle Scholar
Leiner, Barry M., Cerf, Vinton G., Clark, David D., Kahn, Robert E., Kleinrock, Leonard, Lynch, Daniel C., Postel, Jon, Roberts, Lawrence G., and Wolff, Stephen S.. “A Brief History of the Internet,” Internet Society, 2003. http://www.isoc.org/internet/history/brief.shtml .
Leiner, Barry M., Cerf, Vinton G., Clark, David D., Kahn, Robert E., Kleinrock, Leonard, Lynch, Daniel C., Postel, Jon, Roberts, Lawrence G., and Wolff, Stephen S.. “The Past and Future History of the Internet.” Communications of the ACM 40, no. 2 (1997): 102–8.CrossRefGoogle Scholar
Lessig, Lawrence. Code and Other Laws of Cyberspace. New York: Basic Books, 1999.Google Scholar
Lessig, Lawrence. Free Culture: How Big Media Uses Technology and the Law to Lock Down Culture and Control Creativity. New York: Penguin, 2004.Google Scholar
Lessig, Lawrence. The Future of Ideas: The Fate of the Commons in a Connected World. New York: Vintage, 2002.Google Scholar
Levinson, Paul. New New Media. Boston: Pearson, 2009.Google Scholar
Levmore, Saul, and Nussbaum, Martha C., eds. The Offensive Internet: Speech, Privacy, and Reputation. Cambridge, MA.: Harvard University Press, 2010.Google Scholar
Levy, Steven. Crypto: How the Code Rebels Beat the Government: Saving Privacy in the Digital Age. New York: Viking, 2001.Google Scholar
Lewis, Stewart. “Reputation and Corporate Responsibility.” Journal of Communication Management 7, no. 4 (2003): 356–94.CrossRefGoogle Scholar
Licklider, J. C. R., and Taylor, Robert W.. “The Computer as a Communication Device.” Science and Technology 76, no. 2 (1968): 20–41.Google Scholar
Lipschultz, Jeremy Harris. Broadcast and Internet Indecency: Defining Free Speech. New York: Routledge, 2008.Google Scholar
Lumby, Catharine, Green, Lelia, and Hartley, John. Untangling the Net: The Scope of Content Caught By Mandatory Internet Filtering. Sydney: Australian Law Reform Commission, 2011. http://www.alrc.gov.au/sites/default/files/pdfs/ci_2522_l_green_w_attachments.pdf .Google Scholar
Macedo, Stephen. Deliberative Politics: Essays on Democracy and Disagreement. New York: Oxford University Press, 1999.Google Scholar
Madelin, Robert. “The Evolving Social Responsibilities of Internet Corporate Actors: Pointers Past and Present.” Philosophy and Technology 24, no. 4 (2011): 455–61.CrossRefGoogle Scholar
Markus, Hazel Rose, Ryff, Carol D., Conner, Alana L., Pudberry, Eden K., and Barnette, Katherine L.. “Themes and Variations in American Understandings of Responsibility.” In Caring and Doing for Others: Social Responsibility in the Domains of Family, Work, and Community, edited by Rossi, Alice S., 349–99. Chicago: University of Chicago Press, 2001.Google Scholar
Marsden, Christopher T. Net Neutrality: Towards a Co-Regulatory Solution. London: Bloomsbury, 2010.CrossRefGoogle Scholar
Mathiason, John. Internet Governance: The New Frontier of Global Institutions. Abingdon, UK: Routledge, 2009.Google Scholar
Mayer-Schönberger, Viktor. “The Shape of Governance: Analyzing the World of Internet Regulation.” Virginia Journal of International Law 43 (2003): 605–73.Google Scholar
McLuhan, Marshall. Understanding Media: The Extensions of Man. Cambridge, MA: MIT Press, 1994.Google Scholar
McQuail, Denis. Media Accountability and Freedom of Publication. New York: Oxford University Press, 2003.Google Scholar
Meiklejohn, Alexander. Political Freedom. New York: Oxford University Press, 1965.Google Scholar
Mill, John Stuart. Utilitarianism, Liberty, and Representative Government. London: J. M. Dent, 1948.Google Scholar
Miller, David. “Deliberative Democracy and Social Choice.” Political Studies 40, suppl. 1 (1992): 54–67.CrossRefGoogle Scholar
Moreno-Riaño, Gerson, ed. Tolerance in the Twenty-First Century: Prospects and Challenges. Lanham, MD: Lexington Books, 2006.Google Scholar
Mossberger, Karen, Tolbert, Caroline J., and McNeal, Ramona S.. Digital Citizenship: The Internet, Society, and Participation. Cambridge, MA: MIT Press, 2007.Google Scholar
Mueller, Milton L. Networks and States: The Global Politics of Internet Governance. Cambridge, MA: MIT Press, 2010.CrossRefGoogle Scholar
Murthy, Dhiraj. Twitter: Social Communication in the Twitter Age. Cambridge: Polity, 2013.Google Scholar
Myskja, Bjørn K. “The Categorical Imperative and the Ethics of Trust.” Ethics and Information Technology 10, no. 4 (2008): 213–20.CrossRefGoogle Scholar
National Research Council. Global Networks and Local Values: A Comparative Look at Germany and the United States. Washington, DC: National Academies Press, 2001.
Nelson, Michael R. “A Response to Responsibility of and Trust in ISPs by Raphael Cohen-Almagor.” Knowledge, Technology, and Policy 23, no. 3 (2010): 403–7.CrossRefGoogle Scholar
Nelson, Theodor Holm. Literary Machines. Watertown, MA: Mindful Press, 1982.Google Scholar
Nino, Carlos Santiago. The Constitution of Deliberative Democracy. New Haven, CT: Yale University Press, 1996.Google Scholar
Nissenbaum, Helen. “Hackers and the Contested Ontology of Cyberspace.” In The Impact of the Internet on Our Moral Lives, edited by Cavalier, Robert J., 139–60. Albany: State University of New York Press, 2005.Google Scholar
Nissenbaum, Helen. “Securing Trust Online: Wisdom or Oxymoron.” Boston University Law Review 81, no. 3 (2001): 635–64. http://www.nyu.edu/projects/nissenbaum/papers/securingtrust.pdf .Google Scholar
Nussbaum, Martha C. Love's Knowledge: Essays on Philosophy and Literature. New York: Oxford University Press, 1990.Google Scholar
Pagallo, Ugo. “ISPs and Rowdy Web Sites before the Law: Should We Change Today's Safe Harbour Clauses?Philosophy and Technology 24, no. 4 (2011): 419–36.CrossRefGoogle Scholar
Paré, Daniel. “The Digital Divide: Why the ‘The’ is Misleading.” In Human Rights in the Digital Age, edited by Klang, Mathias and Murray, Andrew, 85–98. London: GlassHouse, 2005.Google Scholar
Parkinson, John, and Mansbridge, Jane, eds. Deliberative Systems: Deliberative Democracy at the Large Scale. Cambridge: Cambridge University Press, 2012.CrossRefGoogle Scholar
Passerin d'Entrèves, Maurizio. Democracy as Public Deliberation: New Perspectives. Piscataway, NJ: Transaction, 2006.Google Scholar
Pavlik, John Vernon. Media in the Digital Age. New York: Columbia University Press, 2008.Google Scholar
Peters, William. A Class Divided: Then and Now. New Haven, CT: Yale University Press, 1971.Google Scholar
Pettit, Philip. “Trust, Reliance, and the Internet.” Analyse and Kritik 26, no. 1 (2004): 108–21.CrossRefGoogle Scholar
Pittaro, Michael L. “Cyber Stalking: An Analysis of Online Harassment and Intimidation.” International Journal of Cyber Criminology 1, no. 2 (2007): 180–97.Google Scholar
Ploug, Thomas. Ethics in Cyberspace: How Cyberspace May Influence Interpersonal Interaction. Dordrecht, Netherlands: Springer, 2009.CrossRefGoogle Scholar
Polder-Verkiel, Saskia E. “Online Responsibility: Bad Samaritanism and the Influence of Internet Mediation.” Science and Engineering Ethics 18, no. 1 (2012): 117–41.CrossRefGoogle ScholarPubMed
Popper, Karl R. The Open Society and Its Enemies. London: Routledge and Kegan Paul, 1962.Google Scholar
Popper, Karl R. “Toleration and Intellectual Responsibility.” In On Toleration, edited by Mendus, Susan and Edwards, David, 17–34. Oxford: Clarendon Press, 1987.Google Scholar
Porter, Michael E., and Kramer, Mark R.. “Strategy and Society: The Link between Competitive Advantage and Corporate Social Responsibility.” Harvard Business Review, December 2006, 78–92.
Post, David G.Against ‘Against Cyberanarchy.’Berkeley Technology Law Journal 17 (2002): 1365–87.Google Scholar
Post, David G.. “What Larry Doesn't Get: Code, Law, and Liberty in Cyberspace.” Stanford Law Review 52 (2000): 1439–59.CrossRefGoogle Scholar
Price, Monroe E., and Verhulst, Stefaan G.. “The Concept of Self-Regulation and the Internet.” In Protecting Our Children on the Internet: Towards a New Culture of Responsibility, edited by Waltermann, Jens, and Machill, Marcel, 133–98. Gütersloh, Germany: Bertelsmann Foundation, 2000.Google Scholar
Rawls, John. The Law of Peoples. Cambridge, MA: Harvard University Press, 2002.Google Scholar
Rawls, John. A Theory of Justice. Boston: Belknap Press, 2005.Google Scholar
Raz, Joseph. The Morality of Freedom. Oxford: Clarendon Press, 1986.Google Scholar
Raz, Joseph. Value, Respect, and Attachment. Cambridge: Cambridge University Press, 2001.CrossRefGoogle Scholar
Reidenberg, Joel R.Technology and Internet Jurisdiction.” University of Pennsylvania Law Review 153 (2005): 1951–74.CrossRefGoogle Scholar
Reidenberg, Joel R.. “Yahoo and Democracy on the Internet.” Jurimetrics 42 (2002): 261–80.Google Scholar
Resnick, David. “Tolerance and the Internet.” In Tolerance in the Twenty-First Century: Prospects and Challenges, edited by Moreno-Riaño, Gerson, 213–20. Lanham, MD: Lexington Books, 2006.Google Scholar
Rheingold, Howard. “The Emerging Wireless Internet Will Both Improve and Degrade Human Life.” In The Future of the Internet, edited by Head, Tom, 19–32. Farmington Hills, MI: Greenhaven Press, 2005.Google Scholar
Rorty, Richard. “Justice as a Larger Loyalty.” Ethical Perspectives 4, no. 3 (1997): 139–51.CrossRefGoogle Scholar
Rossi, Alice S., ed. Caring and Doing for Others: Social Responsibility in the Domains of Family, Work, and Community. Chicago: University of Chicago Press, 2001.Google Scholar
Rotenberg, Marc. “Fair Information Practices and the Architecture of Privacy: (What Larry Doesn't Get).” Stanford Technology Law Review 1 (2001). https://journals.law.stanford.edu/sites/default/files/stanford-technology-law-review/online/rotenberg-fair-info-practices.pdf .Google Scholar
Rothman, Jennifer E. “Freedom of Speech and True Threats.” Harvard Journal of Law and Public Policy 25, no. 1 (2001): 283–367.Google Scholar
Ryan, Johnny. “The Essence of the ‘Net: A History of the Protocols That Hold the Network Together.” Ars Technica, March 8, 2011. http://arstechnica.com/tech-policy/news/2011/03/the-essence-of-the-net.ars/ .
Sacco, Dena, Argudin, Rebecca, Maguire, James, and Tallon, Kelly. “Sexting: Youth Practices and Legal Implications.” Berkman Research Publication 2010–8, Berkman Center for Research and Technology, Harvard University, Cambridge, MA, June 22, 2010.
Sadurski, Wojciech. Freedom of Speech and Its Limits. Dordrecht, Netherlands: Kluwer, 1999.CrossRefGoogle Scholar
Salus, Peter H. Casting the Net: From ARPANET to Internet and Beyond. Reading, MA: Addison-Wesley, 1995.Google Scholar
Saunders, Kevin W. Saving Our Children from the First Amendment. New York: New York University Press, 2003.Google Scholar
Schachter, Madeleine, and Kurtzberg, Joel. Law of Internet Speech. Durham, NC: Carolina Academic Press, 2008.Google Scholar
Schauer, Frederick. “The Cost of Communicative Tolerance.” In Liberal Democracy and the Limits of Tolerance: Essays in Honor and Memory of Yitzhak Rabin, edited by Cohen-Almagor, Raphael, 28–42. Ann Arbor: University of Michigan Press, 2000.Google Scholar
Schneider, Gary P., and Evans, Jessica. New Perspectives on the Internet: Comprehensive. th ed. Boston: Thomson, 2007.Google Scholar
Schneider, Gary P., and Evans, Jessica. New Perspectives on the Internet: Introductory. Boston: Thomson, 2007.Google Scholar
Schuler, Douglas, and Day, Peter. Shaping the Network Society: The New Role of Civil Society in Cyberspace. Cambridge, MA: MIT Press, 2004.Google Scholar
Shachtman, Noah. Pirates of the ISPs: Tactics for Turning Online Crooks into International Pariahs. Washington, DC: Brookings Institution, 2011.Google Scholar
Sher, George. Who Knew? Responsibility without Awareness. New York: Oxford University Press, 2009.CrossRefGoogle Scholar
Shirky, Clay. Here Comes Everybody: The Power of Organizing with Organizations. London: Penguin, 2008.Google Scholar
Simpson, Thomas W. “e-Trust and Reputation.” Ethics and Information Technology 13, no. 1 (2011): 29–38.CrossRefGoogle Scholar
Slevin, James. The Internet and Society. Oxford: Polity, 2000.Google Scholar
Smith, Bradford L.The Third Industrial Revolution: Policymaking for the Internet.” Columbia Science and Technology Law Review 3 (2001–2002): 1. http://www.columbia.edu/cu/stlr/html/Archive/ .Google Scholar
Smith, Ron F. Groping for Ethics in Journalism. Ames: Iowa State Press, 2003.Google Scholar
Spinello, Richard A. Cyberethics: Morality and Law in Cyberspace. Sudbury, MA: Jones & Bartlett, 2000.Google Scholar
Stanley, Janet. “The Internet Can Be Dangerous for Children.” In Does the Internet Benefit Society?, edited by Mur, Cindy, 95–101. Farmington Hills, MI: Greenhaven, 2005.Google Scholar
Szoka, Berin, and Marcus, Adam, eds. The Next Digital Decade: Essays on the Future of the Internet. Washington, DC: TechFreedom, 2010.Google Scholar
Tarbox, Katherine. Katie.com: My Story. New York: E. P. Dutton, 2000.Google Scholar
Tavani, Herman T. Ethics and Technology: Controversies, Questions, and Strategies for Ethical Computing. Hoboken, NJ: Wiley, 2011.Google Scholar
Tavani, Herman T. “The Impact of the Internet on Our Moral Condition: Do We Need a New Framework of Ethics?” In The Impact of the Internet on Our Moral Lives, edited by Cavalier, Robert J., 215–38. Albany: State University of New York Press, 2005.Google Scholar
Tavani, Herman T., and Grodzinsky, Frances S.. “Cyberstalking, Personal Privacy, and Moral Responsibility.” Ethics and Information Technology 4, no. 2 (2002): 123–32.Google Scholar
Tengblad, Stefan, and Ohlsson, Claes. “The Framing of Corporate Social Responsibility and the Globalization of National Business Systems.” Journal of Business Ethics 93, no. 4 (2010): 653–69.CrossRefGoogle Scholar
Thierer, Adam, and Crews, Clyde Wayne Jr., eds. Who Rules the Net? Internet Governance and Jurisdiction. Washington, DC: Cato Institute, 2003.Google Scholar
Thornburgh, Dick, and Lin, Herbert S.. eds. Youth, Pornography, and the Internet. Washington, DC: National Academies Press, 2002.Google Scholar
Travis, Hannibal, ed. Cyberspace Law: Censorship and Regulation of the Internet. London: Routledge, 2013.Google Scholar
Turkle, Sherry. Life on the Screen: Identity in the Age of the Internet. New York: Simon & Schuster, 1995.Google Scholar
Uslaner, Eric M. “Trust, Civic Engagement, and the Internet.” Political Communication 21, no. 2 (2004): 223–42.CrossRefGoogle Scholar
van den Hoven, Jeroen, and Weckert, John, eds. Moral Philosophy and Information Technology. Cambridge: Cambridge University Press, 2008.Google Scholar
van Dijk, Jan. The Network Society. London: Sage, 2012.Google Scholar
Vedder, Anton H. “Accountability of Internet Access and Service Providers: Strict Liability Entering Ethics.” Ethics and Information Technology 3, no. 1 (2001): 67–74.CrossRefGoogle Scholar
Vogel, David. The Market for Virtue: The Potential and Limits of Corporate Social Responsibility. Washington, DC: Brookings Institution, 2005.Google Scholar
Wagner, Ben. “The Politics of Internet Filtering: The United Kingdom and Germany in a Comparative Perspective.” Politics 34, no. 1 (2014): 58–71.CrossRefGoogle Scholar
Waisbord, Silvio. Reinventing Professionalism. Cambridge: Polity, 2013.Google Scholar
Wallace, Jonathan, and Mangan, Mark. Sex, Laws, and Cyberspace. New York: Henry Holt, 1996.Google Scholar
Waltermann, Jens, and Machill, Marcel, eds. Protecting Our Children on the Internet: Towards a New Culture of Responsibility. Gütersloh, Germany: Bertelsmann Foundation, 2000.Google Scholar
Walther, Joseph B., Van Der Heide, Brandon, Kim, Sang-Yeon, Westerman, David, and Tong, Stephanie Tom. “The Role of Friends’ Appearance and Behavior on Evaluations of Individuals on Facebook: Are We Known by the Company We Keep?Human Communication Research 34, no. 1 (2008): 28–49.CrossRefGoogle Scholar
Werther, William B., and Chandler, David B.. Strategic Corporate Social Responsibility: Stakeholders in a Global Environment. Thousand Oaks, CA: Sage, 2010.Google Scholar
Wu, Tim. The Master Switch: The Rise and Fall of Information Empires. New York: Knopf, 2010.Google Scholar
Zhao, Shanyang, Grasmuck, Sherry, and Martin, Jason. “Identity Construction on Facebook: Digital Empowerment in Anchored Relationships.” Computers in Human Behavior 24, no. 5 (2008): 1816–36. http://astro.temple.edu/~bzhao001/Identity%20Construction%20on%20Facebook.pdf .CrossRefGoogle Scholar
Zimmermann, Philip R. The Official PGP User's Guide. Cambridge, MA: MIT Press, 1995.Google Scholar
Zittrain, Jonathan L. “Beware the Cyber Cops.” Forbes Magazine, July 8, 2002.
Zittrain, Jonathan L.. The Future of the Internet – And How to Stop It. New Haven, CT: Yale University Press, 2008.Google Scholar
Zittrain, Jonathan L.. “The Generative Internet.” Harvard Law Review 119, no. 7 (2006): 1974–2040.Google Scholar
Zittrain, Jonathan L.. “Without a Net.” Legal Affairs, January–February 2006. http://www.legalaffairs.org/issues/January-February-2006/feature_zittrain_janfeb06.msp .
Akdeniz, Yaman. “Computer Pornography: A Comparative Study of the U.S. and U.K. Obscenity Laws and Child Pornography Laws in Relation to the Internet.” International Review of Law, Computers, and Technology 10, no. 2 (1996): 235–61.CrossRefGoogle Scholar
Akdeniz, Yaman. “Governance of Pornography and Child Pornography on the Global Internet: A Multi-layered Approach.” In Law and the Internet: Regulating Cyberspace, edited by Edwards, Lilian and Waelde, Charlotte, 223–41. Oxford: Hart, 1997.Google Scholar
Akdeniz, Yaman. Internet Child Pornography and the Law: National and International Responses. Aldershot, UK: Ashgate, 2008.Google Scholar
Akdeniz, Yaman. “The Regulation of Pornography and Child Pornography on the Internet.” Journal of Information, Law, and Technology 1 (1997). http://www2.warwick.ac.uk/fac/soc/law/elj/jilt/1997_1/akdeniz1 .Google Scholar
Akdeniz, Yaman. Sex on the Net: The Dilemma of Policing Cyberspace. London: South Street, 1999.Google Scholar
Bartow, Ann. “Internet Defamation as Profit Center: The Monetization of Online Harassment.” Harvard Journal of Law and Gender 32, no. 2 (2009): 384–429.Google Scholar
Berg, Terrence. “The Internet Facilitates Crime.” In Does the Internet Benefit Society?, edited by Mur, Cindy, 35–39. Farmington Hills, MI: Greenhaven, 2005.Google Scholar
Berlan, Elise D., Corliss, Heather L., Field, Alison E., Goodman, Elizabeth, and Austin, S. Bryn. “Sexual Orientation and Bullying among Adolescents in the Growing Up Today Study.” Journal of Adolescent Health 46, no. 4 (2010): 366–71.CrossRefGoogle ScholarPubMed
Bibby, Peter C., ed. Organized Abuse: The Current Debate. Brookfield, VT: Ashgate, 1996.Google Scholar
Carr, Indira, ed. Computer Crime. Surrey, UK: Ashgate, 2009.Google Scholar
Cavalier, Robert J., ed. The Impact of the Internet on Our Moral Lives. Albany: State University of New York Press, 2005.Google Scholar
Child Exploitation and Online Protection Centre (CEOP). “Annual Review: 2009–10.” London: CEOP, 2010.
Child Exploitation and Online Protection Centre (CEOP). “Strategic Threat Assessment: Child Trafficking in the U.K.” London: CEOP, April 2009.
Child Exploitation and Online Protection Centre (CEOP). Understanding Online Social Network Services and Risks to Youth. London: CEOP, November 2006.
Cohen-Almagor, Raphael. “Online Child Sex Offenders: Challenges and Counter-measures.” Howard Journal of Criminal Justice 52, no. 2 (2013): 190–215.CrossRefGoogle Scholar
Cohen-Almagor, Raphael, and Haleva-Amir, Sharon. “Bloody Wednesday in Dawson College: The Story of Kimveer Gill, or Why Should We Monitor Certain Websites to Prevent Murder.” Studies in Ethics, Law and Technology 2, no. 3 (2008): article 1. http://works.bepress.com/raphael_cohen_almagor/1 .CrossRefGoogle Scholar
Cohen-Almagor, Raphael, and Haleva-Amir, Sharon. “Why Monitor Violent Websites? A Justification.” Beijing Law Journal 3, no. 2 (2012): 64–71.Google Scholar
Connors, Paul G. “Internet Sexual Crime Legislation in Michigan.” Legislative Research Division, Michigan Legislative Service Bureau, Lansing, 2002.
Daniels, Peggy, ed. Policing the Internet. Farmington Hills, MI: Greenhaven, 2007.Google Scholar
Dwyer, Susan. “Enter Here – At Your Own Risk: The Moral Dangers of Cyberporn.” In The Impact of the Internet on Our Moral Lives, edited by Cavalier, Robert J., 69–94. Albany: State University of New York Press, 2005.Google Scholar
Edwards, Lilian, and Waelde, Charlotte, eds. Law and the Internet. Oxford: Hart, 1997.Google Scholar
Eneman, Marie. “The New Face of Child Pornography.” In Human Rights in the Digital Age, edited by Klang, Mathias and Murray, Andrew, 27–40. London: GlassHouse, 2005.Google Scholar
Europol. The Internet Organised Crime Threat Assessment (iOCTA). Den Haag, Netherlands: European Police Office, 2014.
Ferraro, Monique Mattei, Casey, Eoghan, and McGrath, Michael. Investigating Child Exploitation and Pornography: The Internet, the Law, and Forensic Science. Burlington, MA: Elsevier, 2005.Google Scholar
Flores, J. Robert. “Internet Pornography Should Be Censored.” In Censorship: Opposing Viewpoints, edited by Nakaya, Andrea C., 79–83. Farmington Hills, MI: Greenhaven Press, 2005.Google Scholar
Friedman, Lauri S., ed. The Internet: Introducing Issues with Opposing Viewpoints. Farmington Hills, MI: Greenhaven, 2008.Google Scholar
Gerson, Ruth, and Rappaport, Nancy. “Cyber Cruelty: Understanding and Preventing the New Bullying.” Adolescent Psychiatry 1, no. 1 (2011): 67–71.CrossRefGoogle Scholar
Gillespie, Alisdair. Child Exploitation and Communication Technologies. Dorset, UK: Russell House, 2008.Google Scholar
Goldstein, Seth. The Sexual Exploitation of Children: A Practical Guide to the Assessment, Investigation, and Intervention. Boca Raton, FL: CRC Press, 2009.Google Scholar
Good, R. Stephanie. Exposed: The Harrowing Story of a Mother's Undercover Work with the FBI to Save Children from Internet Sex Predators. Nashville, TN: Thomas Nelson, 2007.Google Scholar
Graham, William R. Jr. “Uncovering and Eliminating Child Pornography Rings on the Internet: Issues Regarding and Avenues Facilitating Law Enforcement's Access to ‘Wonderland.’Law Review of Michigan State University, Detroit College of Law 2 (2000): 457–84.Google Scholar
Haas, Larry. Safeguarding Your Child Online: How to Deal with Stranger Contact and Pornography on the Internet. Philadelphia: Xlibris, 2000.Google Scholar
Henderson, Harry. Internet Predators. New York: Facts on File, 2005.Google Scholar
Hiber, Amanda, ed. Child Pornography. San Diego, CA: Greenhaven Press, 2009.Google Scholar
Hinduja, Sameer, and Patchin, Justin W.. Bullying beyond the Schoolyard: Preventing and Responding to Cyberbullying. Thousand Oaks, CA: Sage, 2009.Google Scholar
Hinduja, Sameer, and Patchin, Justin W.. “Bullying, Cyberbullying, and Suicide.” Archives of Suicide Research 14, no. 3, (2010): 206–21.CrossRefGoogle ScholarPubMed
Hinduja, Sameer, and Patchin, Justin W.. “Offline Consequences of Online Victimization: School Violence and Delinquency.” Journal of School Violence 6, no. 3 (2007): 89–112.CrossRefGoogle Scholar
Information Resources Management Association. Cyber Crime: Concepts, Methodologies, Tools, and Applications. 3 vols. Hershey, PA: IGI Global, 2012.
Jenkins, Philip. Beyond Tolerance: Child Pornography on the Internet. New York: New York University Press, 2001.Google Scholar
Jenkins, Philip. “How Europe Discovered Its Sex Offender Crisis.” In How Claims Spread: Studies in the Cross-National Diffusion of Social Problems Claims, edited by Best, Joel, 147–68. Hawthorne, NY: Aldine de Gruyter, 2001.Google Scholar
Jenkins, Philip. Intimate Enemies: Moral Panics in Contemporary Great Britain. Hawthorne, NY: Aldine de Gruyter, 1992.Google Scholar
Jewkes, Yvonne, and Yar, Majid, eds. Handbook of Internet Crime. Portland, OR: Willan, 2010.Google Scholar
Kowalski, Robin M., and Limber, Susan P.. “Electronic Bullying among Middle School Students.” Journal of Adolescent Health 41, no. 6 (2007): S22–30.CrossRefGoogle ScholarPubMed
Kowalski, Robin, Limber, Susan, and Agatston, Patricia W.. Cyberbullying: Bullying in the Digital Age. Malden, MA: Blackwell, 2008.Google Scholar
Krinsky, Charles, ed. Moral Panics over Contemporary Children and Youth. Farnham, UK: Ashgate, 2008.Google Scholar
Lipschultz, Jeremy Harris. Broadcast and Internet Indecency: Defining Free Speech. New York: Routledge, 2008.Google Scholar
Lipton, Jacqueline D. “Combating Cyber-Victimization.” Berkeley Technology Law Journal 26, no. 2 (2011): 1103–56.Google Scholar
Livingstone, Sonia, and Haddon, Leslie, eds. Kids Online: Opportunities and Risks for Children. Bristol, UK: Policy Press, 2009.Google Scholar
Livingstone, Sonia, Haddon, Leslie, and Görzig, Anke, eds. Children, Risk, and Safety Online: Research and Policy Challenges in Comparative Perspective. Bristol, UK: Policy Press, 2012.CrossRefGoogle Scholar
Livingstone, Sonia, Haddon, Leslie, Görzig, Anke, and Ólafsson, Kjartan. Risks and Safety on the Internet: The Perspective of European Children – Full Findings and Policy Implications from the EU Kids Online Survey. London: EU Kids Online Network, 2011.Google Scholar
Lobe, Bojana, Livingstone, Sonia, Ólafsson, Kjartan, and Vodeb, Hana. Cross-National Comparison of Risks and Safety on the Internet. London: EU Kids Online, 2011.Google Scholar
Mansell, Robin, and Collins, Brian S., eds. Trust and Crime in Information Societies. Cheltenham, UK: Edward Elgar, 2005.Google Scholar
McAlinden, Anne-Marie. “Grooming” and the Sexual Abuse of Children: Institutional, Internet, and Familial Dimensions. Oxford: Oxford University Press, 2012.CrossRefGoogle Scholar
McLaughlin, James F.Characteristics of a Fictitious Child Victim: Turning a Sex Offender's Dreams into His Worst Nightmare.” International Journal of Communications Law and Policy 9 (2004): 1–27. http://www.ijclp.net/files/ijclp_web-doc_6-cy-2004.pdf .Google Scholar
McMahon, Elaine M., Reulbach, Udo, Keeley, Helen, Perry, Ivan J., and Arensman, Ella. “Bullying Victimisation, Self-Harm, and Associated Factors in Irish Adolescent Boys.” Social Science and Medicine 71, no. 7 (2010): 1300–1307.CrossRefGoogle ScholarPubMed
Meyer, Anneke. The Child at Risk: Pedophiles, Media Responses, and Public Opinion. Manchester, UK: Manchester University Press, 2007.Google Scholar
National Policing Improvement Agency. Investigating Child Abuse and Safeguarding Children. Wyboston, UK: Association of Chief Police Officers, 2009.
National Research Council. Global Networks and Local Values: A Comparative Look at Germany and the United States. Washington, DC: National Academies Press, 2001.
O'Neill, Brian, Staksrud, Elisabeth, and McLaughlin, Sharon, eds. Towards a Better Internet for Children? Policy Pillars, Players, and Paradoxes. Göteborg, Germany: Nordicom, 2013.Google Scholar
Ost, Suzanne. Child Pornography and Sexual Grooming: Legal and Societal Responses. Cambridge: Cambridge University Press, 2009.CrossRefGoogle Scholar
Patchin, Justin W., and Hinduja, Sameer. “Trends in Online Social Networking: Adolescent Use of MySpace over Time.” New Media and Society 12, no. 2 (2010): 197–216.CrossRefGoogle Scholar
Quayle, Ethel, and Taylor, Max. “Child Pornography and the Internet: Perpetuating a Cycle of Abuse.” Deviant Behavior 23, no. 4 (2002): 331–62.CrossRefGoogle Scholar
Saunders, Kevin W. Saving Our Children from the First Amendment. New York: New York University Press, 2003.Google Scholar
Shariff, Shahreen. Confronting Cyber Bullying: What Schools Need to Know to Control Misconduct and Avoid Legal Consequences. Cambridge: Cambridge University Press, 2009.CrossRefGoogle Scholar
Singer, P. W., and Friedman, Allan, Cybersecurity and Cyberwar: What Everyone Needs to Know. New York: Oxford University Press, 2014.Google Scholar
Stanley, Janet. “The Internet Can Be Dangerous for Children.” In Does the Internet Benefit Society?, edited by Mur, Cindy, 95–101. Farmington Hills, MI: Greenhaven, 2005.Google Scholar
Talbot, David. “The Private Sector Should Fight Cybercrime.” In The Internet: Introducing Issues with Opposing Viewpoints, edited by Friedman, Lauri S., 81–86. Farmington Hills, MI: Greenhaven, 2008.Google Scholar
Tarbox, Katherine. Katie.com: My Story. New York: E. P. Dutton, 2000.Google Scholar
Taylor, Max, Holland, Gemma, and Quayle, Ethel. “Typology of Pedophile Picture Collections.” Police Journal 74, no. 2 (2001): 97–107.CrossRefGoogle Scholar
Taylor, Max, and Quayle, Ethel. Child Pornography: An Internet Crime. Hove, UK: Brunner-Routledge, 2003.Google Scholar
Thornburgh, Dick, and Lin, Herbert S., eds. Youth, Pornography, and the Internet. Washington, DC: National Academies Press, 2002.Google Scholar
U.S. Department of Justice, Office for Victims of Crime. “Internet Threats to Children Are Increasing.” In Does the Internet Increase the Risk of Crime?, edited by Yount, Lisa, 10–18. Farmington Hills, MI: Greenhaven, 2006.
von Feilitzen, Cecilia, and Stenersen, Johanna, eds. Young People, Media, and Health: Risks and Rights. Göteborg, Germany: Nordicom, 2014.Google Scholar
White, Amy E. Virtually Obscene: The Case for an Uncensored Internet. Jefferson, NC: McFarland, 2006.Google Scholar
Williams, Kirk R., and Guerra, Nancy G.. “Prevalence and Predictors of Internet Bullying.” Journal of Adolescent Health 41, no. 6 (2007): S14–21.CrossRefGoogle ScholarPubMed
Wilson, Clay. “Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress.” CRS Report for Congress, Congressional Research Service, Washington, DC, January 29, 2008.
Wolak, Janis. Child Sexual Exploitation on the Internet. Oxford: Wiley, 2010.Google Scholar
Wolak, Janis, Finkelhor, David, and Mitchell, Kimberly J.. “Child Pornography Possessors: Trends in Offender and Case Characteristics.” Sexual Abuse 23, no. 1 (2011): 22–42.Google ScholarPubMed
Wolak, Janis, Finkelhor, David, Mitchell, Kimberly J., and Ybarra, Michele L.. “Online ‘Predators’ and Their Victims: Myths, Realities, and Implications for Prevention and Treatment.” American Psychologist 63, no. 2 (2008): 111–28.CrossRefGoogle ScholarPubMed
Wright, Kevin B., and Webb, Lynn M., eds. Computer-Mediated Communication in Personal Relationships. New York: Peter Lang, 2011.CrossRefGoogle Scholar
Wyre, Ray, and Tate, Tim. The Murder of Childhood: Inside the Mind of One of Britain's Most Notorious Child Murderers. London: Penguin, 1995.Google Scholar
Ybarra, Michele L., Diener-West, Marie, and Leaf, Philip J.. “Examining the Overlap in Internet Harassment and School Bullying: Implications for School Intervention.” Journal of Adolescent Health 41, no. 6 (2007): S42–50.CrossRefGoogle ScholarPubMed
Ybarra, Michele L., Espelage, Dorothy L., and Mitchell, Kimberly J.. “The Co-occurrence of Internet Harassment and Unwanted Sexual Solicitation Victimization and Perpetration: Associations with Psychosocial Indicators.” Journal of Adolescent Health 41, no. 6 (2007): S31–41.CrossRefGoogle ScholarPubMed
Yount, Lisa, ed. Does the Internet Increase the Risk of Crime?Farmington Hills, MI: Greenhaven, 2006.Google Scholar
Akdeniz, Yaman. Racism on the Internet. Strasbourg, France: Council of Europe Publishing, December 2009.Google Scholar
Allport, Gordon W. The Nature of Prejudice. Cambridge, MA: Addison-Wesley, 1954.Google Scholar
Anti-Defamation League. “Combating Extremism in Cyberspace: The Legal Issues Affecting Internet Hate Speech.” Anti-Defamation League, New York, 2000. http://archive.adl.org/civil_rights/newcyber.pdf .
Anti-Defamation League. “Responding to Cyberhate.” Anti-Defamation League, New York, August 2010.
Barnett, Brett A.Untangling the Web of Hate: Are Online “Hate Sites” Deserving of First Amendment Protection?Youngstown, OH: Cambria, 2007.Google Scholar
Berkowitz, Leonard. “The Case for Bottling Up Rage.” Psychology Today 7, no. 2 (1973): 24–31.Google Scholar
Burch, Edgar. “Comment: Censoring Hate Speech in Cyberspace – A New Debate in a New America.” North Carolina Journal of Law and Technology 3, no. 1 (2001): 175–92.Google Scholar
Citron, Danielle Keats, and Norton, Helen. “Intermediaries and Hate Speech: Fostering Digital Citizenship for Our Information Age.” Boston University Law Review 91, no. 4 (2011): 1435–84.Google Scholar
Cohen-Almagor, Raphael. “Countering Hate on the Internet.” Annual Review of Law and Ethics 22 (2014): 431–43.Google Scholar
Cohen-Almagor, Raphael. “Countering Hate on the Internet: A Rejoinder.” Amsterdam Law Forum 2, no. 2 (2010): 125–32.Google Scholar
Cohen-Almagor, Raphael. “Ethical Considerations in Media Coverage of Hate Speech in Canada.” Review of Constitutional Studies 6, no. 1 (2001): 79–100.Google Scholar
Cohen-Almagor, Raphael. “Fighting Hate and Bigotry on the Internet.” Policy and Internet 3, no. 3 (2011): 1–26.CrossRefGoogle Scholar
Cohen-Almagor, Raphael. “Holocaust Denial Is a Form of Hate Speech.” Amsterdam Law Forum 2, no. 1 (2009): 33–42.Google Scholar
Cohen-Almagor, Raphael. “Is Law Appropriate to Regulate Hateful and Racist Speech? The Israeli Experience.” Israel Studies Review 27, no. 2 (2012): 41–64.CrossRefGoogle Scholar
Cohen-Almagor, Raphael, ed. Liberal Democracy and the Limits of Tolerance: Essays in Honor and Memory of Yitzhak Rabin. Ann Arbor: University of Michigan Press, 2000.CrossRefGoogle Scholar
Cohen-Almagor, Raphael. “Regulating Hate and Racial Speech in Israel.” Cardozo Journal of International and Comparative Law 17 (2009): 101–10.Google Scholar
Daniels, Jessie. Cyber Racism: White Supremacy Online and the New Attack on Civil Rights. Lanham, MD: Rowman & Littlefield, 2009.Google Scholar
Delgado, Richard, and Stefancic, Jean. Understanding Words That Wound. Boulder, CO: Westview, 2004.Google Scholar
Eberwine, Eric T.Sound and Fury Signifying Nothing: Jürgen Büssow's Battle against Hate-Speech on the Internet.” New York Law Review 49 (2004): 353–410.Google Scholar
Ehrlich, Howard J. Campus Ethnoviolence and the Policy Options. Baltimore: National Institute against Prejudice and Violence, 1990.Google Scholar
Foxman, Abraham H., and Wolf, Christopher. Viral Hate: Containing Its Spread on the Internet. New York: Palgrave Macmillan, 2013.Google Scholar
Goldsmith, Jack L., and Wu, Tim. Who Controls the Internet? Illusions of a Borderless World. New York: Oxford University Press, 2006.Google Scholar
Gruen, Madeleine. “Innovative Recruitment and Indoctrination Tactics by Extremists: Video Games, Hip-Hop, and the World Wide Web.” In The Making of a Terrorist: Recruitment, Training, and Root Causes, edited by F. Forest, James J., 11–22. Westport, CT: Praeger, 2006.Google Scholar
Gruen, Madeleine. “White Ethnonationalist and Political Islamist Methods of Fund-Raising and Propaganda on the Internet.” In The Changing Face of Terrorism, edited by Gunaratna, Rohan, 127–45. Singapore: Marshall Cavendish, 2004.Google Scholar
Haney, Craig, Banks, Curtis, and Zimbardo, Philip. “Interpersonal Dynamics in a Simulated Prison.” International Journal of Criminology and Penology 1 (1973): 69–97.Google Scholar
Hare, Ivan, and Weinstein, James, eds. Extreme Speech and Democracy. Oxford: Oxford University Press, 2009.CrossRefGoogle Scholar
Henthoff, Nat. Free Speech for Me – But Not for Thee: How the American Left and Right Relentlessly Censor Each Other. New York: Harper Collins, 1992.Google Scholar
Hoffman, David S. The Web of Hate: Extremists Exploit the Internet. New York: Anti-Defamation League, 1996.Google Scholar
Kessler, Jordan. Poisoning the Web: Hatred Online. New York: Anti-Defamation League, 1999.Google Scholar
Lawrence, Frederick M. “The Hate Crime Project and Its Limitations: Evaluating the Societal Gains and Risk in Bias Crime Law Enforcement.” Public Law Research Paper 216, George Washington University Law School, Washington, DC, 2006. http://papers.ssrn.com/sol3/papers.cfm?abstract_id=921923 .
Le Menestrel, Marc, Hunter, Mark, and de Bettignies, Henri-Claude. “Internet E-ethics in Confrontation with an Activists’ Agenda: Yahoo! on Trial.” Journal of Business Ethics, 39, nos. 1–2 (2002): 135–44.CrossRefGoogle Scholar
Maitra, Ishani, and McGowan, Mary Kate. “On Racist Hate Speech and the Scope of a Free Speech Principle.” Canadian Journal of Law and Jurisprudence 23, no. 2 (2010): 343–72.CrossRefGoogle Scholar
Marriott, Michel. “Rising Tide: Sites Born of Hate.” New York Times, March 18, 1999, G1.
Matsuda, Mari J., Lawrence, Charles R., Delgado, Richard, and Crenshaw, Kimberly W., eds. Words That Wound: Critical Race Theory, Assaultive Speech, and the First Amendment. Boulder, CO: Westview Press, 1993.Google Scholar
Moon, Richard. The Constitutional Protection of Freedom of Expression. Toronto, ON: University of Toronto Press 2000.Google Scholar
Moon, Richard. “Report to the Canadian Human Rights Commission Concerning Section 13 of the Canadian Human Rights Act and the Regulation of Hate Speech on the Internet.” Canadian Human Rights Commission, Ottawa, October 2008. http://www.safs.ca/moonreport.pdf .
National Research Council. Global Networks and Local Values: A Comparative Look at Germany and the United States. Washington, DC: National Academies Press, 2001.
Newman, Stephen L. “American and Canadian Perspectives on Hate Speech and the Limits of Free Expression.” In Constitutional Politics in Canada and the United States, edited by Newman, Stephen L., 153–73. Albany: State University of New York Press, 2004.Google Scholar
Newman, Stephen L. “Should Hate Speech Be Allowed on the Internet? A Reply to Raphael Cohen-Almagor.” Amsterdam Law Forum 2, no. 2 (2010): 119–23.Google Scholar
Peters, William. A Class Divided: Then and Now. New Haven, CT: Yale University Press, 1971.Google Scholar
Phillips Marsh, Elizabeth. “Purveyors of Hate on the Internet: Are We Ready for Hate Spam?Georgia State University Law Review 17, no. 2 (2000): 379–407.Google Scholar
Roversi, Antonio. Hate on the Net: Extremist Sites, Neo-fascism On-line, Electronic Jihad. Aldershot, UK: Ashgate, 2008.Google Scholar
Southern Poverty Law Center. Active Hate Sites on the Internet in the Year 2001: Intelligence Report 101 (2002): 40–43.
Spinello, Richard A. Cyberethics: Morality and Law in Cyberspace. Sudbury, MA: Jones & Bartlett, 2000.Google Scholar
Stone, Deborah. “To Hate, Click Here: Antisemitism on the Internet.” Special Report 38, B'nai B'rith Anti-Defamation Commission, Melbourne, Australia, August 2008.
Tiven, Lorraine. Hate on the Internet: A Response Guide for Educators and Families. Washington, DC: Anti-Defamation League, December 2003.Google Scholar
Tsesis, Alexander. “Prohibiting Incitement on the Internet.” Virginia Journal of Law and Technology 7, no. 2 (2002): 1–41. http://vjolt.net/vol7/issue2/v7i2_a05-Tsesis.pdf .Google Scholar
Vick, Douglas W. “Regulating Hatred.” In Human Rights in the Digital Age, edited by Klang, Mathias and Murray, Andrew, 41–54. London: GlassHouse, 2005.Google Scholar
Waldron, Jeremy. The Harm in Hate Speech. Cambridge, MA: Harvard University Press, 2012.CrossRefGoogle Scholar
Waldron, Jeremy. “Is Dignity the Foundation of Human Rights?” Public Law Research Paper 12–73, New York University School of Law, New York, January 3, 2013.
Wallace, Jonathan, and Mangan, Mark. Sex, Laws, and Cyberspace. New York: Henry Holt, 1996.Google Scholar
Watt, Horatia Muir. “Yahoo! Cyber-Collision of Cultures: Who Regulates?Michigan Journal of International Law 24, no. 3 (2003): 673–96.Google Scholar
Wistrich, Robert S. A Lethal Obsession: Anti-semitism from Antiquity to the Global Jihad. New York: Random House, 2010.Google Scholar
Wolf, Christopher. “Needed: Diagnostic Tools to Gauge the Full Effect of Online Anti-semitism and Hate.” Presented at the Organization for Security and Co-operation in Europe meeting on the Relationship between Racist, Xenophobic, and Anti-semitic Propaganda on the Internet and Hate Crimes. Paris, June 16, 2004.
Altheide, David L. Terrorism and the Politics of Fear. Lanham, MD: AltaMira Press, 2006.Google Scholar
Altheide, David L. Terror Post 9/11 and the Media. New York: Peter Lang, 2009.Google Scholar
Anonymous. Al Qaeda Manual. http://www.fas.org/irp/world/para/manualpart1_1.pdf .
Katz, Rita]. Terrorist Hunter. New York: HarperCollins, 2003.Google Scholar
Atwan, Abdel Bari. After Bin Laden: Al Qaeda, the Next Generation. London: Saqi, 2012.Google Scholar
Atwan, Abdel Bari. The Secret History of al Qaeda. Berkeley: University of California Press, 2006.Google Scholar
Bobbitt, Philip. Terror and Consent: The Wars of the Twenty-First Century. New York: Knopf, 2008.Google Scholar
Brachman, Jarret M. Global Jihadism: Theory and Practice. London: Routledge, 2009.Google Scholar
Bunt, Gary R. Islam in the Digital Age: E-Jihad, Online Fatwas, and Cyber Islamic Environments. London: Pluto Press, 2003.Google Scholar
Calvert, John. Sayyid Qutb and the Origins of Radical Islamism. New York: Columbia University Press, 2010.Google Scholar
Clarke, Richard A. Against All Enemies: Inside America's War on Terror. New York: Free Press, 2004.Google Scholar
Cohen-Almagor, Raphael. “In Internet's Way: Radical, Terrorist Islamists on the Free Highway.” International Journal of Cyber Warfare and Terrorism 2, no. 3, (2012): 39–58.CrossRefGoogle Scholar
Cohen-Almagor, Raphael. “The Terrorists’ Best Ally: The Quebec Media Coverage of the FLQ Crisis in October 1970.” Canadian Journal of Communication 25, no. 2 (2000): 251–84.CrossRefGoogle Scholar
Combs, Cindy C. “The Media as a Showcase for Terrorism.” In Teaching Terror: Strategic and Tactical Learning in the Terrorist World, edited by F. Forest, James J., 133–54. Lanham, MD: Rowman & Littlefield, 2006.Google Scholar
Conway, Maura. “Terrorist ‘Use’ of the Internet and Fighting Back.” Information and Security 19 (2006): 9–30.Google Scholar
Coolsaet, Rik, ed. Jihadi Terrorism and the Radicalisation Challenge: European and American Experiences. Surrey, UK: Ashgate, 2011.Google Scholar
Daniels, Peggy, ed. Policing the Internet. Farmington Hills, MI: Greenhaven, 2007.Google Scholar
Denning, Dorothy E. “Terror's Web: How the Internet Is Transforming Terrorism.” In Handbook of Internet Crime, edited by Jewkes, Yvonne and Yar, Majid, 194–213. Portland, OR: Willan, 2010.Google Scholar
Denning, Dorothy E.. “A View of Cyberterrorism Five Years Later.” In Internet Security: Hacking, Counterhacking, and Society, edited by Himma, Kenneth E., 123–40. Sudbury, MA: Jones & Bartlett, 2007.Google Scholar
Forest, James J. F., ed. Teaching Terror: Strategic and Tactical Learning in the Terrorist World. Lanham, MD: Rowman & Littlefield, 2006.Google Scholar
Forest, James J. F.. “Training Camps and Other Centers of Learning.” In Teaching Terror: Strategic and Tactical Learning in the Terrorist World, edited by Forest, James J. F., 69–109. Lanham, MD: Rowman & Littlefield, 2006.Google Scholar
Gable, Gerry, and Jackson, Paul. Lone Wolves: Myth or Reality. London: Searchlight, 2011.Google Scholar
Geltzer, Joshua Alexander. U.S. Counter-terrorism Strategy and al-Qaeda: Signalling and the Terrorist World-View. New York: Routledge, 2009.Google Scholar
Giroux, Henry A. Beyond the Spectacle of Terrorism: Global Uncertainty and the Challenge of the New Media. Boulder, CO: Paradigm, 2006.Google Scholar
Golumbic, Martin C. Fighting Terror Online: The Convergence of Security, Technology, and the Law. New York: Springer, 2008.Google Scholar
Green, Joshua. “Cyberterrorism Is Not a Major Threat.” In Does the Internet Increase the Risk of Crime?, edited by Yount, Lisa, 56–65. Farmington Hills, MI: Greenhaven, 2006.Google Scholar
Green, Joshua. “The Threat of Cyberterrorism Is Greatly Exaggerated.” In Does the Internet Benefit Society?, edited by Mur, Cindy, 40–49. Farmington Hills, MI: Greenhaven, 2005.Google Scholar
Gruen, Madeleine. “Innovative Recruitment and Indoctrination Tactics by Extremists: Video Games, Hip-Hop, and the World Wide Web.” In The Making of a Terrorist: Recruitment, Training, and Root Causes, edited by Forest, James J. F., 11–22. Westport, CT: Praeger, 2006.Google Scholar
Gunaratna, Rohan, ed. The Changing Face of Terrorism. Singapore: Marshall Cavendish, 2004.Google Scholar
Hewitt, Steve. The British War on Terror: Terrorism and Counter-terrorism on the Home Front since 9–11. London: Continuum, 2008.Google Scholar
Hoffman, Bruce. “Internet Terror Recruitment and Tradecraft: How Can We Address an Evolving Tool While Protecting Free Speech?” Statement before the House Committee on Homeland Security, Subcommittee on Intelligence, Information Sharing and Terrorism Risk Assessment, Washington, DC, May 26, 2010.
Jenkins, Brian Michael. “No Path to Glory: Deterring Homegrown Terrorism.” Statement before the House Committee on Homeland Security, Subcommittee on Intelligence, Information Sharing and Terrorism Risk Assessment, Washington, DC, May 26, 2010.
Jenkins, Brian Michael. Would-Be Warriors: Incidents of Jihadist Terrorist Radicalization in the United States since September 11, 2001. Santa Monica, CA: RAND, 2010.Google Scholar
Kenney, Michael. “How Terrorists Learn.” In Teaching Terror: Strategic and Tactical Learning in the Terrorist World, edited by F. Forest, James J., 33–51. Lanham, MD: Rowman & Littlefield, 2006.Google Scholar
Lappin, Yaakov. Virtual Caliphate: Exposing the Islamist State on the Internet. Washington, DC: Potomac Books, 2011.Google Scholar
Martin, Gus. Essentials of Terrorism: Concepts and Controversies. Thousand Oaks, CA: Sage, 2011.Google Scholar
Meijer, Roel, ed. Global Salafism: Islam's New Religious Movement. New York: Columbia University Press, 2009.Google Scholar
Meleagrou-Hitchens, Alexander. “New English-Language al-Qaeda Explosive Manual Released Online.” ICSR Insight, International Centre for the Study of Radicalization, King's College, London, December 31, 2010.
Morris, John B. “Free Speech and Online Intermediaries in an Age of Terror Recruitment.” Statement before the House Committee on Homeland Security, Washington, DC, May 26, 2010.
National Security Program. “Countering Online Radicalization in America.” Bipartisan Policy Center, Washington, DC, December 2012.
National Security Program. “Jihadist Terrorism and Other Unconventional Threats.” Bipartisan Policy Center, Washington, DC, September 2014, http://bipartisanpolicy.org/sites/default/files/BPC%20HSP%202014%20Jihadist%20Terrorism%20and%20Other%20Unconventional%20Threats%20September%202014.pdf .
Perl, Raphael F. “Terrorist Use of the Internet: Threat, Issues, and Options for International Co-operation.” Remarks before the Second International Forum on Information Security, Garmisch-Partenkirchen, Germany, April 7–10, 2008.
Rheingold, Howard. “The Emerging Wireless Internet Will Both Improve and Degrade Human Life.” In The Future of the Internet, edited by Head, Tom, 19–32. Farmington Hills, MI: Greenhaven Press, 2005.Google Scholar
Rogan, Hanna. “Jihadism Online: A Study of How al-Qaida and Radical Islamist Groups Use the Internet for Terrorist Purposes.” Norwegian Defence Research Establishment, Kjeller, Norway, 2006.
Rollins, John, Wyler, Liana Sun, and Rosen, Seth. “International Terrorism and Transnational Crime: Security Threats, U.S. Policy, and Considerations for Congress.” CRS Report for Congress, Congressional Research Service, Washington, DC, March 18, 2010.
Romero, Anthony D. “Internet Terror Recruitment and Tradecraft: How Can We Address an Evolving Tool While Protecting Free Speech?” Statement before the House Committee on Homeland Security, Washington, May 26, 2010.
Roversi, Antonio. Hate on the Net: Extremist Sites, Neo-fascism On-line, Electronic Jihad. Aldershot, UK: Ashgate, 2008.Google Scholar
Sageman, Marc. Leaderless Jihad: Terror Networks in the Twenty-First Century. Philadelphia: University of Pennsylvania Press, 2008.CrossRefGoogle Scholar
Sageman, Marc. Understanding Terror Networks. Philadelphia: University of Pennsylvania Press, 2004.CrossRefGoogle Scholar
Schmid, Alex P., ed. The Routledge Handbook of Terrorism Research: Research, Theories, and Concepts. London: Routledge, 2011.Google Scholar
Sieber, Ulrich, and Brunst, Phillip W.. Cyberterrorism: The Use of the Internet for Terrorist Purposes. Strasbourg, France: Council of Europe, 2008.Google Scholar
United Nations Office on Drugs and Crime. The Use of the Internet for Terrorist Purposes. New York: United Nations, 2012.
Wade, Marianne, and Mljevic, Almir, eds. A War on Terror? The European Stance on a New Threat, Changing Laws, and Human Rights Implications. New York: Springer, 2011.Google Scholar
Wallace, Jonathan, and Mangan, Mark. Sex, Laws, and Cyberspace. New York: Henry Holt, 1996.Google Scholar
Weimann, Gabriel. “New Terrorism and New Media.” Woodrow Wilson International Center for Scholars, Washington, DC, 2014.
Weimann, Gabriel. “Terrorist Dot Com: Using the Internet for Terrorist Recruitment and Mobilization.” In The Making of a Terrorist: Recruitment, Training, and Root Causes, edited by Forest, James J. F., 53–65. Westport, CT: Praeger, 2006.Google Scholar
Weimann, Gabriel. Terror on the Internet: The New Arena, the New Challenges. Washington, DC: U.S. Institute of Peace Press, 2006.Google Scholar
Weimann, Gabriel. “Virtual Training Camps: Terrorists’ Use of the Internet.” In Teaching Terror: Strategic and Tactical Learning in the Terrorist World, edited by Forest, James J. F., 110–32. Lanham, MD: Rowman & Littlefield, 2006.Google Scholar
Weimann, Gabriel, and Von Knop, Katharina. “Applying the Notion of Noise to Countering Online Terrorism.” Studies in Conflict and Terrorism 31, no. 10 (2008): 883–902.CrossRefGoogle Scholar
Wiktorowicz, Quintan. Global Jihad: Understanding September 11. Falls Church, VA: Sound Room Publishers, 2002.Google Scholar
Wiktorowicz, Quintan. “The New Global Threat: Transnational Salafis and Jihad.” Middle East Policy 8, no. 4 (2001): 18–38, http://groups.colgate.edu/aarislam/wiktorow.htm .CrossRefGoogle Scholar
Wiktorowicz, Quintan. Radical Islam Rising: Muslim Extremism in the West. Lanham, MD: Rowman & Littlefield, 2005.Google Scholar
Wright, Lawrence. The Looming Tower: Al-Qaeda and the Road to 9/11. New York: Knopf, 2006.Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×