Social Media and the Activist Toolkit: User Agreements, Corporate Interests, and the Information Infrastructure of Modern Social Movements
dc.contributor.author | Youmans, William Lafi | en_US |
dc.contributor.author | York, Jillian C. | en_US |
dc.date.accessioned | 2012-05-21T15:48:35Z | |
dc.date.available | 2013-06-11T19:15:52Z | en_US |
dc.date.issued | 2012-04 | en_US |
dc.identifier.citation | Youmans, William Lafi; York, Jillian C. (2012). "Social Media and the Activist Toolkit: User Agreements, Corporate Interests, and the Information Infrastructure of Modern Social Movements." Journal of Communication 62(2). <http://hdl.handle.net/2027.42/91171> | en_US |
dc.identifier.issn | 0021-9916 | en_US |
dc.identifier.issn | 1460-2466 | en_US |
dc.identifier.uri | https://hdl.handle.net/2027.42/91171 | |
dc.publisher | Blackwell Publishing Ltd | en_US |
dc.publisher | Wiley Periodicals, Inc. | en_US |
dc.title | Social Media and the Activist Toolkit: User Agreements, Corporate Interests, and the Information Infrastructure of Modern Social Movements | en_US |
dc.type | Article | en_US |
dc.rights.robots | IndexNoFollow | en_US |
dc.subject.hlbsecondlevel | Communications | en_US |
dc.subject.hlbtoplevel | Social Sciences | en_US |
dc.description.peerreviewed | Peer Reviewed | en_US |
dc.contributor.affiliationum | Department of Communication Studies, University of Michigan, Ann Arbor, MI 48109‐1285, USA | en_US |
dc.contributor.affiliationother | Electronic Frontier Foundation, San Francisco, CA, USA | en_US |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/91171/1/j.1460-2466.2012.01636.x.pdf | |
dc.identifier.doi | 10.1111/j.1460-2466.2012.01636.x | en_US |
dc.identifier.source | Journal of Communication | en_US |
dc.identifier.citedreference | Noman, H. ( 2011 ). The emergence of open and organized pro‐government cyber attacks in the Middle East: The case of the Syrian Electronic Army. Information Warfare Monitor. Retrieved from http://opennet.net/emergence‐open‐and‐organized‐pro‐government‐cyber‐attacks‐middle‐east‐case‐syrian‐electronic‐army | en_US |
dc.identifier.citedreference | Perez, J. C. ( 2011 ). Egypt's Internet block aims at social media. Computerworld, January 28. Retrieved from http://www.computerworld.com/s/article/9206980/Egypt_s_Internet_block_aims_at_social_media | en_US |
dc.identifier.citedreference | Pfanner, E. ( 2011, September 4). Naming names on the Internet. The New York Times. Retrieved from http://www.nytimes.com/2011/09/05/technology/naming‐names‐on‐the‐Internet.html | en_US |
dc.identifier.citedreference | Plesser, A. ( 2011, May 6). YouTube is managing graphic, violent videos from the Middle East with community help. Business Insider. Retrieved from http://articles.businessinsider.com/2011‐05‐06/entertainment/30063062_1_videos‐youtube‐beettv. | en_US |
dc.identifier.citedreference | Sayed, H. ( 2011, August 6). Fear of arrest. [blog]. Retrieved from http://www.jadaliyya.com/pages/index/2328/fear‐of‐arrest | en_US |
dc.identifier.citedreference | Segerberg, A., & Bennett, W. L. ( 2011 ). Social media and the organization of collective action: Using Twitter to explore the ecologies of two climate change protests. The Communication Review, 14 ( 3 ), 197– 215. DOI: 10.1080/10714421.2011.59725 | en_US |
dc.identifier.citedreference | Shirky, C. ( 2008 ). Here comes everybody: The power of organizing without organizations. New York, NY: Penguin. | en_US |
dc.identifier.citedreference | Shirky, C. ( 2011 ). The political power of social media. Foreign Affairs, 90 ( 1 ), 28 – 41. | en_US |
dc.identifier.citedreference | Vara, V. ( 2008, February 29). Facebook denies role in Morocco arrest. Wall Street Journal. Retrieved from http://online.wsj.com/article/SB120424448908501345.html | en_US |
dc.identifier.citedreference | Viégas, F. B. ( 2005 ). Bloggers' expectations of privacy and accountability: An initial survey. Journal of Computer-Mediated Communication, 10 ( 3 ), article 12. DOI: 10.1111/j.1083-6101. 2005.tb00260.x | en_US |
dc.identifier.citedreference | Wallace, J. D. ( 1999 ). Nameless in cyberspace: Anonymity on the Internet. Cato Institute Briefing Papers, No. 54, December 8. Retrieved from http://www.cato.org/pubs/briefs/bp54.pdf | en_US |
dc.identifier.citedreference | Wilson, C., & Dunn, A. ( 2011 ). Digital media in the Egyptian revolution: Descriptive analysis from the Tahrir data sets. International Journal of Communication, 5, 1248 – 1272. | en_US |
dc.identifier.citedreference | Wood, J. ( 2011 ). Underground in Beirut. Boston Review. August, 1. Retrieved from http://www.bostonreview.net/BR36.4/josh_wood_syrian_activist_arab_spring_lebanon_beirut.php | en_US |
dc.identifier.citedreference | Yin, R. K. ( 2003 ). Case study research: Design and methods (3rd ed.). Thousand Oaks, CA: Sage. | en_US |
dc.identifier.citedreference | York, J. ( 2010 ). Policing content in the quasi‐public sphere. OpenNet Initiative Bulletin. Retrieved from http://opennet.net/policing‐content‐quasi‐public‐sphere. | en_US |
dc.identifier.citedreference | Zhuo, J. ( 2010, November, 30). Where anonymity breeds contempt. The New York Times, A31. | en_US |
dc.identifier.citedreference | Zittrain, J. ( 2009, May 6). How to get what we all want. Cato Institute [blog]. Retrieved from http://www.cato‐unbound.org/2009/05/06/jonathan‐zittrain/how‐to‐get‐what‐we‐all‐want/ | en_US |
dc.identifier.citedreference | Aday, S., & Livingston, S. ( 2008 ). Taking the state out of state‐media relations theory: How transnational advocacy networks are rewriting (some of) the rules about what we think we know about news and politics. Media, War, and Conflict, 1 ( 1 ), 99 – 107. DOI: 10.1177/ 1750635207087630 | en_US |
dc.identifier.citedreference | Addley, E. ( 2011, June 13). Syrian lesbian blogger is revealed conclusively to be a married man. The Guardian (UK). Retrieved from http://www.guardian.co.uk/world/2011/jun/13/syrian‐lesbian‐blogger‐tom‐macmaster | en_US |
dc.identifier.citedreference | Amos, D. ( 2011, August 3). Syrian uprising expands despite absence of leaders. Npr.org. Retrieved from http://www.npr.org/2011/08/03/138936844/syrian‐uprising‐expands‐despite‐absence‐of‐leaders | en_US |
dc.identifier.citedreference | Anderson, L. ( 2011 ). Demystifying the Arab spring: Parsing the differences between Tunisia, Egypt and Libya. Foreign Affairs, 90 ( 3 ), 2 – 7. | en_US |
dc.identifier.citedreference | Aouragh, M., & Anderson, A. ( 2011 ). The Egyptian experience: Sense and nonsense of the Internet revolution. International Journal of Communication, 5, 1344 – 1358. | en_US |
dc.identifier.citedreference | Armbrust, W. ( 2007 ). New media and old agendas: The Internet in the Middle East and Middle Eastern Studies. International Journal of Middle East Studies, 39 ( 4 ), 531 – 533. DOI: 10.1017/S0020743807071048 | en_US |
dc.identifier.citedreference | al‐Assad, B. ( 2011, June 21). Speech of H.E. President Bashar al‐Assad at Damascus University on the situation in Syria. Damascus, Syria. Retrieved from http://www.sana.sy/eng/337/2011/06/21/353686.htm | en_US |
dc.identifier.citedreference | Athanasiadis, I. ( 2010, January 4). Iran uses Internet as tool against protesters. Christian Science Monitor. Retrieved from http://www.csmonitor.com/World/2010/0104/Iran‐uses‐Internet‐as‐tool‐against‐protesters | en_US |
dc.identifier.citedreference | Bennett, W. L. ( 2003 ). New media power: The Internet and global activism. In Couldry, N. & J. Curran (Eds.), Contesting media power (pp. 17 – 38 ).Oxford, England: Rowman and Littlefield. | en_US |
dc.identifier.citedreference | Bimber, B., Flanagin, A., & Stohl, C. ( 2005 ). Reconceptualizing collective action in the contemporary media environment. Communication Theory, 15 ( 4 ), 365 – 388. DOI: 10. 1093/ct/15.4.365 | en_US |
dc.identifier.citedreference | Boswell, A. ( 2011, April 6). How Sudan used the Internet to crush protest movement. McClatchy Newspapers. Retrieved from http://www.mcclatchydc.com/2011/04/06/111637/sudans‐government‐crushed‐protests.html | en_US |
dc.identifier.citedreference | Brodkin, J. ( 2009, December, 8). Facebook halts Beacon, gives $9.5M to settle lawsuit. PCWorld. Retrieved from http://www.pcworld.com/article/184029/facebook_halts_beacon_gives_95m_to_settle_lawsuit.html | en_US |
dc.identifier.citedreference | Clinton, H. ( 2010, January, 21). Remarks on Internet freedom. Washington, DC. Retrieved from http://www.state.gov/secretary/rm/2010/01/135519.htm | en_US |
dc.identifier.citedreference | Coker, M., Malas, N., & Champion, M. ( 2011, February, 7). Google executive emerges as key figure in revolt. The Wall Street Journal. Retrieved from http://online.wsj.com/article/SB10001424052748703989504576127621712695188.html | en_US |
dc.identifier.citedreference | Cowie, J. ( 2011a ). Libyan Disconnect. [blog]. Retrieved from http://www.renesys.com/blog/2011/02/libyan‐disconnect‐1.shtml | en_US |
dc.identifier.citedreference | Cowie, J. ( 2011b ). Tracing the Syrian blackout. [blog]. Retrieved from http://www.renesys.com/blog/2011/06/tracing‐the‐syrian‐blackout.shtml | en_US |
dc.identifier.citedreference | Debatin, B., Lovejoy, J. P., Horn, A., & Hughes, B. ( 2009 ). Facebook and online privacy: Attitudes, behaviors, and unintended consequences. Journal of Computer-Mediated Communication, 15, 83 – 108. DOI: 10.1111/j.1083-6101.2009.01494.x | en_US |
dc.identifier.citedreference | Deibert, R., Palfrey, J., Rohozinski, R., & Zittrain, J. ( 2008 ). Access denied: The practice and policy of global Internet filtering. Cambridge, MA: MIT Press. | en_US |
dc.identifier.citedreference | Faris, R., Roberst, H., Heacock, R., Zuckerman, E., & Gasser, U. ( 2011, 2 August) Online security in the Middle East and North Africa: A survey of perceptions, knowledge, and practice. Berkman Center for Internet & Society at Harvard University. Retrieved from http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/OnlineSecurityintheMiddleEastandNorthAfrica_August2011.pdf | en_US |
dc.identifier.citedreference | Flanagin, A. J., Stohl, C., & Bimber, B. ( 2006 ). Modeling the structure of collective action. Communication Monographs, 73, 29 – 54. DOI: 10.1080/03637750600557099 | en_US |
dc.identifier.citedreference | George, A. L., & Bennett, A. ( 2005 ). Case studies and theory development in the social sciences. Cambridge, MA: MIT Press. | en_US |
dc.identifier.citedreference | Giglio, M. ( 2011, 30 January). The mysterious ‘anonymous’ behind Egypt's revolt. Newsweek. Retrieved from http://www.newsweek.com/2011/01/30/el‐shaheed‐the‐mysterious‐anonymous‐behind‐egypt‐s‐revolt.html | en_US |
dc.identifier.citedreference | Gladwell, M. ( 2010, 4 October). Small change. The New Yorker. Retrieved from http://www.newyorker.com/reporting/2010/10/04/101004fa_fact_gladwell | en_US |
dc.identifier.citedreference | Grimmelmann, J. ( 2004 ). Regulation by software. Yale Law Journal, 114, 1719 – 1775. | en_US |
dc.identifier.citedreference | Grimmelmann, J. ( 2010 ). Privacy as product safety. Widener Law Journal, 19, 793 – 827. | en_US |
dc.identifier.citedreference | Howard, P. N. ( 2010 ). The digital origins of dictatorship and democracy: Information technology and political Islam. Oxford, England: Oxford University Press. | en_US |
dc.identifier.citedreference | Howard, P. N., & Hussain, M. M. ( 2011 ). Digital media and the Arab Spring. Journal of Democracy, 22 ( 3 ), 35 – 48. DOI: 10.1080/10714421.2011.597254 | en_US |
dc.identifier.citedreference | Iskander, E. ( 2011 ). Connecting the national and the virtual: Can Facebook activism remain relevant after Egypt's January 25 uprising? International Journal of Communication, 5, 1225 – 1237. | en_US |
dc.identifier.citedreference | Jepperson, R. ( 1991 ). Institutions, institutional effects, and institutionalism. In W. W. Powell & P. J. DiMaggio (Eds.), The new institutionalism in organizational analysis (pp. 143 – 163 ).Chicago, IL: The University of Chicago. | en_US |
dc.identifier.citedreference | Karam, Z. ( 2011, September 27). Syria wages cyber warfare as websites hacked. Associated Press. Retrieved from http://www.google.com/hostednews/ap/article/ALeqM5h_ALtePegit5Y7joOwz51xnk‐dSA?docId=876d93bf5fa04fe7a132c428ca97bb92 | en_US |
dc.identifier.citedreference | Kavanaugh, A., Yang, S., Sheetz, S., Li, L. T., & Fox, E. A. ( 2011 ). Between a rock and a cell phone: Social media use during mass protests in Iran, Tunisia and Egypt. ACM Transactions on Computer‐Human Interaction. DOI: 10.1145/0000000.0000000 | en_US |
dc.identifier.citedreference | Kerr, I., Steeves, V., & Lucock, C. ( 2009 ). Lessons from the identity trail: Anonymity, privacy and identity in a networked society. Oxford, England: Oxford University Press. | en_US |
dc.identifier.citedreference | Khamis, S., & Vaughn, K. ( 2011 ). Cyberactivism in the Egyptian revolution: How civic engagement and citizen journalism. Arab Media and Society, 13. Retrieved from http://www.arabmediasociety.com/?article=769 | en_US |
dc.identifier.citedreference | Kopytoff, V. G. ( 2011, March 7). Sites like Twitter absent from free speech pact. The New York Times, B4. | en_US |
dc.identifier.citedreference | Lessig, L. ( 1999 ). Code: And other laws of cyberspace. London, England: Basic Books. | en_US |
dc.identifier.citedreference | Lessig, L. ( 2006 ). Code: And other laws of cyberspace. Version 2.0. London, England: Basic Books. | en_US |
dc.identifier.citedreference | Lynch, M. ( 2011 ). After Egypt: The limits and promise of online challenges to the authoritarian Arab state. Perspectives on Politics, 9 ( 2 ), 301 – 310. DOI: 10.1017/S15375927 1100091 | en_US |
dc.identifier.citedreference | MacKinnon, R. ( 2007 ). Shi Tao, Yahoo!, and the lessons for corporate social responsibility (Working paper). Retrieved from http://rconversation.blogs.com/YahooShiTaoLessons.pdf | en_US |
dc.identifier.citedreference | MacKinnon, R. ( 2010, May 29). More problems in Facebookistan. [blog]. Retrieved from http://rconversation.blogs.com/rconversation/2010/05/more‐problems‐in‐facebookistan.html | en_US |
dc.identifier.citedreference | MacKinnon, R. ( 2011, July). Let's take back the Internet! TEDGlobal, Edinburgh, Scotland. Retrieved from http://www.ted.com/talks/rebecca_mackinnon_let_s_take_back_the_internet.html | en_US |
dc.identifier.citedreference | Mansell, R. ( 2006 ). Collective action, institutionalism and the Internet. Journal of Economic Issues, 40 ( 2 ), 297 – 305. DOI: 10.1177/1461444804039910 | en_US |
dc.identifier.citedreference | Masoud, T. ( 2011 ). The Road to (and from) Liberation Square. Journal of Democracy, 22 ( 3 ), 20 – 34. | en_US |
dc.identifier.citedreference | Melber, A. ( 2011, May 31). YouTube reinstates blocked video of child allegedly tortured in Syria. The Nation. Retrieved from http://www.thenation.com/blog/161050/youtube‐reinstates‐blocked‐video‐child‐allegedly‐tortured‐syria | en_US |
dc.identifier.citedreference | Morozov, E. ( 2011 ). The net delusion: The dark side of Internet freedom. New York, NY: Public Affairs. | en_US |
dc.identifier.citedreference | Noman, H. ( 2010 ). Sex, social mores, and keyword filtering: Microsoft Bing in ‘Arabian Countries'. OpenNet Initiative Bulletin. Retrieved from http://opennet.net/sex‐social‐mores‐and‐keyword‐filtering‐microsoft‐bing‐arabian‐countries | en_US |
dc.owningcollname | Interdisciplinary and Peer-Reviewed |
Files in this item
Remediation of Harmful Language
The University of Michigan Library aims to describe library materials in a way that respects the people and communities who create, use, and are represented in our collections. Report harmful or offensive language in catalog records, finding aids, or elsewhere in our collections anonymously through our metadata feedback form. More information at Remediation of Harmful Language.
Accessibility
If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.