Show simple item record

Social Media and the Activist Toolkit: User Agreements, Corporate Interests, and the Information Infrastructure of Modern Social Movements

dc.contributor.authorYoumans, William Lafien_US
dc.contributor.authorYork, Jillian C.en_US
dc.date.accessioned2012-05-21T15:48:35Z
dc.date.available2013-06-11T19:15:52Zen_US
dc.date.issued2012-04en_US
dc.identifier.citationYoumans, William Lafi; York, Jillian C. (2012). "Social Media and the Activist Toolkit: User Agreements, Corporate Interests, and the Information Infrastructure of Modern Social Movements." Journal of Communication 62(2). <http://hdl.handle.net/2027.42/91171>en_US
dc.identifier.issn0021-9916en_US
dc.identifier.issn1460-2466en_US
dc.identifier.urihttps://hdl.handle.net/2027.42/91171
dc.publisherBlackwell Publishing Ltden_US
dc.publisherWiley Periodicals, Inc.en_US
dc.titleSocial Media and the Activist Toolkit: User Agreements, Corporate Interests, and the Information Infrastructure of Modern Social Movementsen_US
dc.typeArticleen_US
dc.rights.robotsIndexNoFollowen_US
dc.subject.hlbsecondlevelCommunicationsen_US
dc.subject.hlbtoplevelSocial Sciencesen_US
dc.description.peerreviewedPeer Revieweden_US
dc.contributor.affiliationumDepartment of Communication Studies, University of Michigan, Ann Arbor, MI 48109‐1285, USAen_US
dc.contributor.affiliationotherElectronic Frontier Foundation, San Francisco, CA, USAen_US
dc.description.bitstreamurlhttp://deepblue.lib.umich.edu/bitstream/2027.42/91171/1/j.1460-2466.2012.01636.x.pdf
dc.identifier.doi10.1111/j.1460-2466.2012.01636.xen_US
dc.identifier.sourceJournal of Communicationen_US
dc.identifier.citedreferenceNoman, H. ( 2011 ). The emergence of open and organized pro‐government cyber attacks in the Middle East: The case of the Syrian Electronic Army. Information Warfare Monitor. Retrieved from http://opennet.net/emergence‐open‐and‐organized‐pro‐government‐cyber‐attacks‐middle‐east‐case‐syrian‐electronic‐armyen_US
dc.identifier.citedreferencePerez, J. C. ( 2011 ). Egypt's Internet block aims at social media. Computerworld, January 28. Retrieved from http://www.computerworld.com/s/article/9206980/Egypt_s_Internet_block_aims_at_social_mediaen_US
dc.identifier.citedreferencePfanner, E. ( 2011, September 4). Naming names on the Internet. The New York Times. Retrieved from http://www.nytimes.com/2011/09/05/technology/naming‐names‐on‐the‐Internet.htmlen_US
dc.identifier.citedreferencePlesser, A. ( 2011, May 6). YouTube is managing graphic, violent videos from the Middle East with community help. Business Insider. Retrieved from http://articles.businessinsider.com/2011‐05‐06/entertainment/30063062_1_videos‐youtube‐beettv.en_US
dc.identifier.citedreferenceSayed, H. ( 2011, August 6). Fear of arrest. [blog]. Retrieved from http://www.jadaliyya.com/pages/index/2328/fear‐of‐arresten_US
dc.identifier.citedreferenceSegerberg, A., & Bennett, W. L. ( 2011 ). Social media and the organization of collective action: Using Twitter to explore the ecologies of two climate change protests. The Communication Review, 14 ( 3 ), 197– 215. DOI: 10.1080/10714421.2011.59725en_US
dc.identifier.citedreferenceShirky, C. ( 2008 ). Here comes everybody: The power of organizing without organizations. New York, NY: Penguin.en_US
dc.identifier.citedreferenceShirky, C. ( 2011 ). The political power of social media. Foreign Affairs, 90 ( 1 ), 28 – 41.en_US
dc.identifier.citedreferenceVara, V. ( 2008, February 29). Facebook denies role in Morocco arrest. Wall Street Journal. Retrieved from http://online.wsj.com/article/SB120424448908501345.htmlen_US
dc.identifier.citedreferenceViégas, F. B. ( 2005 ). Bloggers' expectations of privacy and accountability: An initial survey. Journal of Computer-Mediated Communication, 10 ( 3 ), article 12. DOI: 10.1111/j.1083-6101. 2005.tb00260.xen_US
dc.identifier.citedreferenceWallace, J. D. ( 1999 ). Nameless in cyberspace: Anonymity on the Internet. Cato Institute Briefing Papers, No. 54, December 8. Retrieved from http://www.cato.org/pubs/briefs/bp54.pdfen_US
dc.identifier.citedreferenceWilson, C., & Dunn, A. ( 2011 ). Digital media in the Egyptian revolution: Descriptive analysis from the Tahrir data sets. International Journal of Communication, 5, 1248 – 1272.en_US
dc.identifier.citedreferenceWood, J. ( 2011 ). Underground in Beirut. Boston Review. August, 1. Retrieved from http://www.bostonreview.net/BR36.4/josh_wood_syrian_activist_arab_spring_lebanon_beirut.phpen_US
dc.identifier.citedreferenceYin, R. K. ( 2003 ). Case study research: Design and methods (3rd ed.). Thousand Oaks, CA: Sage.en_US
dc.identifier.citedreferenceYork, J. ( 2010 ). Policing content in the quasi‐public sphere. OpenNet Initiative Bulletin. Retrieved from http://opennet.net/policing‐content‐quasi‐public‐sphere.en_US
dc.identifier.citedreferenceZhuo, J. ( 2010, November, 30). Where anonymity breeds contempt. The New York Times, A31.en_US
dc.identifier.citedreferenceZittrain, J. ( 2009, May 6). How to get what we all want. Cato Institute [blog]. Retrieved from http://www.cato‐unbound.org/2009/05/06/jonathan‐zittrain/how‐to‐get‐what‐we‐all‐want/en_US
dc.identifier.citedreferenceAday, S., & Livingston, S. ( 2008 ). Taking the state out of state‐media relations theory: How transnational advocacy networks are rewriting (some of) the rules about what we think we know about news and politics. Media, War, and Conflict, 1 ( 1 ), 99 – 107. DOI: 10.1177/ 1750635207087630en_US
dc.identifier.citedreferenceAddley, E. ( 2011, June 13). Syrian lesbian blogger is revealed conclusively to be a married man. The Guardian (UK). Retrieved from http://www.guardian.co.uk/world/2011/jun/13/syrian‐lesbian‐blogger‐tom‐macmasteren_US
dc.identifier.citedreferenceAmos, D. ( 2011, August 3). Syrian uprising expands despite absence of leaders. Npr.org. Retrieved from http://www.npr.org/2011/08/03/138936844/syrian‐uprising‐expands‐despite‐absence‐of‐leadersen_US
dc.identifier.citedreferenceAnderson, L. ( 2011 ). Demystifying the Arab spring: Parsing the differences between Tunisia, Egypt and Libya. Foreign Affairs, 90 ( 3 ), 2 – 7.en_US
dc.identifier.citedreferenceAouragh, M., & Anderson, A. ( 2011 ). The Egyptian experience: Sense and nonsense of the Internet revolution. International Journal of Communication, 5, 1344 – 1358.en_US
dc.identifier.citedreferenceArmbrust, W. ( 2007 ). New media and old agendas: The Internet in the Middle East and Middle Eastern Studies. International Journal of Middle East Studies, 39 ( 4 ), 531 – 533. DOI: 10.1017/S0020743807071048en_US
dc.identifier.citedreferenceal‐Assad, B. ( 2011, June 21). Speech of H.E. President Bashar al‐Assad at Damascus University on the situation in Syria. Damascus, Syria. Retrieved from http://www.sana.sy/eng/337/2011/06/21/353686.htmen_US
dc.identifier.citedreferenceAthanasiadis, I. ( 2010, January 4). Iran uses Internet as tool against protesters. Christian Science Monitor. Retrieved from http://www.csmonitor.com/World/2010/0104/Iran‐uses‐Internet‐as‐tool‐against‐protestersen_US
dc.identifier.citedreferenceBennett, W. L. ( 2003 ). New media power: The Internet and global activism. In Couldry, N. & J. Curran (Eds.), Contesting media power (pp. 17 – 38 ).Oxford, England: Rowman and Littlefield.en_US
dc.identifier.citedreferenceBimber, B., Flanagin, A., & Stohl, C. ( 2005 ). Reconceptualizing collective action in the contemporary media environment. Communication Theory, 15 ( 4 ), 365 – 388. DOI: 10. 1093/ct/15.4.365en_US
dc.identifier.citedreferenceBoswell, A. ( 2011, April 6). How Sudan used the Internet to crush protest movement. McClatchy Newspapers. Retrieved from http://www.mcclatchydc.com/2011/04/06/111637/sudans‐government‐crushed‐protests.htmlen_US
dc.identifier.citedreferenceBrodkin, J. ( 2009, December, 8). Facebook halts Beacon, gives $9.5M to settle lawsuit. PCWorld. Retrieved from http://www.pcworld.com/article/184029/facebook_halts_beacon_gives_95m_to_settle_lawsuit.htmlen_US
dc.identifier.citedreferenceClinton, H. ( 2010, January, 21). Remarks on Internet freedom. Washington, DC. Retrieved from http://www.state.gov/secretary/rm/2010/01/135519.htmen_US
dc.identifier.citedreferenceCoker, M., Malas, N., & Champion, M. ( 2011, February, 7). Google executive emerges as key figure in revolt. The Wall Street Journal. Retrieved from http://online.wsj.com/article/SB10001424052748703989504576127621712695188.htmlen_US
dc.identifier.citedreferenceCowie, J. ( 2011a ). Libyan Disconnect. [blog]. Retrieved from http://www.renesys.com/blog/2011/02/libyan‐disconnect‐1.shtmlen_US
dc.identifier.citedreferenceCowie, J. ( 2011b ). Tracing the Syrian blackout. [blog]. Retrieved from http://www.renesys.com/blog/2011/06/tracing‐the‐syrian‐blackout.shtmlen_US
dc.identifier.citedreferenceDebatin, B., Lovejoy, J. P., Horn, A., & Hughes, B. ( 2009 ). Facebook and online privacy: Attitudes, behaviors, and unintended consequences. Journal of Computer-Mediated Communication, 15, 83 – 108. DOI: 10.1111/j.1083-6101.2009.01494.xen_US
dc.identifier.citedreferenceDeibert, R., Palfrey, J., Rohozinski, R., & Zittrain, J. ( 2008 ). Access denied: The practice and policy of global Internet filtering. Cambridge, MA: MIT Press.en_US
dc.identifier.citedreferenceFaris, R., Roberst, H., Heacock, R., Zuckerman, E., & Gasser, U. ( 2011, 2 August) Online security in the Middle East and North Africa: A survey of perceptions, knowledge, and practice. Berkman Center for Internet & Society at Harvard University. Retrieved from http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/OnlineSecurityintheMiddleEastandNorthAfrica_August2011.pdfen_US
dc.identifier.citedreferenceFlanagin, A. J., Stohl, C., & Bimber, B. ( 2006 ). Modeling the structure of collective action. Communication Monographs, 73, 29 – 54. DOI: 10.1080/03637750600557099en_US
dc.identifier.citedreferenceGeorge, A. L., & Bennett, A. ( 2005 ). Case studies and theory development in the social sciences. Cambridge, MA: MIT Press.en_US
dc.identifier.citedreferenceGiglio, M. ( 2011, 30 January). The mysterious ‘anonymous’ behind Egypt's revolt. Newsweek. Retrieved from http://www.newsweek.com/2011/01/30/el‐shaheed‐the‐mysterious‐anonymous‐behind‐egypt‐s‐revolt.htmlen_US
dc.identifier.citedreferenceGladwell, M. ( 2010, 4 October). Small change. The New Yorker. Retrieved from http://www.newyorker.com/reporting/2010/10/04/101004fa_fact_gladwellen_US
dc.identifier.citedreferenceGrimmelmann, J. ( 2004 ). Regulation by software. Yale Law Journal, 114, 1719 – 1775.en_US
dc.identifier.citedreferenceGrimmelmann, J. ( 2010 ). Privacy as product safety. Widener Law Journal, 19, 793 – 827.en_US
dc.identifier.citedreferenceHoward, P. N. ( 2010 ). The digital origins of dictatorship and democracy: Information technology and political Islam. Oxford, England: Oxford University Press.en_US
dc.identifier.citedreferenceHoward, P. N., & Hussain, M. M. ( 2011 ). Digital media and the Arab Spring. Journal of Democracy, 22 ( 3 ), 35 – 48. DOI: 10.1080/10714421.2011.597254en_US
dc.identifier.citedreferenceIskander, E. ( 2011 ). Connecting the national and the virtual: Can Facebook activism remain relevant after Egypt's January 25 uprising? International Journal of Communication, 5, 1225 – 1237.en_US
dc.identifier.citedreferenceJepperson, R. ( 1991 ). Institutions, institutional effects, and institutionalism. In W. W. Powell & P. J. DiMaggio (Eds.), The new institutionalism in organizational analysis (pp. 143 – 163 ).Chicago, IL: The University of Chicago.en_US
dc.identifier.citedreferenceKaram, Z. ( 2011, September 27). Syria wages cyber warfare as websites hacked. Associated Press. Retrieved from http://www.google.com/hostednews/ap/article/ALeqM5h_ALtePegit5Y7joOwz51xnk‐dSA?docId=876d93bf5fa04fe7a132c428ca97bb92en_US
dc.identifier.citedreferenceKavanaugh, A., Yang, S., Sheetz, S., Li, L. T., & Fox, E. A. ( 2011 ). Between a rock and a cell phone: Social media use during mass protests in Iran, Tunisia and Egypt. ACM Transactions on Computer‐Human Interaction. DOI: 10.1145/0000000.0000000en_US
dc.identifier.citedreferenceKerr, I., Steeves, V., & Lucock, C. ( 2009 ). Lessons from the identity trail: Anonymity, privacy and identity in a networked society. Oxford, England: Oxford University Press.en_US
dc.identifier.citedreferenceKhamis, S., & Vaughn, K. ( 2011 ). Cyberactivism in the Egyptian revolution: How civic engagement and citizen journalism. Arab Media and Society, 13. Retrieved from http://www.arabmediasociety.com/?article=769en_US
dc.identifier.citedreferenceKopytoff, V. G. ( 2011, March 7). Sites like Twitter absent from free speech pact. The New York Times, B4.en_US
dc.identifier.citedreferenceLessig, L. ( 1999 ). Code: And other laws of cyberspace. London, England: Basic Books.en_US
dc.identifier.citedreferenceLessig, L. ( 2006 ). Code: And other laws of cyberspace. Version 2.0. London, England: Basic Books.en_US
dc.identifier.citedreferenceLynch, M. ( 2011 ). After Egypt: The limits and promise of online challenges to the authoritarian Arab state. Perspectives on Politics, 9 ( 2 ), 301 – 310. DOI: 10.1017/S15375927 1100091en_US
dc.identifier.citedreferenceMacKinnon, R. ( 2007 ). Shi Tao, Yahoo!, and the lessons for corporate social responsibility (Working paper). Retrieved from http://rconversation.blogs.com/YahooShiTaoLessons.pdfen_US
dc.identifier.citedreferenceMacKinnon, R. ( 2010, May 29). More problems in Facebookistan. [blog]. Retrieved from http://rconversation.blogs.com/rconversation/2010/05/more‐problems‐in‐facebookistan.htmlen_US
dc.identifier.citedreferenceMacKinnon, R. ( 2011, July). Let's take back the Internet! TEDGlobal, Edinburgh, Scotland. Retrieved from http://www.ted.com/talks/rebecca_mackinnon_let_s_take_back_the_internet.htmlen_US
dc.identifier.citedreferenceMansell, R. ( 2006 ). Collective action, institutionalism and the Internet. Journal of Economic Issues, 40 ( 2 ), 297 – 305. DOI: 10.1177/1461444804039910en_US
dc.identifier.citedreferenceMasoud, T. ( 2011 ). The Road to (and from) Liberation Square. Journal of Democracy, 22 ( 3 ), 20 – 34.en_US
dc.identifier.citedreferenceMelber, A. ( 2011, May 31). YouTube reinstates blocked video of child allegedly tortured in Syria. The Nation. Retrieved from http://www.thenation.com/blog/161050/youtube‐reinstates‐blocked‐video‐child‐allegedly‐tortured‐syriaen_US
dc.identifier.citedreferenceMorozov, E. ( 2011 ). The net delusion: The dark side of Internet freedom. New York, NY: Public Affairs.en_US
dc.identifier.citedreferenceNoman, H. ( 2010 ). Sex, social mores, and keyword filtering: Microsoft Bing in ‘Arabian Countries'. OpenNet Initiative Bulletin. Retrieved from http://opennet.net/sex‐social‐mores‐and‐keyword‐filtering‐microsoft‐bing‐arabian‐countriesen_US
dc.owningcollnameInterdisciplinary and Peer-Reviewed


Files in this item

Show simple item record

Remediation of Harmful Language

The University of Michigan Library aims to describe library materials in a way that respects the people and communities who create, use, and are represented in our collections. Report harmful or offensive language in catalog records, finding aids, or elsewhere in our collections anonymously through our metadata feedback form. More information at Remediation of Harmful Language.

Accessibility

If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.