aboutsummaryrefslogtreecommitdiff
path: root/refer
blob: b949f58c36db64c371b6b81519d7760f3589c956 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
%T Stasiland
%A Anna Funder
%D 2003
%I Granta Books
%G 9781783787340
%O https://granta.com/products/stasiland/"

%T Global digital population as of January 2021
%A Joseph Johnson
%D 2021
%J Statista
%O https://www.statista.com/statistics/617136/digital-population-worldwide/"

%T Americans’ Internet Access: 2000-2015
%A Andrew Perrin 
%A Maeve Duggan
%J Pew Research Center
%D 2015
%O https://www.pewresearch.org/internet/2015/06/26/americans-internet-access-2000-2015

%A van Mill, David
%T Freedom of Speech
%J The Stanford Encyclopedia of Philosophy
%E Edward N. Zalta
%O https://plato.stanford.edu/archives/spr2021/entries/freedom-speech/
%D 2021
%C Metaphysics Research Lab, Stanford University

%T Why Twitter’s Mission Statement Matters
%A Justin Fox
%D 2014
%J Harvard Business Review
%O https://hbr.org/2014/11/why-twitters-mission-statement-matters

%T The great firewall of China: Xi Jinping’s internet shutdown
%A Elizabeth C. Economy
%D 2018
%J The Guardian
%O https://www.theguardian.com/news/2018/jun/29/the-great-firewall-of-china-xi-jinpings-internet-shutdown

%T Intel's Management Engine is a security hazard, and users need a way to disable it
%A Erica Portnoy 
%A Peter Eckersley
%D May 2017
%J Electronic Frontier Foundation
%O https://www.eff.org/deeplinks/2017/05/intels-management-engine-security-hazard-and-users-need-way-disable-it (Accessed 22 January 2022)

%T  Facebook’s push for end-to-end encryption is good news for user privacy, as well as terrorists and paedophiles
%J The Conversation
%A Roberto Musotto
%A David S. Wall 
%D December 2019
%O https://theconversation.com/facebooks-push-for-end-to-end-encryption-is-good-news-for-user-privacy-as-well-as-terrorists-and-paedophiles-128782 (Accessed 22 January 2022)

%T How Terrorists Use Encryption
%V Volume 9, Issue 6
%A Robert Graham
%D June 2016
%J CTC Sentinel 
%O https://ctc.usma.edu/how-terrorists-use-encryption/ (Accessed 22 January 2022)