Governance within social media websites: Ruling new frontiers
暂无分享,去创建一个
[1] Lars-Erik Gadde,et al. Systematic combining: an abductive approach to case research , 2002 .
[2] Jose Palafox. Opening Up Borderland Studies: A Review of U.S.-Mexico Border Militarization Discourse , 2000 .
[3] W. Wong,et al. Does E‐Government Promote Accountability? A Comparative Analysis of Website Openness and Government Accountability , 2004 .
[4] Lee Humphreys,et al. Cellphones in public: social interactions in a wireless era , 2005, New Media Soc..
[5] Gloria E. Anzaldúa. Borderlands: The new mestiza = La frontera , 1987 .
[6] Pavel Curtis,et al. Mudding: Social phenomena in text-based virtual realities. , 1997 .
[7] Scott Cunningham,et al. Prostitution 2.0: The changing face of sex work , 2011 .
[8] V. Turner,et al. The Ritual Process: Structure and Anti-Structure , 1975 .
[9] Piotr Konieczny. Governance, Organization, and Democracy on the Internet: The Iron Law and the Evolution of Wikipedia , 2009 .
[10] J. Goodhand. Frontiers and wars : the opium economy in Afghanistan / Jonathan Goodhand. , 2005 .
[11] Priscilla M. Regan,et al. Federal agencies and the evolution of web governance , 2006, DG.O.
[12] Albert O. Hirschman,et al. Exit, Voice, and Loyalty , 1970 .
[13] D. Yanow,et al. Interpretation and Method : Empirical Research Methods and the Interpretive Turn , 2006 .
[14] M. Foucault,et al. Of Other Spaces , 1986 .
[15] C. Hartshorne,et al. Collected Papers of Charles Sanders Peirce , 1935, Nature.
[16] S. Chambers. Democracy and (the) Public(s) , 2005 .
[17] Julie E. Cohen. Cyberspace As/And Space , 2006 .
[18] D. Cross,et al. Cyberbullying Versus Face-to-Face Bullying A Theoretical and Conceptual Review , 2009 .
[19] April Kontostathis,et al. Learning to Identify Internet Sexual Predation , 2011, Int. J. Electron. Commer..
[20] Patrick Thaddeus Jackson,et al. The Conduct of Inquiry in International Relations: Philosophy of Science and Its Implications for the Study of World Politics , 2010 .
[21] G. Hellmann. Pragmatism and International Relations , 2009 .
[22] A. Vayda,et al. Event Ecology, Causal Historical Analysis, and Human–Environment Research , 2009 .
[23] Alfred C. Yen. Western Frontier or Feudal Society?: Metaphors and Perceptions of Cyberspace , 2002 .
[24] Thomas R. Eisenmann,et al. The Huffington Post , 2010 .
[25] L. Sproull,et al. Atheism, sex, and databases: the net as a social technology , 1995 .
[26] Perritt,et al. The Internet as a Threat to Sovereignty? Thoughts on the Internet's Role in Strengthening National and Global Governance , 1998 .
[27] Tom Henthorne. String theory, French horns, and the infrastructure of cyberspace , 2010 .
[28] Daniel Schackman. Commons or gated community? A theoretical explication of virtual community and the example of Craigslist , 2010, J. Community Informatics.
[29] S. Kobrin. Back to the Future: Neomedievalism and the Postmodern Digital World Economy , 1998 .
[30] Reconstructing Power in Second Life®: Controlling the Virtual Mayhem , 2011 .
[31] J. Friedrichs,et al. On Acting and Knowing: How Pragmatism Can Advance International Relations Research and Methodology , 2009, International Organization.
[32] G. Stoker. Governance as theory: five propositions , 1998 .
[33] Kenichi Ohmae. The Borderless World: Power and Strategy in the Interlinked Economy , 1991 .
[34] Bahar Rumelili. Liminality and Perpetuation of Conflicts: Turkish-Greek Relations in the Context of Community-Building by the EU , 2003 .
[35] Milton L. Mueller. Networks and States: The Global Politics of Internet Governance , 2010 .
[36] K. Boydell,et al. Ana and the Internet: a review of pro-anorexia websites. , 2006, The International journal of eating disorders.
[37] Menno D.T. de Jong,et al. Contested hybridization of regulation: failure of the Dutch regulatory system to protect minors from harmful media. , 2010 .
[38] Roland Traunmüller. Web 2.0 Creates a New Government , 2010, EGOVIS.
[39] Ben Light,et al. Ethics and social networking sites: a disclosive analysis of Facebook , 2010, Inf. Technol. People.
[40] S. Khosravi,et al. Reordering Public and Private in Iranian Cyberspace: Identity, Politics, and Mobilization , 2002 .
[41] John Perry Barlow,et al. Coming into the Country , 1977 .
[42] Christine B. Smith,et al. Conduct Control on Usenet , 2006, J. Comput. Mediat. Commun..
[43] 中井 駿二. The Christian Science Monitor , 1959 .
[44] R. Rhodes,et al. The New Governance: Governing without Government , 1996 .
[45] Wolfram Lacher. Actually Existing Security: The Political Economy of the Saharan Threat , 2008 .