<<

This is a repository copy of Obfuscated democracy? and the politics of knowledge curation.

White Rose Research Online URL for this paper: https://eprints.whiterose.ac.uk/138950/

Version: Accepted Version

Article: Garnett, Philip orcid.org/0000-0001-6651-0220 and Hughes, Sarah M. (2019) Obfuscated democracy? Chelsea Manning and the politics of knowledge curation. Political Geography. 23 - 33. ISSN 0962-6298 https://doi.org/10.1016/j.polgeo.2018.11.001

Reuse Items deposited in White Rose Research Online are protected by copyright, with all rights reserved unless indicated otherwise. They may be downloaded and/or printed for study, or other acts as permitted by national copyright laws. The publisher or other rights holders may allow further reproduction and re-use of the full text version. This is indicated by the licence information on the White Rose Research Online record for the item.

Takedown If you consider content in White Rose Research Online to be in breach of UK law, please notify us by emailing [email protected] including the URL of the record and the reason for the withdrawal request.

[email protected] https://eprints.whiterose.ac.uk/ Obfuscated democracy? Chelsea Manning and the politics of knowledge curation - Supplementary Data

Supplementary Table 1: Systematic Journal Search Table Construction The search period for the database was from the 28th of November 2010 and until the 31st July 2018. This search produced 263 academic papers and books (including a few other items) that matched the terms; Wikileaks, Manning, US Cables, Cablegate. Papers and books had undergone peer review were retained, and their status as either International Relations or Political Geography journals recorded.

Out of the 263 items found: • 155 were accessible peer reviewed articles o From this, 15 were published in a Political Geography or International Relations journal. • 14 papers made significant reference to the cable leaks and used leaked materials in the article. • 34 engaged with the leaked cables but did not refer specifically to a leaked document or reproduce any part of a document or data. • 28 engaged with the Chelsea Manning’s case.

A small number of articles, and international articles, and some book chapters were not accessible to us. Book reviews, comments, and media articles are in the table but not counted.

Key to the Table

The table contains the results of a search for papers engaging with Wikileaks and more specifically the cable leaks. Cables: indicates whether the paper makes significant mention of the US cable leaks. Manning: indicates with the paper makes significant mention of Private Manning. No' in either of these columns indicates no mention of either the cables or Manning, and therefore would indicate that the paper only engages with Wikileaks (and then not in any depth). 'Mentioned' would indicate that either the cables or Manning are mentioned but there is no significant engagement with the issues around either (for example, they are mentioned as part of contextual information). 'Yes' would indicate that the cables or Manning are significant to the paper's argument. 'Significant' indicates that there is more extensive engagement with either the Manning case or Cables material, often referring directly to documents or reproducing documents/data. IR: indicates either Political Science and International Relations journals. Geog: journal could be classified as in the Geography domain. The papers are divided into sub-tables of different categories, some papers will appear in more than table. Some of the papers were excluded and these are separated into table 2, the reason is noted in the final column.

Table 1a – Papers that make extensive use of the cables or extensive reference to the Manning case.

Reference Cables Manning IR Geog Notes Allan, S., and K. Anden-Papadopoulos. 2010. “‘Come On, Let Us Shoot!’: WikiLeaks and the Cultures of Militarization.” TOPIA-CANADIAN JOURNAL OF CULTURAL STUDIES, no. 23-24. 244–53. Significant No No No Benkler, Y. SUM 2011. “A Free Irresponsible Press: Wikileaks and the Battle over the Soul of the Networked Fourth Estate.” Harvard Civil Rights-Civil Liberties Law Review 46 (2). 311–97. Significant Yes No No Bicakci, S., D. Rende, S. Rende, and O. T. Yildiz. 2014. “WikiLeaks on the Middle East: Obscure Diplomacy Networks and Binding Spaces.” JOURNAL OF BALKAN AND NEAR EASTERN STUDIES 16 (4). 459– 73. Significant No No No Dawisha, Karen. 2011. “Is Russia’s That of a Corporatist-Kleptocratic Regime?” Post-Soviet Affairs 27 (4): 331–65. Significant No Yes No Frampton, M., and E. Rosen. 2013. “READING THE RUNES? THE AND THE MUSLIM BROTHERHOOD AS SEEN THROUGH THE WIKILEAKS CABLES.” Historical Journal: 56 (3). 827– 56. Significant No No No Linke, Andrew M., Frank D. W. Witmer, and John O’Loughlin. 2012. “Space-Time Granger Analysis of the War in Iraq: A Study of Coalition and Insurgent Action- War Reaction.” International Interactions 38 (4): 402–25. Significant No Yes No Logs Lynch, Lisa. 2013. “Cablegate in the Congo: Mapping the Digital Trail of Wikileaks Cables about the ‘Forgotten’ DRC.” Radical History Review 2013 (117). 49–69. Significant No No No Mabon, S. 2013. “Aiding Revolution? Wikileaks, Communication and the ‘’ in Egypt.” Third World Quarterly 34 (10). 1843–57. Significant Yes No No Michael, G. J. 2015. “Who’s Afraid of WikiLeaks? Missed Opportunities in Political Science Research.” The Review of Policy Research 32 (2). 175–99. Significant No No No O’Loughlin, John, Frank D. W. Witmer, Andrew M. Linke, and Nancy Thorwardson. 2010. “Peering into the Fog of War: The Geography of the WikiLeaks War Logs, 2004-2009.” Eurasian War Geography and Economics 51 (4): 472–95. Significant No No Yes Logs Pegg, Scott, and Eiki Berg. 2016. “Lost and Found: The WikiLeaks of De Facto State–Great Power Relations.” International Studies Perspectives 17 (3): 267–86. Significant Mentioned No No Tidy, Joanna. 2017. “Visual Regimes and the Politics of War Experience: Rewriting War ‘from Above’ in WikiLeaks’ ‘Collateral Murder.’” Review of International Studies 43 (01): 95–111. Significant Yes Yes No Vucetic, Srdjan, and Rebecka S. Rydberg. 2015. “Remnants of Empire: Tracing Norway’s F-35 Decision.” Contemporary Security Policy 36 (1): 56–78. Significant Mentioned No No Zammit-Mangion, Andrew, Michael Dewar, Visakan Kadirkamanathan, and Guido Sanguinetti. 2012. “Point Process Modelling of the Afghan War Diary.” Proceedings of the National Academy of Sciences of Data the United States of America 109 (31): 12414–19. Significant No No No Analysis

Table 1b – Papers where the cables are significant to the paper’s argument.

Reference Cables Manning IR Geog Notes Balkin, J. M. 2013. “Old-School/new-School Speech Regulation.” Harvard Law Review 127 (8): 2296–2342. Yes Mentioned No No Balzacq, Thierry, and Benjamin Puybareau. 2018. “The Economy of Secrecy: Security, Information Control, and EU‒US Relations.” West European Politics 41 (4): 890–913. Yes No No No Bellia, P. L. 2012. “WikiLeaks and the Institutional Framework for National Security Disclosures.” The Yale Law Journal 121 (6). 1448–1526. Yes Yes No No Berghel, H. 2012. “WikiLeaks and the Matter of Private Manning.” Computer 45 (3). 70–73. Yes Yes No No Media Beyer, J. L. 2014. “The Emergence of a Freedom of Information Movement: , WikiLeaks, the , and Iceland.” Journal of Computer- Mediated Communication: JCMC 19 (2). 141–54. Yes Mentioned No No Boothroyd, D. 2011. “Off the Record Levinas, Derrida and the Secret of Responsibility.” THEORY CULTURE & SOCIETY 28 (7-8). 41–59. Yes Yes No No Brevini, Benedetta. 2017. “WikiLeaks: Between Disclosure and Whistle-Blowing in Digital Times.” Sociology Compass 11 (3): e12457. Yes Yes No No Burgess, Edwin B. 2012. “Private: Bradley Manning, WikiLeaks, and the Biggest Exposure of Official Secrets in American History.” Libr. J. REED BUSINESS INFORMATION 360 PARK AVENUE SOUTH, , NY 10010 USA. Yes Yes No No Book Cammaerts, B. 2013. “Networked Resistance: The Case of WikiLeaks.” Journal of Computer-Mediated Communication: JCMC 18 (4). 420–36. Yes Mentioned No No Coddington, M. 2012. “Defending a Paradigm by Patrolling a Boundary: Two Global Newspapers’ Approach to WikiLeaks.” Journalism & Mass Communication Quarterly 89 (3). 377–96. Yes No No No Cseke, Botond, Andrew Zammit-Mangion, Tom Heskes, and Guido Sanguinetti. 2016. “Sparse Approximate Inference for Spatio-Temporal Point Process Models.” Journal of the American Statistical Association 111 (516): 1746–63. Yes No No No Earl, Jennifer, and Jessica L. Beyer. 2014. “The Dynamics of Backlash Online: Anonymous and the Battle for WikiLeaks.” In Intersectionality and Social Change, edited by L. M. Woehrle, 37:207–33. Yes Yes No No Fenster, M. 2012. “Disclosure’s Effects: WikiLeaks and Transparency.” Iowa Law Review 97 (3). 753–807. Yes Yes No No Freedman, J. WIN 2012. “PROTECTING STATE SECRETS AS INTELLECTUAL PROPERTY: A STRATEGY FOR PROSECUTING WIKILEAKS.” Stanford Journal of International Law 48 (1). 185–208. Yes Yes No No Gill, M., and A. Spirling. SPR 2015. “Estimating the Severity of the WikiLeaks US Diplomatic Cables Disclosure.” Political Analysis: An Annual Publication Yes Yes No No of the Methodology Section of the American Political Science Association 23 (2). 299–305. Gubrud, Mark A. 2011. “Chinese and US Kinetic Energy Space Weapons and Arms Control.” Asian Perspective 35 (4): 617–41. Yes No No No Handley, R. L. 2014. “CROSS- AND EXTRA- NATIONAL JOURNALISTIC PARTNERSHIPS And the National Outlook.” JOURNALISM STUDIES 15 (2). 138–53. Yes No No No Handley, R. L., and A. Ismail. 2013. “A Watchdog to Reckon with: Delivering WikiLeaks in the Israeli and Australian Press.” JOURNALISM 14 (5). 643–60. Yes No No No Handley, R. L., and L. Rutigliano. 2012. “Journalistic Field Wars: Defending and Attacking the National Narrative in a Diversifying Journalistic Field.” Media Culture & Society 34 (6). 744–60. Yes Yes No No Hindman, E. B., and R. J. Thomas. 2014. “When Old and New Media Collide: The Case of WikiLeaks.” NEW MEDIA & SOCIETY 16 (4). 541–58. Yes No No No Hood, C. 2011. “From FOI World to WikiLeaks World: A New Chapter in the Transparency Story?” GOVERNANCE-AN INTERNATIONAL JOURNAL OF POLICY ADMINISTRATION AND INSTITUTIONS 24 (4). 635–38. Yes No No No Commentory Ireton, J. O. WIN 2015. “The Admissibility of Evidence in ICSID Arbitration: Considering the Validity of WikiLeaks Cables as Evidence.” ICSID REVIEW- FOREIGN INVESTMENT LAW JOURNAL 30 (1). 231– 42. Yes No No No Meskell, L. 2016. “World Heritage and WikiLeaks.” Current Anthropology 57 (1). 72–84. Yes No No No Miller, Ben. 2012. “06.213: Attacks with Knives and Sharp Instruments: Quantitative Coding and the Witness to Atrocity.” Leonardo 45 (1): 86–87. Yes No No No Short Note Moody, P. 2017. “US Embassy Support for Hollywood’s Global Dominance: Cultural Imperialism Redux.” International Journal of Communication Systems 11: 2912–25. Yes No No No Papandrea, M. R. 2014. “Leaker Traitor Spy: National Security Leaks and the First Amendment.” Law Review. Boston University. School of Law 94 (2): 449–544. Yes Yes No No Pieterse, J. N. 2012. “Leaking Superpower: WikiLeaks and the Contradictions of Democracy.” Third World Quarterly 33 (10). 1909–24. Yes No No No Postill, J. 2014. “Freedom Technologists and the New Protest Movements: A Theory of Protest Formulas.” CONVERGENCE-THE INTERNATIONAL JOURNAL OF RESEARCH INTO NEW MEDIA TECHNOLOGIES 20 (4). 402–18. Yes No No No Price, D. H. SUM 2014. “Counterinsurgency by Other Names: Complicating Humanitarian Applied Anthropology in Current, Former, and Future War Zones.” Human Organization 73 (2). 95–105. Yes No No No Roberts, A. 2012. “WikiLeaks: The Illusion of Transparency.” INTERNATIONAL REVIEW OF ADMINISTRATIVE SCIENCES 78 (1). 116–33. Yes Yes No No Scoville, R. M. 2013. “Legislative Diplomacy.” Michigan Law Review 112 (3): 331–95. Yes Mentioned No No Springer, S., H. Chi, J. Crampton, F. McConnell, J. Cupples, K. Glynn, B. Warf, and W. Attewell. 2012. “Leaky Geopolitics: The Ruptures and Transgressions of WikiLeaks.”GEOPOLITICS17 (3). 681–711. Yes Yes Yes Yes Zajacz, R. 2013. “WikiLeaks and the Problem of : A Network Control Perspective.” Media Culture & Society 35 (4). 489–505. Yes Yes No No 백영민, and 최문호. 2014. “Computerized Text Analysis of Diplomatic Cables of US Embassy in South Korea: On the Effect of Political Changes in Country of Sojourn and Home Country on Topic Occurrences and Sentiment Expression.” Journal of Communication Research 51 (1): 133–79. Yes Unk No No No Access

Table 1c - Papers where the Manning case is significant to the paper’s argument.

Reference Cables Manning IR Geog Notes Bellia, P. L. 2012. “WikiLeaks and the Institutional Framework for National Security Disclosures.” The Yale Law Journal 121 (6). 1448–1526. Yes Yes No No Benkler, Y. SUM 2011. “A Free Irresponsible Press: Wikileaks and the Battle over the Soul of the Networked Fourth Estate.” Harvard Civil Rights-Civil Liberties Law Review 46 (2). 311–97. Significant Yes No No Berghel, H. 2012. “WikiLeaks and the Matter of Private Manning.” Computer 45 (3). 70–73. Yes Yes No No Media Boothroyd, D. 2011. “Off the Record Levinas, Derrida and the Secret of Responsibility.” THEORY CULTURE & SOCIETY 28 (7-8). 41–59. Yes Yes No No Brevini, Benedetta. 2017. “WikiLeaks: Between Disclosure and Whistle-Blowing in Digital Times.” Sociology Compass 11 (3): e12457. Yes Yes No No Burgess, Edwin B. 2012. “Private: Bradley Manning, WikiLeaks, and the Biggest Exposure of Official Secrets in American History.” Libr. J. REED BUSINESS INFORMATION 360 PARK AVENUE SOUTH, NEW YORK, NY 10010 USA. Yes Yes No No Book Earl, Jennifer, and Jessica L. Beyer. 2014. “The Dynamics of Backlash Online: Anonymous and the Battle for WikiLeaks.” In Intersectionality and Social Change, edited by L. M. Woehrle, 37:207–33. Yes Yes No No Fenster, M. 2012. “Disclosure’s Effects: WikiLeaks and Transparency.” Iowa Law Review 97 (3). 753–807. Yes Yes No No Freedman, J. WIN 2012. “PROTECTING STATE SECRETS AS INTELLECTUAL PROPERTY: A STRATEGY FOR PROSECUTING WIKILEAKS.” Stanford Journal of International Law 48 (1). 185–208. Yes Yes No No Gill, M., and A. Spirling. SPR 2015. “Estimating the Severity of the WikiLeaks US Diplomatic Cables Disclosure.” Political Analysis: An Annual Publication of the Methodology Section of the American Political Science Association 23 (2). 299–305. Yes Yes No No Handley, R. L., and L. Rutigliano. 2012. “Journalistic Field Wars: Defending and Attacking the National Narrative in a Diversifying Journalistic Field.” Media Culture & Society 34 (6). 744–60. Yes Yes No No Mabon, S. 2013. “Aiding Revolution? Wikileaks, Communication and the ‘Arab Spring’ in Egypt.” Third World Quarterly 34 (10). 1843–57. Significant Yes No No Papandrea, M. R. 2014. “Leaker Traitor Whistleblower Spy: National Security Leaks and the First Amendment.” Boston University Law Review. Boston University. School of Law 94 (2): 449–544. Yes Yes No No Roberts, A. 2012. “WikiLeaks: The Illusion of Transparency.” INTERNATIONAL REVIEW OF ADMINISTRATIVE SCIENCES 78 (1). 116–33. Yes Yes No No Springer, S., H. Chi, J. Crampton, F. McConnell, J. Cupples, K. Glynn, B. Warf, and W. Attewell. 2012. “Leaky Yes Yes Yes Yes Geopolitics: The Ruptures and Transgressions of WikiLeaks.”GEOPOLITICS17 (3). 681–711. Tidy, Joanna. 2017. “Visual Regimes and the Politics of War Experience: Rewriting War ‘from Above’ in WikiLeaks’ ‘Collateral Murder.’” Review of International Studies 43 (01): 95–111. Significant Yes Yes No Zajacz, R. 2013. “WikiLeaks and the Problem of Anonymity: A Network Control Perspective.” Media Culture & Society 35 (4). 489–505. Yes Yes No No Di Salvo, P. 2016. “Chelsea Manning and : Accidental Celebrities, Personification and the Delivery of Whistleblowing Cases in the Press.” CELEBRITY STUDIES 7 (2). 289–91. Mentioned Yes No No Fenster, M. 2014. “The Implausibility of Secrecy.” The Hastings Law Journal 65 (2). 309–62. Mentioned Yes No No Hackl, A. M., A. B. Becker, and M. E. Todd. 2016. “‘I Am Chelsea Manning’: Comparison of Gendered Representation of Private Manning in U.S. and International Media.” Journal of Homosexuality 63 (4). 467–86. Mentioned Yes No No Pozen, D. E. 2013. “THE LEAKY LEVIATHAN: WHY THE GOVERNMENT CONDEMNS AND CONDONES UNLAWFUL DISCLOSURES OF INFORMATION.” Harvard Law Review 127 (2). 512–635. Mentioned Yes No No Altschuler, B. E. FAL 2015. “Is the Case Relevant in of WikiLeaks?” Political Science Quarterly 130 (3). 401–23. No Yes No No Di Salvo, P., and G. Negro. 2016. “Framing Edward Snowden: A Comparative Analysis of Four Newspapers in China, United Kingdom and United States.” JOURNALISM 17 (7). 805–22. No Yes No No Fischer, M. 2016. “Contingent Belonging: Chelsea Manning, Transpatriotism, and Iterations of Empire.” Sexualities 19 (5-6). 567–86. No Yes No No Pezzini, Isabella. 2014. “WikiLeaks: Building Transparency - Analysis of the Video ‘Collateral Murder.’” Galáxia (São Paulo) 14 (28): 20–31. No Yes No No Ruddock, Andy. 2016. “A Fragmented Audience: How to Remain on Target.” Security Challenges 12 (2): 27–41. No Yes No No Scheuerman, William E. 2016. “Digital Disobedience and the Law.” New Political Science 38 (3): 299–314. No Yes No No Wong, W. H., and P. A. Brown. 2013. “E-Bandits in Global Activism: WikiLeaks, Anonymous, and the Politics of No One.”PERSPECTIVES ON POLITICS11 (4). 32 1015–33. No Yes Yes No

Table 1d – Papers where there is no mention of either the cables or Manning, and therefore would indicate that the paper only engages with Wikileaks (and then not in any depth). 'Mentioned' would indicate that either the cables or Manning are mentioned but there is no significant engagement with the issues around either (for example, they are mentioned as part of contextual information).

Reference Cables Manning IR Geog Notes Aharony, Noa. 2012. “WikiLeaks Comments: A Study of Responses to Articles.” Online Information Review 36 (6): 828–45. Mantioned No No No Arce, D. G. 2015. “WikiLeaks and the Risks to Critical Foreign Dependencies.” International Journal of Critical Infrastructure Protection 11 (December). 3–11. Mentioned Mentioned No No Benkler, Yochai. 2013. “Practical Anarchism.” Politics & Society, May. doi:10.1177/0032329213483108. Mentioned Mentioned Yes No Benkler, Yochai. 2011. “WikiLeaks and the Protect- Ip Act: A New Public-Private Threat to the Commons.” Daedalus 140 (4): 154–64. Mentioned No No No Birchall, Clare. 2011. “Transparency, Interrupted: Secrets of the Left.” Theory, Culture & Society 28 (7-8): 60–84. Mentioned Mentioned No No Brian, Danielle, Patrice McDermott, and Jake Weins. 2011. “WikiLeaks Is a Wake-up Call for Openness.” Government Information Quarterly 28 (2): 135–36. Mentioned No No No Castronovo, Russ. 2013. “State Secrets: Ben Franklin and WikiLeaks.” Critical Inquiry 39 (3): 425–50. Mentioned Mentioned No No Christensen, Christian. 2016. “The Links That Bind: WikiLeaks, , and the Case.” Popular Communication 14 (4): 224–37. Mentioned Mentioned No No Cunliffe, Philip. 2018. “From Peacekeepers to Praetorians – How Participating in Peacekeeping Operations May Subvert Democracy.” International Relations 32 (2): 218–39. Mentioned No Yes No DeNardis, Laura. 2012. “HIDDEN LEVERS OF INTERNET CONTROL: An Infrastructure-Based Theory of Internet Governance.” Information, Communication and Society 15 (5): 720–38. Mentioned No No No Eldridge, Scott A. 2014. “Boundary Maintenance and Interloper Media Reaction.” Journalism Studies 15 (1): 1–16. Mentioned No No No Eldridge, Scott, II. 2017. “Hero or Anti-Hero?” Digital Journalism 5 (2): 141–58. Mentioned Mentioned No No Elsey, Chris, Michael Mair, and Martina Kolanoski. 2018. “Violence as Work: Ethnomethodological Insights into Military Combat Operations.” Psychology of Violence 8 (3): 316–28. Mentioned No No No Gertz, Geoffrey, Srividya Jandhyala, and Lauge N. Skovgaard Poulsen. 2018. “Legalization, Diplomacy, and Development: Do Investment Treaties de-Politicize Investment Disputes?” World Development 107 (July): 239–52. Mentioned No No No Harrington, Carol. 2018. “Feminist Killjoys and Women Scorned: An Analysis of News and Commentary on the Sexual Violence Allegations Against Julian Assange.” Feminist Criminology 13 (1): 87–111. Mentioned No No No Harris, R. 2013. “Conceptualizing and Reconceptualizing the Reporter’s Privilege in the Age of Wikileaks.” Fordham Law Review / Edited by Fordham Law Students 82 (4): 1811–54. Mentioned No No No Heemsbergen, L. 2016. “From Radical Transparency to Radical Disclosure: Reconfiguring (In)Voluntary Transparency Through the Management of Visibilities.” International Journal of Communication Systems 10. 138–51. Mentioned Mentioned No No Holger Pötzsch . 2017. “Media Matter.” tripleC: Communication, Capitalism & Critique. Open Access Journal for a Global Sustainable Information Society 15 (1): 148–70. Mentioned No No No Humphreys, Sal, and Melissa de Zwart. 2017. “Data Retention, Journalist Freedoms and .” Media International Australia 165 (1): 103–16. Mentioned No No No Imre, I., I. Pjesivac, and C. A. Luther. 2016. “Governmental Control of the Internet and WikiLeaks: How Does the Press in Four Countries Discuss Freedom of Expression?” INTERNATIONAL COMMUNICATION GAZETTE 78 (5). 385–410. Mentioned No No No Isaac, J. C. 2013. “The Rule of Law, Democracy, and Intelligence.”PERSPECTIVES ON POLITICS11 (4). 32 1007–10. Mentioned Mentioned Yes No Kelly, J. P., Jr. 2012. “WikiLeaks: A Guide for American Law Librarians.” Law Library Journal 104 (2): 245–62. Mentioned Mentioned No No Mark Coddington. 2014. “Defending Judgment and Context in ‘original Reporting’: Journalists’ Construction of Newswork in a Networked Age.” Journalism 15 (6): 678–95. Mentioned No No No McNair, Brian. 2012. “Wikileaks, Journalism and the Consequences of Chaos.” Media International Australia 144 (1): 77–86. Mentioned Mentioned No No Meikle, Graham. 2012. “Continuity and Transformation in Convergent News: The Case of Wikileaks.” Media International Australia 144 (1): 52–59. Mentioned Mentioned No No Miller, Toby. 2014. “WikiLeaks, the State, and Middle-Aged Media.” International Journal of Communication Systems 8: 2574–80. Mentioned No No No Moody, Paul. 2017. “Embassy Cinema: What WikiLeaks Reveals about US State Support for Mentioned No No No Hollywood.” Media Culture & Society 39 (7): 1063– 77. Reid-Henry, S. M. 2012. “On Žižek on WikiLeaks: Two Figures and a Point of Critique.” Antipode 44 (1): 1–4. Mentioned No No Yes Sampedro, Víctor, F. Javier López-Ferrández, and Álvaro Carretero. 2018. “Leaks-Based Journalism and Media Scandals: From Official Sources to the Networked Fourth Estate?” European Journal of Disorders of Communication: The Journal of the College of Speech and Language Therapists, London 33 (3): 255–70. Mentioned No No No Sharpe, Jae. 2018. “Economies of Reputation: Jonathan Franzen’s Purity and Practices of Disclosure in the Information Age.” Open Library of Humanities 4 (1): 22. Mentioned No No No Sorell, Tom. 2015. “Human Rights and : The Cases of Wikileaks and Anonymous.” Journal of Human Rights Practice 7 (3): 391–410. Mentioned No No No Terzis, Georgios. 2016. “The End of Hypocrisy: Online Activism and Ethno-Political Conflicts.” Pacific Journalism Review 22 (1): 105. Mentioned Mentioned No No Vladeck, S. I. 2012. “Democratic Competence, Constitutional Disorder, and the .” Washington Law Review 87 (2): 529–48. Mentioned No No No Wade, Robert H. 2011. “Emerging World Order? From Multipolarity to Multilateralism in the G20, the World Bank, and the IMF.” Politics & Society, August. doi:10.1177/0032329211415503. Mentioned No Yes No Zanon, Breilla. 2015. “Transparency for Institutions, Privacy for Individuals: The Globalized Citizen and Power Relations in a Postmodern Democracy.” INTERNATIONAL REVIEW OF INFORMATION ETHICS 23 (November): 55–61. Mentioned Mentioned No No ———. 2015. “Pirates on the Liquid Shores of Liberal Democracy: Movement Frames of European Pirate Parties.” Javnost - The Public 22 (1): 19–36. No No No No Abel, J. 2015. “DO YOU HAVE TO KEEP THE GOVERNMENT’S SECRETS? RETROACTIVELY CLASSIFIED DOCUMENTS, THE FIRST AMENDMENT, AND THE POWER TO MAKE SECRETS OUT OF THE PUBLIC RECORD.” University of Pennsylvania Law Review 163 (4). 1037–97. No No No No Asenbaum, Hans. 2018. “Cyborg Activism: Exploring the Reconfigurations of Democratic Subjectivity in Anonymous.” New Media & Society 20 (4): 1543–63. No No No No Azmeh, Shamel. 2016. “’s Passage to Conflict.” Politics & Society, November. doi:10.1177/0032329216674002. No No Yes No Baer, Hans A. 2012. “Engaged Anthropology in 2011: A View from the Antipodes in a Turbulent Era.” American Anthropologist 114 (2): 217–26. No No No No Bligh, Kelley. 2011. “Journalists, Companies Wrestle with Consequences of WikiLeaks.” ECONTENT. ONLINE INC 213 DANBURY RD, WILTON, CT 06897-4007 USA. No No No No Boyce, Geoffrey A., Jeffrey M. Banister, and Jeremy Slack. 2015. “You and What Army? Violence, The State, and Mexico’s War on Drugs.” Territory, Politics, Governance 3 (4): 446–68. No No No No Brucato, Ben. 2015. “The New Transparency: Police Violence in the Context of Ubiquitous Surveillance.” Media and Communication 3 (3): 39. No No No No Brunton, F. Mar-Apr 2011. “Keyspace WikiLeaks and the Assange Papers.” RADICAL PHILOSOPHY, no. 166. 8–20. No No No No Chisholm, J. T. 2014. “Chen Guangcheng and Julian Assange: The Normative Impact of International Incidents on Diplomatic Asylum Law.” The George Washington Law Review 82 (2). 528– 55. No No No No Choucri, N., and D. D. Clark. 2013. “Who Controls Cyberspace?” The Bulletin of the Atomic Scientists 69 (5). 21–31. No No No No Conboy, Martin, and Scott A. Eldridge. 2014. “Morbid Symptoms.” Journalism Studies 15 (5): 566–75. No No No No Curran, G., and M. Gibson. 2013. “WikiLeaks, Anarchism and Technologies of Dissent.” Antipode 45 (2). 294–314. No No No Yes Curtis, Andrew, Xinyue Ye, Kevin Hachey, Margaret Bourdeaux, and Alison Norris. 2015. “A Space-Time Analysis of the WikiLeaks Afghan War Diary: A Resource for Analyzing the Conflict-Health Nexus.” International Journal of Health Geographics 14 (October): 29. No No No Yes Deutschmann, E. 2016. “Between Collaboration and Disobedience: The Behavior of the Guantanamo Detainees and Its Consequences.” The Journal of Conflict Resolution 60 (3). 555–82. No No No No Díaz, Francisco. 2016. “Imaginaries of Transparency.” ARQ, no. 94: 16–25. No No No No Drago, I., R. Hofstede, R. Sadre, A. Sperotto, and A. Pras. 2015. “Measuring Cloud Service Health Using NetFlow/IPFIX: The WikiLeaks Case.” JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT 23 (1).58–88. No No No No Elifoglu, I. Hilmi, Ivan Abel, and Özlem Taşseven. 2018. “Minimizing Insider Threat Risk with Behavioral Monitoring.” Review of Business 38 (2): 61–73. No No No No Ellwood, D. 2015. “Propaganda, Power and Persuasion. From World War I to Wikileaks.” HISTORICAL JOURNAL OF FILM RADIO AND TELEVISION 35 (2). 364–67. No No No No Felli, Leonardo, and Rafael Hortala-Vallve. 2016. “Collusion, Blackmail and Whistle-Blowing.” No No Yes No Quarterly Journal of Political Science 11 (3). 279– 312. Fenster, M. SPR 2012. “THE TRANSPARENCY FIX: ADVOCATING LEGAL RIGHTS AND THEIR ALTERNATIVES IN THE PURSUIT OF A VISIBLE STATE.” University of Pittsburgh Law Review. 73 (3). 443–503. No No No No Fernández-Delgado, Florencio Cabello, and María Teresa Vera Balanza. 2012. “Beyond WikiLeaks: The Icelandic Modern Media Initiative and the Creation of Free Havens.” International Journal of Communication Systems 6 (0): 24. No No No No Floyd, L. W. 2011. “Whistle-Blowing and Compulsory Medical Examinations: Recent Developments in Australian Public Sector Employment Law and Their Relevance to .” Hong Kong Law Journal 41: 155–76. No No No No Freeman, Robert A. 2016. “The Trans-Pacific Partnership and Pharmaceutical Innovation.” Research in Social & Administrative Pharmacy: RSAP 12 (4): 633–37. No No No No Gartzke, Erik. 2013. “The Myth of Cyberwar: Bringing War in Cyberspace Back Down to Earth.” International Security 38 (2): 41–73. No No No No Gehner, Claus. 2011. “THE ROLE OF WIKILEAKS.” Technology Review 114 (3): 10–10. No No No No Letter to Ed. Graves, Scott E. 2008. “Prior Restraint or Finger in the Dike? Bank Julius Baer v. Wikileaks and Dynadot.” Justice System Journal 29 (2): 216–19. No No No No Greenwood, C. A. 2015. “Whistleblowing in the Fortune 1000: What Practitioners Told Us about Wrongdoing in Corporations in a Pilot Study.” Public Relations Review 41 (4). 490–500. No Mentioned No No Hamacher, Kay. 2012. “Resilience to Leaking-- Dynamic Systems Modeling of .” PloS One 7 (12): e49804. No No No No Heemsbergen, L. J. 2015. “Designing Hues of Transparency and Democracy after WikiLeaks: Vigilance to Vigilantes and Back Again.” NEW MEDIA & SOCIETY 17 (8). 1340–57. No No No No I Munro. 2017. “Whistle-Blowing and the Politics of Truth: Mobilizing ‘truth Games’ in the WikiLeaks Case.” Human Relations; Studies towards the Integration of the Social Sciences 70 (5): 519–43. No No No No Kassen, Maxat. 2017. “Understanding Transparency of Government from a Nordic Perspective: Open Government and Open Data Movement as a Multidimensional Collaborative Phenomenon in .” Journal of Global Information Technology Management 20 (4): 236– 75. No No No No Khiabany, G., and M. Williamson. 2015. “Free Speech and the Market State: Race, Media and Democracy in New Liberal Times.” European Journal of Disorders of Communication: The No No No No Journal of the College of Speech and Language Therapists, London 30 (5). 571–86. Kiviharju, M. 2013. “Cryptographic Roles in the Age of Wikileaks Implementation Models for Cryptographically Enforced RBAC.” In 2013 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2013), 1779–88. 345 No No No No Leinwand, Tali Yahalom. 2014. “For British Eyes Only? The DA-Notice System and Its Implications for US Media Law.” Columbia Journal of Transnational Law 53 (1): 157–203. No Mentioned No No Leyton, T. Sep-Dec 2013. “Continuities and Ruptures in the Discourses of the Afghan War: Intellectuals, Politicians, and Soldiers.” Revista de Estudios Maritimos Y Sociales, no. 47. 147–56. No No No No Lindgren, Simon, and Ragnar Lundström. 2011. “Pirate Culture and Hacktivist Mobilization: The Cultural and Social Protocols of #WikiLeaks on Twitter.” New Media & Society 13 (6): 999–1018. No No No No Logue, D. M., and S. R. Clegg. 2015. “Wikileaks and The News of the World: The Political Circuitry of Labeling.” JOURNAL OF MANAGEMENT INQUIRY 24 (4). 394–404. No No No No McCarthy, M. T. 2015. “Toward a Free Information Movement.” Sociological Forum 30 (2). 439–58. No No No No Meijer, A. May-Jun 2013. “Understanding the Complex Dynamics of Transparency.” Public Administration Review 73 (3). 429–39. No No No No Mendoza, Nicolás. 2011. “COMMENTARY-A Tale of Two Worlds: Apocalypse, 4Chan, WikiLeaks and the Silent Protocol Wars.” Radical Philosophy 166 (166): 2. No No No No Commentary Mikos, Robert A. 2012. “CAN THE STATES KEEP SECRETS FROM THE FEDERAL GOVERNMENT?” University of Pennsylvania Law Review 161 (1): 103–78. No No No No Mößner, Nicola, and Philip Kitcher. 2017. “Knowledge, Democracy, and the Internet.” Minerva 55 (1): 1–24. No No No No Munro, I. 2016. “Organizational Resistance as a Vector of Deterritorialization: The Case of WikiLeaks and Secrecy Havens.” ORGANIZATION 23 (4). 567–87. No No No No O’Hara, K. Nov-Dec 2013. “The Many-Headed E- Monster.” IEEE Internet Computing 17 (6). 88–92. No No No No Orlov, Michael V. 2013. “WikiLeaks of Lead Extraction: Do We Know the Truth about Fidelis and Riata?” Heart Rhythm: The Official Journal of the Heart Rhythm Society 10 (10): 1451–52. No No No No Ottosen, R. 2012. “WIKILEAKS: ETHICAL MINEFIELD OR A DEMOCRATIC REVOLUTION IN JOURNALISM? A Case Study of the Impact of Afghanistan Coverage in the Norwegian Daily, Aftenposten.” JOURNALISM STUDIES 13 (5-6). 836–46. No No No No Petersohn, U. 2013. “The Effectiveness of Contracted Coalitions: Private Security Contractors in Iraq.” Armed Forces and Society 39 (3). 467–88. No No No No Pötzsch, Holger. 2015. “The Emergence of iWar: Changing Practices and Perceptions of Military Engagement in a Digital Era.” New Media & Society 17 (1): 78–95. No No No No Reese, S. D., and P. J. Shoemaker. Jul-Aug 2016. “A Media Sociology for the Networked Public Sphere: The Hierarchy of Influences Model.” MASS COMMUNICATION AND SOCIETY 19 (4). 389– 410. No No No No Reese, Stephen D. 2016. “The New Geography of Journalism Research.” Digital Journalism 4 (7): 816–26. No No No No Rusch, T., P. Hofmarcher, R. Hatzinger, and K. Hornik. 2013. “MODEL TREES WITH TOPIC MODEL PREPROCESSING: AN APPROACH FOR DATA JOURNALISM ILLUSTRATED WITH THE WIKILEAKS AFGHANISTAN WAR LOGS.” The Annals of Applied Statistics 7 (2). 613–39. No No No No Sardar, Ziauddin. 2015. “Postnormal Times Revisited.” Futures 67 (March): 26–39. No No No No Seegert, Natasha. 2014. “Queer Beasts: Ursine Punctures in Domesticity.” Environmental Communication 8 (1): 75–91. No No No No Seigworth, Gregory J., and Matthew Tiessen. 2012. “Mobile Affects, Open Secrets, and Global Illiquidity: Pockets, Pools, and Plasma.” Theory, Culture & Society 29 (6): 47–77. No No No No Stevens, R. C. 2015. “Keeping the News Domestic: Why a Toxic Environment for the American Press and Ready Access to Foreign Media Organizations Like WikiLeaks Compel the Rapid Adoption of a Federal Reporters’ Privilege.” The Hastings Law Journal 66 (5). 1463–84. No No No No Strand, T. WIN 2014. “Tightening the Noose: The Institutionalized Impoverishment of Gaza, 2005- 2010.” Journal of Palestine Studies 43 (2). 6–23. No No No No Trivitt, Keith. 2011. “THE ROLE OF WIKILEAKS.” Technology Review 114 (3): 10–10. No No No No No Access Uysal, Nur, and Aimei Yang. 2013. “The Power of Activist Networks in the Mass Self-Communication Era: A Triangulation Study of the Impact of WikiLeaks on the Stock Value of .” Public Relations Review 39 (5): 459–69. No No No No Vacker, Barry, and Genevieve Gillespie. 2013. “Yearning to Be the Center of Everything, When We Are the Center of Nothing: The Parallels and Reversals in Chaco, Hubble, and .” Telematics and Informatics 30 (1): 35–46. No No No No 박준석. 2014. “The Study on Intellectual Property Chapter in TPP.” International Trade Law 120: 41– 74. No No No No

Supplementary Table 2 - Items that were excluded: non-peer reviewed papers, reviews, comments, books, media, not in English and/or not accessible.

Reference Cables Manning IR Geog Notes Brevini, B., A. Hintz, and P. McCurdy. 2013. Beyond WikiLeaks: Implications for the Future of Communications, Book Journalism and Society. Mudhai, Okoth Fred. 2011. “Immediacy and Openness in a Digital Africa: Networked-Convergent Journalisms in Book Kenya.” Journalism 12 (6): 674–91. Khan, Shahnaz. 2014. “The Two Faces of Afghan Book Women: Oppressed and Exotic.” Women’s Studies Chapter International Forum 44 (May): 101–9. Colvin, N. 2017. “The WikiLeaks Files: The World Book According to US Empire.” STATE CRIME 6 (2): 294–300. Review Buchanan, M. 2013. “WikiLeaks: News in the Networked Book Era.” Information, Communication and Society 16 (8). Review 1369–71. Gelber, Katharine. 2012. “WikiLeaks and the Age of Transparency.” Aust. J. Polit. Sci. ROUTLEDGE Book JOURNALS, TAYLOR & FRANCIS LTD 4 PARK Review SQUARE, MILTON PARK, ABINGDON OX14 4RN, OXFORDSHIRE, ENGLAND. Glass, Charles. 2016. “THE WIKILEAKS FILES The World according to US Empire.” TLS- LITERARY Book SUPPLEMENT. TIMES SUPPLEMENTS LIMITED Review TOWER HOUSE, SOVEREIGN PARK, MARKET HARBOROUGH LE87 4JJ, ENGLAND. Johnson, Courtney N. 2015. “Book Review: Beyond WikiLeaks: Implications for the Future of Communications, Journalism, and SocietyBreviniBenedettaHintzArneMcCurdyPatrick (eds.). Book Beyond WikiLeaks: Implications for the Future of Review Communications, Journalism, and Society. New York: Palgrave Macmillan, 2013.” Media Culture & Society 37 (4): 663–65. Paniagua Santamaria, Pedro. 2011. “Inside Wikileaks. My Time in the Most Dangerous Web in the World.” ESTUDIOS SOBRE EL MENSAJE PERIODISTICO. UNIV Book COMPLUTENSE MADRID, SERVICIO PUBLICACIONES Review CIUDAD UNIV, OBISPO TREJO 3, MADRID, 28040, . Saler, Michael. 2015. “WHEN GOGGLE MET Book WIKILEAKS.” TLS-THE TIMES LITERARY Review SUPPLEMENT, no. 5838 (February): 3–5. Shane, Scott. 2011. “JIHAD JOE Americans Who Go to War in the Name of Islam.” NEW YORK TIMES BOOK Book REVIEW. NEW YORK TIMES 620 8TH AVE, NEW Review YORK, NY 10018 USA. Alzhrani, K., E. M. Rudd, C. E. Chow, and T. E. Boult. Conference 2016. “Automated Big Security Text Pruning and Classification.” In 2016 IEEE International Conference on Big Data (Big Data), edited by J. Joshi, G. Karypis, L. Liu, X. Hu, R. Ak, Y. Xia, W. Xu, et al., 3629–37. Washington, DC. Byrne, D., C. De Cesari, M. Hall, B. Hauser-Schaublin, C. Joy, C. Luke, M. Peleggi, and L. Meskell. 2016. “World Comment Heritage and WikiLeaks Comments.” Current Anthropology 57 (1). 84–95. Alzhrani, K., E. M. Rudd, T. E. Boult, and C. E. Chow. 2016. “Automated Big Text Security Classification.” In 2016 IEEE Conference on Intelligence and Security Conference Informatics (ISI), edited by L. Zhou, L. Kaati, W. Mao, and G. A. Wang, 103–8. Tucson, AZ. Andrew, Alex M. 2011. “Climate Change Again, MIT Plans, Exoskeleton, WikiLeaks.” In American-Society-for- Cybernetics Conference of the Cybernatics: Art, Design Conference and Mathematics (C-ADM) - A Meta-Disciplinary Conversion, 40:1207–9. Troy, NY. Barnard-Wills, David. 2011. “This Is Not a Cyber War, Its a... ? Wikileaks, Anonymous and the Politics of Hegemony.” In 10th European Conference on Information Conference Warfare and Security (ECIW), edited by R. Ottis, 17–23. Tallinn Univ Technol, Inst Cybernet (IoC), Tallinn, ESTONIA. Breton, Larisa. 2012. “Virtual NonState Actors as Clausewitzian Centers of Gravity: An Examination for Sensemaking, Elaboration and Discussion.” In 7th International Conference on Information Warfare and Conference Security (ICIW), edited by V. Lysenko, 51–55. Univ Washington, Ctr Informat Assurance & Cybersecur, , WA. Chang Cun-ping, and Liu Zhi-yong. 2012. “Research on the Integration Strategy for Chinese Government Supervision over Food Security.” In 8th International Conference Conference on Public Administration, edited by X. N. Zhu and S. R. Zhao, 555–61. Osmania Univ, Dept Publ Adm, Hyderabad, INDIA. Dreijer, Joey, Matthew Roberts, Neera Jeymohan, Jeremy Julien, Tommy Karlsson, Raquel Cuesta, Nils Monning, and Elif Duru. 2012. “Telefonica - Potential Victim of American Espionage.” In 11th European Conference on Conference Information Warfare and Security (ECIW), edited by E. Filiol and R. Erra, 104–12. Inst Ecole Superieure Informatique, Elect & Automatique, Laval, . Huq, Aziz Z. 2016. “The Predicates of Military Detention at Guantanamo: The Role of Individual Acts and Affiliations.” Conference In 10th Annual Conference on Empirical Legal Studies (CELS), 13:567–602. St Louis, MO. Ilvonen, Ilona. 2011. “Information Security Culture or Information Safety Culture-What Do Words Convey?” In European Conference on Cyber Warfare and Security, Conference edited by R. Ottis, 148. Tallinn Univ Technol, Inst Cybernet (IoC), Tallinn, ESTONIA: Academic Conferences International Limited. Jantunen, Saara, and Aki-Mauri Huhtinen. 2011. “A Case- Study on American Perspectives on Cyber and Security.” Conference In 10th European Conference on Information Warfare and Security (ECIW), edited by R. Ottis, 163–71. Tallinn Univ Technol, Inst Cybernet (IoC), Tallinn, ESTONIA. Juels, Ari, Ahmed Kosba, and Elaine Shi. 2016. “The Ring of Gyges: Investigating the Future of Criminal Smart Contracts.” In Proceedings of the 2016 ACM SIGSAC Conference Conference on Computer and Communications Security, 283–95. , AUSTRIA: ACM. Landert, Daniela, and Gianluca Miscione. 2017. “Narrating the Stories of Leaked Data: The Changing Role of Journalists after Wikileaks and Snowden.” In 1st Conference International Conference on Approaches to Digital Discourse Analysis, 19:13–21. Valencia, SPAIN. Rabab’ah, A., M. Al-Ayyoub, M. A. Shehab, Y. Jararweh, and B. J. Jansen. 2016. “Using the Panama Papers to Explore the Financial Networks of the Middle East.” In 2016 11th International Conference for Internet Conference Technology and Secured Transactions (ICITST), 92–97. International Conference for Internet Technology and Secured Transactions. Barcelona, SPAIN. Salminen, Mirva, and Aki-Mauri Huhtinen. 2012. “The Comprehensive Approach as a Strategic Design to Run the Military-Industrial Complex in Operations.” In 11th European Conference on Information Warfare and Conference Security (ECIW), edited by E. Filiol and R. Erra, 230–36. Inst Ecole Superieure Informatique, Elect & Automatique, Laval, FRANCE. Stănescu, Angela. 2017. “The Right To Know: The Whistleblower Debate.” In 2nd Central and Eastern European LUMEN International Conference on Multidimensional Education and Professional Conference Development, Ethical Values (MEPDEV), edited by A. Sandu, T. Ciulei, and A. Frunza, 27:760–70. European Proceedings of Social and Behavioural Sciences. Targoviste, ROMANIA: Cognitive-crcs. Strmecki, Daniel, Wilke Schwiedop, Emmanuel Oyo-Ita, Brigitte Kaagman, Pierre Leandre, Enrique Santos- Brihuega, Lateef Kadiri, and Jessica Dufmats. 2012. “Cablegate Analysis of Likely Espionage of Nokia by the United States.” In 11th European Conference on Conference Information Warfare and Security 2012, ECIW 2012; Laval; 5 July 2012through6 July 2012; Code95209, edited by E. Filiol and R. Erra, 258–64. Inst Ecole Superieure Informatique, Elect & Automatique, Laval, FRANCE. Ulusoy, H., M. Kantarcioglu, E. Pattuk, and L. Kagal. 2015. “AccountableMR: Toward Accountable MapReduce Systems.” In 2015 IEEE International Conference on Big Conference Data (Big Data), edited by H. Ho, B. C. Ooi, M. J. Zaki, X. H. Hu, L. Haas, V. Kumar, S. Rachuri, et al., 451–60. Santa Clara, CA. Fairclough, Paul. 2013. “We Steal Secrets The Story of WikiLeaks.” SIGHT AND SOUND. BRITISH FILM INST 21 Film STEPHEN STREET, LONDON W1P 1PL, ENGLAND. Martin, Catherine. 2011. “The Forgotten Man: Private Bradley Manning and the WikiLeaks Controversy.” Film CINEASTE. 200 PARK AVE SOUTH, NEW YORK, NY 10003 USA. Miller, Ron. 2011. “Is WikiLeaks ‘The Press’?” Magazine ECONTENT 34 (2): 15–15. ———. 2010a. “WikiLeaks Spells Trouble in Cancun.” Media New Scientist 208 (2790): 5–5. ———. 2010b. “In Defense of WikiLeaks.” Nation 291 Media (26): 3–3. ———. 2010b. “Lessons From WikiLeaks.” Nation 291 Media (26): 9–9. ———. 2010b. “WIKILEAKS’ JULIAN ASSANGE HE WANTS TO SPILL YOUR CORPORATE SECRETS.” Media Forbes 186 (11): 70. ———. 2011. “Could WikiLeaks Really Take Down A Media Major Bank?” Forbes 187 (1): 22–22. ———. 2011. “WikiLeaks’ Stepchildren.” Forbes 187 (1): Media 20–20. Caryl, Christian. 2011. “Why WikiLeaks Changes Media Everything.” The New York Review of Books 58 (1): 9–13. Cockburn, Alexander. 2010a. “Lessons From Wikileaks.” Harv. Bus. Rev. NATION CO INC 33 IRVING PLACE, Media 8TH FLOOR, NEW YORK, NY 10003 USA. Driggs, Brian. 2011. “Lessons from WikiLeaks.” Harvard Media Business Review 89 (3): 22–23. Free, Bill. 2011. “Lessons from WikiLeaks.” Harvard Media Business Review 89 (3): 22–22. Gordon, David, and Sean West. 2011. “Lessons from Media WikiLeaks.” Harvard Business Review 89 (3): 23–23. Greenberg, Andy. 2010a. “WikiLeaks Reveals the Biggest Classified in History.” Forbes. FORBES INC Media 60 FIFTH AVE, NEW YORK, NY 10011 USA. Haque, Umair. 2011. “Why WikiLeaks Matters More (and Less) Than You Think.” Harvard Business Review 89 (3): Media 22–22. Henry, Charlotte. 2018. “WOMEN, WHISTLEBLOWING AND WIKILEAKS A Conversation.” TLS-THE TIMES LITERARY SUPPLEMENT. TIMES SUPPLEMENTS Media LIMITED TOWER HOUSE, SOVEREIGN PARK, MARKET HARBOROUGH LE87 4JJ, ENGLAND. Kirby, Julia. 2011. “How WikiLeaks Changes Things for Media Us All.” Harvard Business Review 89 (3): 22–22. Kornbluh, Peter, Santiago O’Donnell, Francisca Skoknic, and Gustavo Gorriti. 2012. “Latin America After Media ‘Cablegate’ Will the WikiLeaks Revelations Have a Lasting Impact throughout the Region?” Nation 295 (7-8): 24–26. Kornbluh, Peter. 2012. “WIKILEAKS: THE LATIN AMERICA FILES ‘Cablegate’ Rocked the Region, Media Revealing Secrets of State-and the Hidden Hand of the US.” Nation 295 (7-8): 11. Lazare, Sarah, and Ryan Harvey. 2010. “WikiLeaks in Media Baghdad.” Nation 291 (7-8): 24–27. Ludlow, Peter. 2010. “Wikileaks and Hacktivist Culture.” Media Nation 4 (14): 25–26. Maass, Peter. 2013. “MISSING THE LEAK FOR THE Media LEAKERS ’s Film on WikiLeaks, We Steal Secrets, Tells Us More about Personalities than Power.” Nation 297 (1-2): 24–26. McAfee, Andrew. 2011. “Lessons from WikiLeaks.” Media Harvard Business Review 89 (3): 23–23. Mitchell, Greg. 2011. “Why WikiLeaks Matters.” Nation. NATION CO INC 33 IRVING PLACE, 8TH FLOOR, NEW Media YORK, NY 10003 USA. Petrich Moreno, Blanche. 2012. “The Long Arm of the War on Drugs WikiLeaks Cables Reveal How Much Media Washington Drives Mexico’s Counternarcotics Policies.” Nation 295 (7-8): 17 – +. Rogers, Cart. 2011. “Lessons from WikiLeaks.” Harvard Media Business Review 89 (3): 23–23. Ross, Carne. 2011. “How WikiLeaks Changes Things for Media Us All.” Harvard Business Review 89 (3): 22–22. Ryan, James. 2011. “Lessons from WikiLeaks.” Harvard Media Business Review 89 (3): 23–23. Scahill, Jeremy. 2010. “WikiLeaks and War Crimes.” Nation. NATION CO INC 33 IRVING PLACE, 8TH Media FLOOR, NEW YORK, NY 10003 USA. Skerpan, Bill. 2011. “Lessons from WikiLeaks.” Harvard Media Business Review 89 (3): 23–23. Viana, Natalia. 2012. “Brazil’s Media Metamorphosis The WikiLeaks Revelations Inspired a New Culture of Media in Brazil.” Nation 295 (7-8): 14– 17. Abruzzese, Alberto. 2012. “WikiLeaks: Opacity and Non Transparency.” Revista de Occidente , no. 374: 181–96. English Bieber, Christoph. 2014. “WikiLeaks and Informality.” In Conference on System of Government and Region in the Political System of the Federal Republic of Germany, Non edited by S. Brochler and T. Grunden, 351–72. Schriften English Der DVPW-Sektion Regierungssystem Und Regieren in Der Bundesrepublik Deutschland. Duisburg, GERMANY. Duzan, Anne-Claire, and Patrick Clervoy. 2014. “Décrochage Du Sens Moral Au Sein Des Forces Armées Non En Milieu Opérationnel : Une Approche Constructive.” English Annales Médico-Psychologiques, Revue Psychiatrique 172 (6): 450–56. Francescutti, Pablo, Marcello Serra, Oscar Gomez Pascual, and Raul Magallon. 2012. “The WikiLeaks Non Phenomenon Between Information Theory and Strategic English Communication.” Revista de Occidente , no. 374: 197– 211. González Zabala, Mayda Patricia, and Jenny Marcela Sánchez Torres. 2013. “Análisis de Las Estrategias Del Gobierno Colombiano Para La Inclusión de Los Non Ciudadanos En La Sociedad de La Información English Propuestas Desde 2000 Hasta 2011.” Revista de Estudios Sociales No.35 47 (47): 133–46. González, Bernardo Gutiérrez. 2015. “Criptopunks Y Non América Latina: De La Soberanía Tecnológica a La Era English de Las Filtraciones.” Teknokultura 12 (3): 549–76. Kruk, Vinca, and Daniel van der-Velden. 2016. Non “Imaginarios de Transparencia. Metahaven Entrevistado English Por Francisco Diaz.” ARQ (Santiago) 0 (94): 16–25. Lovink, Geert, and Ned Rossiter. 2017. “El Supuesto Non Digital: 10 Tesis.” CIC Cuadernos de Información Y English Comunicación 22 (0): 13–18. Lozano, Jorge. 2015. “The WikiLeaks Phenomenon and Non the Obstacles to Transparency.” Revista de Occidente , English no. 409: 53–62. Magallon Rosa, Raul. 2012. “Wikileaks Confidential.” Rev. Occidente. FUNDACION JOSE ORTEGA Y GASSET Non REVISTA DE OCCIDENTE FORTUNY 53, 28010 English MADRID, SPAIN. Malbois, Fabienne, and Leonore Cabin. 2015. “When Bradely Manning Became Chelsea. From NBC to Non , the Public Sphere as a Scene of a Gender English Transition.” GENRE SEXUALITE & SOCIETE 13. Paye, Jean-Claude, and Tuelay Umay. 2011. “Wikileaks: Non A Virtual Opposition?” La Pensee, no. 366: 47 – +. English Porta, Donatella della. 2018. “Anti-Corruption from Below. Social Movements Against Corruption in Late Non Neoliberalism.” PARTECIPAZIONE E CONFLITTO 10 (3): English 661–92. Alzhrani, Khudran, Ethan M. Rudd, C. Edward Chow, and Terrance E. Boult. 2017. “Automated U.S Diplomatic Cables Security Classification: Topic Model Pruning vs. Symposium Classification Based on Clusters.” In IEEE International Symposium on Technologies for Homeland Security (HST). Waltham, MA. Corrigan-Gibbs, H., D. Boneh, and D. Mazières. 2015. “Riposte: An Anonymous Messaging System Handling Millions of Users.” In 2015 IEEE Symposium on Security Symposium and Privacy, 321–38. IEEE Symposium on Security and Privacy. San Jose, CA. Hart, Michael, Pratyusa Manadhata, and Rob Johnson. 2011. “Text Classification for Data Loss Preventionwa.” In 11th International Symposium on Privacy Enhancing Symposium Technologies, edited by S. FischerHubner and N. Hopper, 6794:18. Lecture Notes in Computer Science. Waterloo, CANADA. Oortmerssen, Gerard van. 2014. “Ethics and ICT: Beyond Design.” In Proceedings of the IEEE 2014 International Symposium on Ethics in Engineering, Science, and Symposium Technology, 34:1–34:6. ETHICS ’14. Piscataway, NJ, USA: IEEE Press. Pontin, Jason. 2011. “Is WikiLeaks a Good Thing?” Technol. Rev. TECHNOL REV 1 MAIN ST, 13 FLR, No No CAMBRIDGE, MA 02142 USA. Reich, Zvi, and Aviv Barnoy. 2016. “The Anatomy of Leaking in the Age of Megaleaks.” Digital Journalism 4 No No (7): 886–98. [Anonymous]. 2009. “Unplugging Leaks.” BioTechniques Unk Unk No No No Access 47 (1): 577–577. Bae, Yoon-Gi. 2018. “Searching for George Orwell: Life, Thinking and Language on the Border.” THE JOURNAL Unk Unk No No No Access OF LOCALITOLOGY 19: 425–57. Baiada, Luca. 2011. “WIKILEAKS AND .” Il Ponte Unk Unk No No No Access 67 (1): 43–50. Blair, Cherie, and Ema Vidak Gojković. 2018. “WikiLeaks and Beyond: Discerning an International Standard for the Unk Unk No No No Access Admissibility of Illegally Obtained Evidence.” ICSID Review - Foreign Investment Law Journal 33 (1): 235–59. Brazys, Samuel, and Diana Panke. 2017. “Push and Pull Forces in the UNGA: Analyzing Foreign Policy Change in Unk Unk No No No Access the Context of International Norms.” International Politics 54 (6): 760–74. Carpenter, Dustin, Tova Fuller, and Les Roberts. 2013. “WikiLeaks and Iraq Body Count: The Sum of Parts May Not Add up to the Whole-a Comparison of Two Tallies of Unk Unk No No No Access Iraqi Civilian Deaths.” Prehospital and Disaster Medicine 28 (3): 223–29. Chari, S. N., T. A. Habeck, I. Molloy, Y. Park, J. R. Rao, and W. Teiken. 2016. “A Platform and Analytics for Usage Unk Unk No No No Access and Entitlement Analytics.” IBM Journal of Research and Development 60 (4): 7:1–7:12. Eco, Umberto. 2012. “Reflections on WikiLeaks.” Revista Non Unk Unk No No de Occidente , no. 374: 173–80. English Foreman, Jonathan. 2011. “The WikiLeaks War on Unk Unk No No No Access America.” Commentary 131 (1): 27–31. Freund, K. 2012. “WikiLeaks: News in the Networked Era.” MEDIA INTERNATIONAL AUSTRALIA, no. 145 Unk Unk No No No Access (November). 159–60. Kreiss, D. 2013. “WikiLeaks: News in the Networked Era.” Unk Unk No No No Access JOURNALISM 14 (6). 839–40. Lee. 2014. “Framing Features Identified in Netizens’ Translations.” The Journal of Translation Studies 15 (4): Unk Unk No No No Access 151–78. Maggs, C. 2014. “WikiLeaks: News in the Networked Era.” Unk Unk No No No Access DISCOURSE & COMMUNICATION 8 (4). 434–37. Padis, Marc-Olivier. 2011. “The WikiLeaks Affair: Pedagogy Journalism?” Esprit. 212 RUE SAINT-MARTIN, Unk Unk No No No Access 75003 PARIS, FRANCE. Quian, Alberto, and Carlos Elias. 2017. “WIKIPEDIA AND ITS COLLABORATIVE NARRATIVES AS AN INDICATOR OF CITIZEN INTEREST: APPLICATION TO Unk Unk No No No Access CULTURE-WIKILEAKS.” PRISMA SOCIAL, no. 18: 85–123. Quian, Alberto, and Carlos Elías. 2018. “Estrategias Y Razones Del Impacto de WikiLeaks En La Opinión Non Pública Mundial / Strategies and Reasons for the Impact Unk Unk No No English of WikiLeaks on World Public Opinion.” Reis, no. 162: 91– 110. Ripoll, Alejandra. 2013. “WIKILEAKS SUBORDINADO: LA SUPREMACÍA ESTATAL EN EL SISTEMA Non Unk Unk No No INTERNACIONAL CONTEMPORÁNEO.” Análisis Político English 26 (78): 199–210. Rovinskaya, Tatiana L. 2016. “Establishment of the ‘Pirate Non Movement’ in the USA.” Mirovaya Ekonomika I Unk Unk No No English Mezhdunarodnye Otnosheniya 60 (8): 76–84. Rovinskaya, Tatiana Leonidovna. 2015. “Political Non Ambitions of European ‘Pirates.’” Mirovaya Ekonomika I Unk Unk No No English Mezhdunarodnye Otnosheniya, no. 7: 72–84. Salgado, Tiago Santos. 2017. “The US Interference in Chavista Venezuela.” AEDOS-REVISTA DO CORPO Non Unk Unk No No DISCENTE DO PROGRAMA DE POS-GRADUACAO EM English HISTORIA DA UFRGS 9 (21): 57–82. Schrape, Jan-Felix. 2017. “Der Akteur: Konstruktion Und Non Dekonstruktion Einer Beobachtungskategorie.” Unk Unk No No English Österreichische Zeitschrift Für Soziologie 42 (4): 387–405. Usher, Nikki. 2012. “WikiLeaks: News in the Networked Era, by Charlie Beckett and .” Political Unk Unk No No Book Communication 29 (4): 466–69. Weissmann, Gerald. 2011. “Wiki-Science and Moliere’s Beast.” FASEB Journal: Official Publication of the Unk Unk No No No Access Federation of American Societies for Experimental Biology 25 (2): 435–38. 김미덕. 2014. “Cultural Representation of Whistleblowing (Whistleblower): With Special Reference to Films Based Unk Unk No No No Access on True Stories.” Hyonsang-Gwa-Insik 38 (4): 157–80. 김헌태. 2011. “A Study on Wikileaks as an Online Whistleblowing Journalism with Critical Discourse Unk Unk No No No Access Analysis.” Korean Journal of Communication Studies 19 (1): 127–55. 성일권. 2012. “Wikileaks’s Status and Its Mission, as a Media Public Sphere.” THE JOURNAL OF POLITICAL Unk Unk No No No Access SCIENCE & COMMUNICATION 15 (2): 175–200. 손경복, and 이태진. 2015. “Trans-Pacific Partnership Non Unk Unk No No Agreements and Access to Medicine.” The Korean English Journal of Health Economics and Policy 21 (3): 1–31. 손경복. 2016. “The Transition of TPP Agreements : Non Focused on the Leaked and Final Agreements.” The Unk Unk No No Korean Journal of Health Economics and Policy 22 (2): English 99–117.