State Power 2.0.Pdf

Total Page:16

File Type:pdf, Size:1020Kb

State Power 2.0.Pdf STATE POWER 2.0 Proof Copy 000 Hussain book.indb 1 9/9/2013 2:02:58 PM This collection is dedicated to the international networks of activists, hactivists, and enthusiasts leading the global movement for Internet freedom. Proof Copy 000 Hussain book.indb 2 9/9/2013 2:02:58 PM State Power 2.0 Authoritarian Entrenchment and Political Engagement Worldwide Edited by MUZAMMIL M. HUSSAIN University of Michigan, USA PHILIP N. HOWARD University of Washington, USA Proof Copy 000 Hussain book.indb 3 9/9/2013 2:02:59 PM © Muzammil M. Hussain and Philip N. Howard 2013 All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise without the prior permission of the publisher. Muzammil M. Hussain and Philip N. Howard have asserted their right under the Copyright, Designs and Patents Act, 1988, to be identified as the editors of this work. Published by Ashgate Publishing Limited Ashgate Publishing Company Wey Court East 110 Cherry Street Union Road Suite 3-1 Farnham Burlington, VT 05401-3818 Surrey, GU9 7PT USA England www.ashgate.com British Library Cataloguing in Publication Data A catalogue record for this book is available from the British Library The Library of Congress has cataloged the printed edition as follows: Howard, Philip N. State Power 2.0 : Authoritarian Entrenchment and Political Engagement Worldwide / by Philip N. Howard and Muzammil M. Hussain. pages cm Includes bibliographical references and index. ISBN 978-1-4094-5469-4 (hardback) -- ISBN 978-1-4094-5470-0 (ebook) -- ISBN 978- 1-4724-0328-5 (epub) 1. Internet--Political aspects. 2. Internet--Government policy. 3. Internet--Censorship. 4. Authoritarianism. 5. Social control. I. Hussain, Muzammil M. II. Title. HM851.H69 2013 303.3'3--dc23 2013020296 ISBN 9781409454694 (hbk) ISBN 9781409454700 (ebk –PDF) ISBN 9781472403285Proof (ebk – ePUB) Copy 000 Hussain book.indb 4 9/9/2013 2:02:59 PM 1 1 2 2 3 Contents 3 4 4 5 5 6 6 7 7 8 List of Figures vii 8 9 Notes on Contributors ix 9 10 Acknowledgments xiii 10 11 11 12 12 13 Introduction: State Power 2.0 1 13 14 Muzammil M. Hussain, Philip N. Howard, 14 15 and Sheetal D. Agarwal 15 16 16 17 PART I INFORMATION INFRASTRUCTURE 17 18 AND SOCIAL CONTROL 18 19 19 20 1 Origins of the Tunisian Internet 19 20 21 Katherine Maher and Jillian C. York 21 22 22 23 2 The State of Digital Exception: 23 24 Censorship and Dissent in Post-Revolutionary Iran 33 24 25 Babak Rahimi 25 26 26 27 3 Information Infrastructure and Anti-Regime 27 28 Protests in Iran and Tunisia 45 28 29 Matthew Carrieri, Ronald J. Deibert, 29 30 and Saad Omar Khan 30 31 31 32 4 Digital Occupation in Gaza’s High-Tech Enclosure 57 32 33 Helga Tawil-Souri 33 34 34 35 5 Leveraged Affordances and the Specter of Structural Violence 69 35 36 David Karpf and Steven Livingston 36 37 Proof Copy 37 38 PART II DIGITAL MEDIA AND POLITICAL ENGAGEMENT 38 39 39 40 6 Technology-Induced Innovation in the Making and 40 41 Consolidation of Arab Democracy 83 41 42 Imad Salamey 42 43 43 44 44 000 Hussain book.indb 5 9/9/2013 2:02:59 PM vi State Power 2.0 1 7 Al-Masry Al-Youm and Egypt’s New Media Ecology 91 1 2 David M. Faris 2 3 3 4 8 Communicating Politics in Kuwait 99 4 5 Fahed Al-Sumait 5 6 6 7 9 Social Media and Soft Political Change in Morocco 113 7 8 Mohammed Ibahrine 8 9 9 10 10 Leninist Lapdogs to Bothersome Bloggers in Vietnam 125 10 11 Catherine McKinley and Anya Schiffrin 11 12 12 13 11 Dynamics of Innovation and the Balance of Power in Russia 139 13 14 Gregory Asmolov 14 15 15 16 12 Anonymous vs. Authoritarianism 153 16 17 Jessica L. Beyer 17 18 18 19 19 20 Bibliography 163 20 21 Index 187 21 22 22 23 23 24 24 25 25 26 26 27 27 28 28 29 29 30 30 31 31 32 32 33 33 34 34 35 35 36 Proof Copy 36 37 37 38 38 39 39 40 40 41 41 42 42 43 43 44 44 000 Hussain book.indb 6 9/9/2013 2:02:59 PM 1 1 2 2 3 List of Figures 3 4 4 5 5 6 6 7 7 8 Figure I.1 Number of major incidents of state intervention 8 9 in digital networks, by regime type, 1995–2011 7 9 10 10 11 Table I.1 How do states disconnect their digital networks? 11 12 Incidents by regime type 9 12 13 Table I.2 Why do states disconnect their digital networks? 13 14 Reasons by regime type 12 14 15 15 16 16 17 17 18 18 19 19 20 20 21 21 22 22 23 23 24 24 25 25 26 26 27 27 28 28 29 29 30 30 31 31 32 32 33 33 34 34 35 35 36 36 37 Proof Copy 37 38 38 39 39 40 40 41 41 42 42 43 43 44 44 000 Hussain book.indb 7 9/9/2013 2:02:59 PM Proof Copy 000 Hussain book.indb 8 9/9/2013 2:02:59 PM 1 1 2 2 3 Notes on Contributors 3 4 4 5 5 6 6 7 7 8 Sheetal D. Agarwal is a doctoral candidate in the Department of Communication 8 9 at the University of Washington, Seattle. Her research interests include the 9 10 intersection of media, technology, and politics from a network perspective. 10 11 Currently, she is evaluating the role of values, resources, and power distribution in 11 12 technology development within networked organizations. 12 13 13 14 Fahed Al-Sumait is Assistant Professor and Department Chair of Communication 14 15 at the Gulf University for Science and Technology in Kuwait. He was recently a 15 16 post-doctoral research fellow at the National University of Singapore’s Middle 16 17 East Institute, and a Fulbright-Hays fellow from 2010–2011. 17 18 18 19 Gregory Asmolov is a doctoral student in the Media and Communications 19 20 Department, at the London School of Economics and Political Science. He is a 20 21 co-founder of HelpMap, a crowdsourcing platform which was used to coordinate 21 22 assistance to victims of wildfires in Russia in 2010. 22 23 23 24 Jessica L. Beyer is a post-doctoral scholar in the Henry M. Jackson School for 24 25 International Studies at the University of Washington, Seattle. 25 26 26 27 Matthew Carrieri is a researcher at the Citizen Lab, Munk School of Global 27 28 Affairs, University of Toronto. He holds a BA in Middle East Studies from McGill 28 29 University and an MA in Near Eastern Studies from New York University. 29 30 30 31 Ronald J. Deibert is Professor of Political Science and Director of the Canada 31 32 Centre for Global Security Studies and the Citizen Lab at the Munk School of 32 33 Global Affairs, University of Toronto. 33 34 34 35 David M. Faris is Assistant Professor of Political Science and Director of 35 36 International Studies at Roosevelt University. He is author of Dissent and 36 37 RevolutionProof in a Digital Age: Social Media, BloggingCopy and Activism in Egypt (I .B. 37 38 Tauris). 38 39 39 40 Philip N. Howard is Professor of Communication, Information and International 40 41 Studies at the University of Washington, Professor of Public Policy at the Central 41 42 European University, and a fellow at the Center for Information Technology Policy 42 43 at Princeton University. 43 44 44 000 Hussain book.indb 9 9/9/2013 2:02:59 PM x State Power 2.0 1 Muzammil M. Hussain is Assistant Professor in International and Comparative 1 2 Media Studies at the University of Michigan’s Department of Communication 2 3 Studies, Faculty Associate at the Institute for Social Research’s Center for 3 4 Political Studies, and directs the project on Comparative Digital Politics and 4 5 Democratization (www.comparative-DPD.org). 5 6 6 7 Mohammed Ibahrine is Assistant Professor of Digital Advertising and Marketing 7 8 Communication at the American University of Sharjah, UAE. He is a contributing 8 9 member of the Open Society Global Project “Mapping Digital Media” and the 9 10 ITU Global Cybersecurity Agenda (GCA). 10 11 11 12 David Karpf is Assistant Professor of Media and Public Affairs at the George 12 13 Washington University. His primary research focus concerns online politics 13 14 in the United States, and is the author of The MoveOn Effect: The Unexpected 14 15 Transformation of American Political Advocacy (Oxford University Press). 15 16 16 17 Saad Omar Khan is a researcher at the Citizen Lab, Munk School of Global 17 18 affairs, University of Toronto. He holds a master’s degree from the London 18 19 School of Economics, and completed his undergraduate studies at the University 19 20 of Toronto. 20 21 21 22 Steven Livingston is Professor of Media and Public Affairs, and International 22 23 Affairs at the George Washington University. 23 24 24 25 Katherine Maher is Director of Strategy and Engagement for the international 25 26 digital rights organization “Access,” and a fellow at the Truman National Security 26 27 Project.
Recommended publications
  • THE BUSINESS of CENSORSHIP: CONTENT MANAGEMENT and the CHINESE ECONOMY By
    THE BUSINESS OF CENSORSHIP: CONTENT MANAGEMENT AND THE CHINESE ECONOMY by JOSHUA CLARK B.A. (Hons.), Queen's University at Kingston, 2009 MASTER OF ARTS in THE FACULTY OF GRADUATE STUDIES (Political Science) THE UNIVERSITY OF BRITISH COLUMBIA (Vancouver) August 2010 ©Joshua Clark, 2010 Abstract Content control and censorship on the Internet are increasingly important topics for scholars of democratization, media and communications. Most studies have examined the relationship between the Internet, content management and various elements important to democratization such as the formation of civil society organizations. This thesis attempts to expand this discussion by examining the effects of online content management on economic systems, using the People's Republic of China as an example. China features a globally integrated economy that is increasing dependent on manufacturing and services while simultaneously maintaining one of the most extensive online content management systems in the world. This paper attempts to show how the Communist Party of China is able to reconcile the need for connectivity in order to drive their economy while maintaining political control. It also discusses the long-term implications of this strategy. The first section consists of a series of quantitative and qualitative tests to determine how various classes of websites are managed. These tests reveal that in order to maintain the flow of information necessary for a globally integrated economy, the Chinese Communist Party utilizes strategies that manage but not block the information flows related to business. This survey is followed by a case study examining the relationship between Google and China, and the implications of Chinese regulation and control for the broader economy.
    [Show full text]
  • West Censoring East
    West Censoring East The Use of Western Technologies by Middle East Censors 2010-2011 Executive Summary The OpenNet Initiative has documented network filtering of the Internet by national governments in over forty countries worldwide. Countries use this network filtering as one of many methods to control the flow of online content that is objectionable to the filtering governments for social, political, and security reasons. Filtering is particularly appealing to governments as it allows them to control content not published within their national borders. National governments use a variety of technical means to filter the Internet; in this paper, we analyze the use of American- and Canadian- made software for the purpose of government-level filtering in the Middle East and North Africa. In this report, the authors find that nine countries in the region utilize Western-made tools for the purpose of blocking social and political content, effectively blocking a total of over 20 million Internet users from accessing such websites. 1 The authors analyze as well the increasing opacity of the usage of Western-made tools for filtering at the national level. Helmi Noman and Jillian C. York authored this report. ONI principal investigators Ronald Deibert, John Palfrey, Rafal Rohozinski, and Jonathan Zittrain authored the foreword. Noman is a Senior Research Fellow at the Munk School of Global Affairs, University of Toronto, and is a Berkman Center Research Affiliate. York is the coordinator for the OpenNet Initiative at the Berkman Center for Internet & Society. The authors would like to thank James Tay of Citizen Lab for technical support and test data analysis.
    [Show full text]
  • JULIAN ASSANGE: When Google Met Wikileaks
    JULIAN ASSANGE JULIAN +OR Books Email Images Behind Google’s image as the over-friendly giant of global tech when.google.met.wikileaks.org Nobody wants to acknowledge that Google has grown big and bad. But it has. Schmidt’s tenure as CEO saw Google integrate with the shadiest of US power structures as it expanded into a geographically invasive megacorporation... Google is watching you when.google.met.wikileaks.org As Google enlarges its industrial surveillance cone to cover the majority of the world’s / WikiLeaks population... Google was accepting NSA money to the tune of... WHEN GOOGLE MET WIKILEAKS GOOGLE WHEN When Google Met WikiLeaks Google spends more on Washington lobbying than leading military contractors when.google.met.wikileaks.org WikiLeaks Search I’m Feeling Evil Google entered the lobbying rankings above military aerospace giant Lockheed Martin, with a total of $18.2 million spent in 2012. Boeing and Northrop Grumman also came below the tech… Transcript of secret meeting between Julian Assange and Google’s Eric Schmidt... wikileaks.org/Transcript-Meeting-Assange-Schmidt.html Assange: We wouldn’t mind a leak from Google, which would be, I think, probably all the Patriot Act requests... Schmidt: Which would be [whispers] illegal... Assange: Tell your general counsel to argue... Eric Schmidt and the State Department-Google nexus when.google.met.wikileaks.org It was at this point that I realized that Eric Schmidt might not have been an emissary of Google alone... the delegation was one part Google, three parts US foreign-policy establishment... We called the State Department front desk and told them that Julian Assange wanted to have a conversation with Hillary Clinton...
    [Show full text]
  • History of the Internet-English
    Sirin Palasri Steven Huter ZitaWenzel, Ph.D. THE HISTOR Y OF THE INTERNET IN THAILAND Sirin Palasri Steven G. Huter Zita Wenzel (Ph.D.) The Network Startup Resource Center (NSRC) University of Oregon The History of the Internet in Thailand by Sirin Palasri, Steven Huter, and Zita Wenzel Cover Design: Boonsak Tangkamcharoen Published by University of Oregon Libraries, 2013 1299 University of Oregon Eugene, OR 97403-1299 United States of America Telephone: (541) 346-3053 / Fax: (541) 346-3485 Second printing, 2013. ISBN: 978-0-9858204-2-8 (pbk) ISBN: 978-0-9858204-6-6 (English PDF), doi:10.7264/N3B56GNC ISBN: 978-0-9858204-7-3 (Thai PDF), doi:10.7264/N36D5QXN Originally published in 1999. Copyright © 1999 State of Oregon, by and for the State Board of Higher Education, on behalf of the Network Startup Resource Center at the University of Oregon. This work is licensed under a Creative Commons Attribution- NonCommercial 3.0 Unported License http://creativecommons.org/licenses/by-nc/3.0/deed.en_US Requests for permission, beyond the Creative Commons authorized uses, should be addressed to: The Network Startup Resource Center (NSRC) 1299 University of Oregon Eugene, Oregon 97403-1299 USA Telephone: +1 541 346-3547 Email: [email protected] Fax: +1 541-346-4397 http://www.nsrc.org/ This material is based upon work supported by the National Science Foundation under Grant No. NCR-961657. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation.
    [Show full text]
  • List of Targets of Arrested Computer Hackers 6 March 2012
    List of targets of arrested computer hackers 6 March 2012 The five computer hackers charged in New York Tribune and Los Angeles Times, using on Tuesday and a sixth who pleaded guilty are misappropriated login credentials. accused of involvement in some of the most notorious hacking incidents of the past 18 months. -- February 2011: A cyberattack on private computer security firm HBGary that involved the The following are some of the cyberattacks in theft of 60,000 emails from HBGary employees and which the two Britons, two Irishmen and two the HBGary chief executive, as well as defacing his Americans allegedly played a role as members of Twitter account. Anonymous, Lulz Security or associated groups: -- April-May 2011: A cyberattack on a Fox -- December 2010: Operation Payback. Distributed Broadcasting Company website that involved the denial of service (DDoS) attacks by members of theft of names, dates of birth, telephone numbers, Anonymous on the websites of MasterCard, email and residential addresses for more than PayPal and Visa in retaliation for their refusal to 70,000 potential contestants on the Fox television accept donations for WikiLeaks. In a DDoS attack, show the "X-Factor." a website is bombarded with traffic, slowing it down or knocking it offline completely. -- May 2011: A cyberattack on Sony Pictures Entertainment that revealed the passwords, email -- January 2011: Defacing a website of the Irish addresses, home addresses and dates of birth of political party Fine Gael after accessing computer 100,000 users of the www.sonypictures.com servers in Arizona used to maintain the website, website and a subsequent online attack against www.finegael2011.com.
    [Show full text]
  • Telecommunications Infrastructure for Electronic Delivery 3
    Telecommunications Infrastructure for Electronic Delivery 3 SUMMARY The telecommunications infrastructure is vitally important to electronic delivery of Federal services because most of these services must, at some point, traverse the infrastructure. This infrastructure includes, among other components, the Federal Government’s long-distance telecommunications program (known as FTS2000 and operated under contract with commercial vendors), and computer networks such as the Internet. The tele- communications infrastructure can facilitate or inhibit many op- portunities in electronic service delivery. The role of the telecommunications infrastructure in electronic service delivery has not been defined, however. OTA identified four areas that warrant attention in clarifying the role of telecommunications. First, Congress and the administration could review and update the mission of FTS2000 and its follow-on contract in the context of electronic service delivery. The overall perform- ance of FTS2000 shows significant improvement over the pre- vious system, at least for basic telephone service. FTS2000 warrants continual review and monitoring, however, to assure that it is the best program to manage Federal telecommunications into the next century when electronic delivery of Federal services likely will be commonplace. Further studies and experiments are needed to properly evaluate the benefits and costs of FTS2000 follow-on options from the perspective of different sized agencies (small to large), diverse Federal programs and recipients, and the government as a whole. Planning for the follow-on contract to FTS2000 could consider new or revised contracting arrangements that were not feasible when FTS2000 was conceived. An “overlapping vendor” ap- proach to contracting, as one example, may provide a “win-win” 57 58 I Making Government Work situation for all parties and eliminate future de- national infrastructure will be much stronger if bates about mandatory use and service upgrades.
    [Show full text]
  • U.S. International Broadcasting Informing, Engaging and Empowering
    2010 Annual Report U.S. International Broadcasting Informing, Engaging and Empowering bbg.gov BBG languages Table of Contents GLOBAL EASTERN/ English CENTRAL Letter From the Broadcasting Board of Governors 5 (including EUROPE Learning Albanian English) Bosnian Croatian AFRICA Greek Afan Oromo Macedonian Amharic Montenegrin French Romanian Hausa to Moldova Kinyarwanda Serbian Kirundi Overview 6 Voice of America 14 Ndebele EURASIA Portuguese Armenian Shona Avar Somali Azerbaijani Swahili Bashkir Tigrigna Belarusian Chechen CENTRAL ASIA Circassian Kazakh Crimean Tatar Kyrgyz Georgian Tajik Russian Turkmen Tatar Radio Free Europe Radio and TV Martí 24 Uzbek Ukrainian 20 EAST ASIA LATIN AMERICA Burmese Creole Cantonese Spanish Indonesian Khmer NEAR EAST/ Korean NORTH AFRICA Lao Arabic Mandarin Kurdish Thai Turkish Tibetan Middle East Radio Free Asia Uyghur 28 Broadcasting Networks 32 Vietnamese SOUTH ASIA Bangla Dari Pashto Persian Urdu International Broadcasting Board On cover: An Indonesian woman checks Broadcasting Bureau 36 Of Governors 40 her laptop after an afternoon prayer (AP Photo/Irwin Fedriansyah). Financial Highlights 43 2 Letter From the Broadcasting Board of Governors 5 Voice of America 14 “This radio will help me pay closer attention to what’s going on in Kabul,” said one elder at a refugee camp. “All of us will now be able to raise our voices more and participate in national decisions like elections.” RFE’s Radio Azadi distributed 20,000 solar-powered, hand-cranked radios throughout Afghanistan. 3 In 2010, Alhurra and Radio Sawa provided Egyptians with comprehensive coverage of the Egyptian election and the resulting protests. “Alhurra was the best in exposing the (falsification of the) Egyptian parliamentary election.” –Egyptian newspaper Alwafd (AP Photo/Ahmed Ali) 4 Letter from the Board TO THE PRESIDENT AND THE CONGRESS OF THE UNITED STATES On behalf of the Broadcasting Board of Governors (BBG) and pursuant to Section 305(a) of Public Law 103-236, the U.S.
    [Show full text]
  • A PRACTICAL METHOD of IDENTIFYING CYBERATTACKS February 2018 INDEX
    In Collaboration With A PRACTICAL METHOD OF IDENTIFYING CYBERATTACKS February 2018 INDEX TOPICS EXECUTIVE SUMMARY 4 OVERVIEW 5 THE RESPONSES TO A GROWING THREAT 7 DIFFERENT TYPES OF PERPETRATORS 10 THE SCOURGE OF CYBERCRIME 11 THE EVOLUTION OF CYBERWARFARE 12 CYBERACTIVISM: ACTIVE AS EVER 13 THE ATTRIBUTION PROBLEM 14 TRACKING THE ORIGINS OF CYBERATTACKS 17 CONCLUSION 20 APPENDIX: TIMELINE OF CYBERSECURITY 21 INCIDENTS 2 A Practical Method of Identifying Cyberattacks EXECUTIVE OVERVIEW SUMMARY The frequency and scope of cyberattacks Cyberattacks carried out by a range of entities are continue to grow, and yet despite the seriousness a growing threat to the security of governments of the problem, it remains extremely difficult to and their citizens. There are three main sources differentiate between the various sources of an of attacks; activists, criminals and governments, attack. This paper aims to shed light on the main and - based on the evidence - it is sometimes types of cyberattacks and provides examples hard to differentiate them. Indeed, they may of each. In particular, a high level framework sometimes work together when their interests for investigation is presented, aimed at helping are aligned. The increasing frequency and severity analysts in gaining a better understanding of the of the attacks makes it more important than ever origins of threats, the motive of the attacker, the to understand the source. Knowing who planned technical origin of the attack, the information an attack might make it easier to capture the contained in the coding of the malware and culprits or frame an appropriate response. the attacker’s modus operandi.
    [Show full text]
  • GAO-03-772 US International Broadcasting
    United States General Accounting Office Report to the Committee on International GAO Relations, House of Representatives July 2003 U.S. INTERNATIONAL BROADCASTING New Strategic Approach Focuses on Reaching Large Audiences but Lacks Measurable Program Objectives a GAO-03-772 July 2003 U.S. INTERNATIONAL BROADCASTING New Strategic Approach Focuses on Highlights of GAO-03-772, a report to the Reaching Large Audiences but Lacks Committee on International Relations, House of Representatives Measurable Program Objectives Prompted by a desire to reverse Consistent with its new plan to dramatically increase the size of U.S. declining audience trends and to international broadcasting listening and viewing audiences in markets of support the war on terrorism, the U.S. strategic interest, the Broadcasting Board of Governors has launched Broadcasting Board of Governors several new projects, including Radio Sawa in the Middle East, Radio Farda (BBG), the agency responsible for in Iran, and the Afghanistan Radio Network. These projects adhere to the U.S. international broadcasting, Board’s core strategy of identifying a target audience and tailoring each began developing its new strategic approach to international broadcast product to market circumstances and audience needs. broadcasting in July 2001. This approach emphasizes the need to The Board’s plan lacks measurable program objectives designed to gauge the reach mass audiences by applying success of its new approach to broadcasting, detailed implementation modern broadcast techniques and strategies, resource needs, and project time frames. A number of key strategically allocating resources to effectiveness measures could provide a starting point for developing focus on high-priority markets. measurable program objectives and related performance goals and GAO was asked to examine (1) indicators under the Board’s annual performance plan.
    [Show full text]
  • Weather Investment
    Invest in the MEDA region, why, how ? Algeria Egypt / Israel / Jordan / Lebanon / Libya / Morocco / Palestinian Authority/ Syria / Tunisia / Turkey PAPERS & STUDIES n°22 April 2007 Collective work driven by Sonia Bessamra and Bénédict de Saint-Laurent Invest in the MEDA region, why how ? References This document has been produced within the context of a mission entrusted by the European Commission to the Invest in France Agency (AFII), assisted by the Istituto Nazionale per il Commercio Estero, ICE (Italy) and the Direction des Investissements, DI (Morocco), to develop a Euro‐Mediterranean Network of Mediterranean Investment Promotion Agencies (« ANIMA»). The n°of the contract is: ME8/B7‐4100/IB/99/0304. ISBN: 2‐915719‐28‐4 EAN 9782915719284 © AFII‐ANIMA 2007. Reproduction prohibited without the authorisation of the AFII. All rights reserved Authors This work is the second edition of a synopsis guide realised with contributions from various experts working under the ANIMA programme, especially for the writing of the project web site pages. The following authors have participated in the two editions: In 2006, Sonia Bessamra (free‐lance consultant) and Bénédict de Saint‐ Laurent (AFII) have fully updated the content, assisted by Pierre Henry, Amar Kaddouri, Emmanuel Noutary and Elsa Vachez (ANIMA team, translation, revisions); The former 2004 edition, which provides the guide frame, was directed by Bénédict de Saint‐Laurent (ANIMA, co‐ordination, synopsis, rewriting, data), Stéphane Jaffrin (ANIMA, on line implementation, some updates) and Christian Apothéloz (free‐lance consultant, co‐ordination), assisted by Alexandre Arditti, Delphine Bréant, Jean‐François Eyraud, Jean‐Louis Marcos, Laurent Mauron, Stéphanie Paicheler, Samar Smati, Nicolas Sridi et Jihad Yazigi (various thematic or country articles).
    [Show full text]
  • Social Movements and Network Analysis in Tunisia Before the Arab Spring Movimientos Sociales Y Análisis De Redes En Túnez Antes De La Primavera Árabe
    Social movements and network analysis in Tunisia before the Arab Spring Movimientos sociales y análisis de redes en Túnez antes de la Primavera Árabe Citation: Laura Pérez-Altable (2016) & Saúl Blanco. "Social movements and network analysis in Tunisia before the Arab Spring". Hipertext.net [Online], 2016. Núm. 14. http://raco.cat/index.php/Hipertext/article/view/311836/405621 DOI: 10.2436/20.8050.01.30 Laura Pérez-Altable Saúl Blanco [email protected] [email protected] Universitat Pomeu Fabra Universidad Carlos III Keywords: Social movements, social network analysis, arab spring, activism Abstract: In recent years, there has been a great deal of interest on the role of social media in the so-called Arab Spring revolt, but the uprising was not the result of a sudden event. Before it began in late 2010, protests have been staged in some Arab countries that paved the way to this major event (Al-Rawi, 2014, p. 916; Cassara, 2013, p.191). As Gilad Lotan et al. noted (2011, p. 1376) each country has its own context; hence this article focusses on Tunisia. Tunisia was the first Arab country where the Arab Spring began, on December 17, 2010, when Mohammed Bouazizi, a fruit vendor from Sidi Bouzid, set himself on fire in front of a public building. As it is necessary to understand what led to the growing interest on the role of social media, this article examines the digital activism, specifically on Twitter, which took place during the months that preceded the uprising in Tunisia. Thus, this article focusses on the latency phase of the Arab Spring in Tunisia, following the framework proposed by Alberto Melucci in his seminal work Nomads of the present (1989).
    [Show full text]
  • The Future of the Internet and How to Stop It the Harvard Community Has
    The Future of the Internet and How to Stop It The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters. Jonathan L. Zittrain, The Future of the Internet -- And How to Citation Stop It (Yale University Press & Penguin UK 2008). Published Version http://futureoftheinternet.org/ Accessed July 1, 2016 4:22:42 AM EDT Citable Link http://nrs.harvard.edu/urn-3:HUL.InstRepos:4455262 This article was downloaded from Harvard University's DASH Terms of Use repository, and is made available under the terms and conditions applicable to Other Posted Material, as set forth at http://nrs.harvard.edu/urn-3:HUL.InstRepos:dash.current.terms- of-use#LAA (Article begins on next page) YD8852.i-x 1/20/09 1:59 PM Page i The Future of the Internet— And How to Stop It YD8852.i-x 1/20/09 1:59 PM Page ii YD8852.i-x 1/20/09 1:59 PM Page iii The Future of the Internet And How to Stop It Jonathan Zittrain With a New Foreword by Lawrence Lessig and a New Preface by the Author Yale University Press New Haven & London YD8852.i-x 1/20/09 1:59 PM Page iv A Caravan book. For more information, visit www.caravanbooks.org. The cover was designed by Ivo van der Ent, based on his winning entry of an open competition at www.worth1000.com. Copyright © 2008 by Jonathan Zittrain. All rights reserved. Preface to the Paperback Edition copyright © Jonathan Zittrain 2008. Subject to the exception immediately following, this book may not be reproduced, in whole or in part, including illustrations, in any form (beyond that copying permitted by Sections 107 and 108 of the U.S.
    [Show full text]