ADMINISTRATIVE RISKS OF ICT’S: FLASHMOB government areas: m-healthcare (remembering patients to take ANDBEYOND their medicine, laboratory results, epidemic warnings, vs.), m- agriculture, (information about harvest), m-education (exam Burak GUMUS results, shooter warnings, mobile examination through SMS), Faculty For Economics and Administrative Sciences, m-warning (flood, typhoon, forest fire, political events, early Department For Public Administration warning systems, etc..), m-fiscal (taxation, etc..), m-payment Edirne, Trakya University e-mail: [email protected] ("Mobile Money 2.0" in Uganda or the "M-Pesa" in Kenya, Nalan DEMIRAL Tanzania, Afghanistan and other countries, where payments are Faculty For Economics and Administrative Sciences, possible via mobile phone), m-search (MMS from missing Department For Public Administration people or terrorists are sent to bus drivers), m-voting in Estonia Edirne, Trakya University [4]. e-mail: [email protected] Berkan DEMIRAL When it comes to e-democarcy or m-voting, Ozgur Uckan email: [email protected] underlines the administrative model of non-central and ABSTRACT horizontal self-coordination rather than classic vertical top- The increased usage of ICT is both a blessing and a course at down models to improve the quality of democracy within a the same time. On the one side it can improve services and frame of a virtual and mobile social contract, where internet empower citizens through their facilated access to more platforms and mobile phone networks are even an arena for information. Increased transparency, cost reduction, effective participative democratic dialogue [5, p. 12, 67]. So, discursive coordination and rationalization are part of the results. On the Nation building seems to be possible by News Media. other side there are still political dangers and challenges for governments by the misuse of ICT. can be modelled as an arena, where information can also be shared by NEW MEDIA politically motivated netizens for coordination, "intelligence Why is New Media so popular that it can be used for such goals? service" and the arrangement of legal collective actions. So- The answer lies in the double character so Social Media. Social called Flashmobs are arranged by users in the internet and Network(ing) Sites (SNSs) researcher Zeynep Tüfekçi mobile phones. distinguishes between "the expressive Internet and the So, technical achievements can also be used for illegal and instrumental Internet" [6], when it comes to the usage of the illegitimate collective actions. Smart phones blurring the limits New Media like Facebook, Twitter, YouTube and so on. We between internet and mobile phones are suited well for are talking about "expressive internet"i if netizens use the endangering the political status quo by insurgency 2.0. This internet "to perform and realize social interactions, self- study shows some regional and national examples like flashmobs presentation, public performance, social capital management, or "Twitter Revolutions". furthering of social ties" [7]. "Instrumental internet"is the case, if you search for information, gather some knowledge and do Keywords: ICT, SNSs, Flashmob, Political Science, Public commercial transactions [8]. This dual characteristic of the Administration, local government internet, allowing both self-expression and coordination makes itself attractive to users. With Facebook, Wikipedia, Twitter, or the like WikiLeaks networks between citiziens (C2C) spread INTRODUCTION rapidly. Today, half a billion people are members of the website Facebook. According to Kruse, it's " the world's 4th great With the increasing access of ordinary people to user-freindly "nation" [9, p. 9,12]. This size leads to political influence. Every computer software, Information and Communication minute, 24 hours of video are uploaded onto YouTube [10]. Tecnology (ICTs) is more and more used in the relations between government agencies, business companies and POLITICAL IMPORTANCE OF THE NEW MEDIA citizens [1, p. 9]. E government practices are supplied via internet and can be categorized to the participants of the In the "Information Age" everything starts with information. So, information sharing is sharing of power [11]. Struggle for virtual communication: communication paths between searching and spreading of information influences the struggle governmental agencies and citizens (G2C/C2G), among for power. Information is the base of influence of public opinion. different govermental agencies (G2G) and between citizens Individual decisions on actions and collective actions depend on (C2C). Citizens visiting the websites of govermental agencies public opinion basing on information. Everybody choses do not need to go to the official govermental offices at the between different options on the basis of his information. As a certain certain opening times anymore, because there is no result, so-called “information bombs“ influencing public opinion, individual and collective action gain importance within need for face-to-face communications. a within a political struggle. One famous victim oft he information bombs is former German Minister Zu Guttenberg. Moreover, the increasing usage of mobile government practices basing on mobile phones has more advantages than e- Internet vs. German minister government practices. Citizens benefit not only everytime from govermental services, but also everywhere, because they can An example of efficient interplay and supplementation send and receive SMS in their C2G/G2C-relations. The borders between print and cyber media in one country endangering the between internet, mobile phones, video cameras, cameras, political career of government members is the case of computers are more and more fluid today, whereby the plagiarism scandal of the dissertation of Germany's Federal difference between “here” and “there” does not play a role any Defence Minister Karl Theodor Freiherr zu Guttenberg [12]. more [2]. M-Government practises are wide-spread in such After he had been accused of plagiarism by law professor countries, where the number of mobile phone users are bigger Andreas Fischer-Lescano in a scientific book review [13], than the number of netizens [3, p.5]. There are different m- German Newspaper Süddeutsche Zeitung reported this allegation on February 16th, 2011 [14]. Only a few days later, a can be constated in Tunisia, Egypt, Saudi-Arabia, the Emirates, "crowdsourcing" campaign started by many net Algeria, Jordan, and of course in Libya, where uprisings and activists in the website revolts are organized [18]. But is internet the only cause of Twitter Revolutions? "[T]he economy, a frustated over- http://de.guttenplag.wikia.com/wiki/GuttenPlag_Wiki, which educated, unemployed middle class, the trade unions, rampant was created only for this purpose of collective investigation. censorship and government corruption" [19] formed the The "sclacktivists" found out, that zu Guttenberg had necessary condition for the revolution, whereby the SNSs plagiarized almost 70 percent of his doctora thesis, where enabled the coordination and communication between books, newspaper articles, academic journals, finding results of the"angry young men with no jobs" [20], turned into the the research department of the German parliament and even protesters use Facebook, Twitter and YouTube to mobilize speeches had been copied-and-pasted and used without themselves and to report. Then ordinary citizen attended the protests organized by appropriate citation. the "Facebook Youth" [21] against the old establishment. After a suicide attempt of a 26-year-old university During the crowdsourcing, the net activists compared his graduate called Mohamed Bouazizi first protest formed, dissertation with texts of authors, who had not been which spread out through the whole country with the help of mentioned in the footnotes, and presented the results on the SNSs. For example a "hacktivist" (hacker-activist) group website only within a few days [15], for that it takes many called "Anonymus" posted subversive videos on YouTube, according to LA Times [22]. Elisabeth Dickinson weeks for a scientist to do the same job. The University of defines the uprising in Tunisia as the "First WikiLeaks Bayreuth has revoked his doctoral title on 23 February 2011. Revolution" [23], because the former President Ben Ali's ruling He resigned on 1 March 2011. The fact, that the hero or villain family was described as as "mafia-esque elite who have their of this story is a prominent politician, his disser-tation was hands in every cookie jar in the entire economy" [24] in the even few days after the accusation online available for everyone, revealed State Department cables. So, Wikileaks contributed to the technologi-cally facilitated division of labour coordination the harsh reaction of the Tunisians against President Ben Ali's regime. During the revolts in Tunis maps of govermental of many activists by the SNSs, who moreover have remained buildings, prisons and other targets at Google were marked and anonym and unsanctioned, made this internet project to check spread through "maptivism" [25, p. 120] the copycat al-legations successful. ADVANTAGES OF WEB-BASED ORGANIZATIONS WIKILEAKS There are some advantages of SNSs-based movements in The online whistleblower site WikiLeaks published contrast to classic organizations. Median theorist Clay Shirky documents and video materials from the Afghanistan and Iraq claimed that social media helped angry people coordinate Wars. On November 28th, 2010 it released secret US American their actions [26]. This fast and easy coordination makes diplomatic cables in cooperation with the American New York New Media successful in organizing effective collective Times, Spanish El Pais, German Der Spiegel, French Le actions [27, pp. 146-185]: "Because the cost of sharing and Monde and the British The Guardian, dated from 28 December coordinating has collapsed, new methods of organization are 1966 to 28 February 2010, including critical revelations and available to ordinary citizens, methods that allow events to be analyses from US embassies about the middle-east crises, arranged without much advance planning. because the mobs about US intelligence and counter-intelligence efforts and were proposed via weblog, the state had no way of keeping about the (corrupt) political elites of the host countries. track of who had seen the plan." [28, p. 169]

Wikileaks opened up a new dimension for political SNSs. Because of bureaucracy, hierarchy and oligarchy in political Based on Wikileaks, many whistleblower spin-off sites like parties, NGOs, trade unions, associations, foundations, sudden Openleaks, Brusselsleaks, Balkanleaks, Indoleaks, Ruleaks and and "independent" actions are impossible because of long- so on were founded. during procedures, intrigues, prohibitions and paralysis through mutual obstruction of plotting rival groups, power struggle ICT-based movements use internet and SNSs for three basic within the organizations. Especially young people, believing in purposes: communication, organization and action spaces. grassroots methods rather than bureaucratic oligarchies of Activists communicate within the C2C-framework [16, p. 200]. Elders are critical of these structures [29, p. 222]. As a result, Netizens build up their networks in the SNSs through inviting they turn away from classic organizations and turnt to the web- and adding "friends". According to media psycologist Kruse, based horizontal networks of effective self-coordination. The there is a necessary and a sufficient condition to be fitted for a majority of young people socialized with ICT grows, whereas SNSs-based "Revolution". The necessary condition is the members of older generations are linked to these structures existence of new media to distribute subversive messages dominated by old-fashioned procedures. So, agenda-setting, among users or to coordinate uprisings, but the latter discussion and action is easier via SNSs than classic condition is more important: the probability of finding a organizations [30, p. 201]. E-participation has a variety of mobilizing resonance for a shared information spread by the advantages: important topics aren't blocked by the management internet. If the users doni (want to) realize the relevance of a anymore. Critical information on specific subjects can be information stimulus, they woni react. So, easy access to the searched, collected, evaluated and fast-spread both immediately internet and the interconnection of users are not sufficient and collectively, so web-based campaigns benefit from enough to mobilize people.The concrete social and political "collective intelligence" ("Schwarmintelligenz", "swarm context enabling resonance is also important [17]. intelligence"). According to the sources presented by Tobesocial, a significant rise of both SNSs users and of their cyber activism These activists don't need to know or meet each other, can flash crowd typically satirises its own ability to do or undo its remain anonymous. They don't need to drive to meetings and relation to cultural command by organizing anonymously, have only low internet costs [31, p. 255-257]. Whereas issues of meeting in anonymity, and making one simple absurdist importance require urgent intervention, the oligarchic parties, gesture before dispersing once again. NGOs and organizations cannot react in time because of Urbina said that it started innocently enough eight years ago balances of power between plotting fractions, procedures, as an act of where people linked through social- norms, regulations, jealousy, individual concurrence , networking websites and text messaging suddenly gathered on difficulties in the chain of command and bureaucratic obstacles. the streets for impromptu pillow fights in New York, group In the SNSs, everybody can express his own opinion without disco routines in London, and even a huge snowball fight in face-to-face communication and the presumption of being Washington. On Wednesday, the police here said that they had anonymous. Everyone can contact with eachother on a common had enough. They announced plans to step up enforcement of ground of dentity and interest easily and fast and everyone can a curfew already on the books, and to tighten it if there is accept each other as even. Whereas members of classical formal another incident. organizations, political parties and organizations and members of management can be monitored and sanctioned by law, the Philadelphia officials added that they had also begun situation in the internet is different, where users cannot be getting help from the FBI to monitor social-media networks supervised and punished under some circumstances . Internet, and television and radio stations are helping to recruit hip- the situation is different. Data with political relevant content hop artists to make public service announcements spread quickly on the Internet so quickly, that the state cannot imploring teenagers to end the practice. In the past, at least react in time. four of the flash mobs have broken out in the city, including one on Saturday in which roving teenagers broke into fights, FLASHMOBS several onlookers were injured and at least three people were arrested. City residents are also starting to complain about the One succesful example are internet-based Flashmobs. Flash number of unsupervised children, and child advocates are mobs can be defined are an internet phenomenon that emerged asking if there are enough activities to keep young people busy around 2003. They occur when large groups of people gather in after school. public places after receiving a last-minute text message or e- mail telling them where to be and what to do. According to The police, who say these assaults are unrelated to flash Johnson[32], Flash mobs were supposedly inspired by Howard mobs, arrested an 11-year-old boy and a 12-year-old girl in the Rheingold in his book Smart Mobs: The Next Social attack. The police said they also planned to charge the boy in an Revolution, a study of technology’s impact on social attack on a 73-year-old man who was beaten and robbed in the interaction. same area on March 13 [35]. The flash mobs have raised questions about race and class. Most of the teenagers who The very first flash mob, according to reports, was organized by have taken part in them are black and from poor “Bill” in New York City this past summer. Bill emailed 50 of his neighborhoods. Most of the areas hit have been predominantly friends and told them to meet at a particular retail store. When white business districts. store employees were tipped off, the mob quickly changed its plans and met at a Macy’s department store, where they Clay Yeager, a juvenile justice consultant and former director began discussing whether to buy a “love rug” in the home of the Office of Juvenile Justice and Delinquency Prevention furnishings department. The crowd disappeared a few minutes in Pennsylvania, said he believed the flash mobs were partly a later, leaving behind a bewildered Macy’s staff. True to its result of a decline in state money for youth violence prevention moniker, flash mobbing shone briefly and brilliantly. programs [36]. , a senior editor at Harper’s said the Though flash mobbing are still generated occasionally, mobs started as a kind of playful social experiment meant to the trend was officially declared passe following the eighth encourage spontaneity and big gatherings to temporarily take flash mobbing on September 10, 2003 [33]. over commercial and public areas simply to show that they could [37]. Just one day shy of the second anniversary of the 9/11 attacks by religious extremists in that city. Flash mobbing was Types of Flash Mobs described as self-organized entertainment, hailed as a startling intervention in the life of the city, likened to speed dating and There are three types of mobile communicating: mobile texting labeled an incipient form of social protest [34]. targeted mobbing and public performing. According to Iles adopting its name from a short story by 1. Mobile Communicating: Announcements for early science fiction writer Larry Niven, the flash mob is a crowd flash mobbing were circulated like chain letters via e-mail and phenomenon inseparable from socialization of consumer text messages over the span of several days and even weeks to telecommunications that inspired Niven’s story and is used by desktop computers, laptops, pagers and mobile phones. Though this crowd to organize its manifestations. The flash mob apes the popularity of flash mobbing was short-lived and its style the modes of organizing (through web sites, SMS and mailing was deliberately ephemeral, its popularization was well lists) popularized by activist groups, but for no end other than documented by blogs and mainstream media primarily because consumptive display. As such this is a crowd that is part of the use of mobile communication technologies. Flash virtual, part conspicuous affect, which re-enacts and allegorises mobbers occasionally used camcorders, digital cameras and the demise of political agency for the contemporary crowd. The camera-enabled phones to record their participation in flash mobbing-a kind of “mobile blogging” to document the moment. was credited with swaying Spanish voters to a leftist These digital annotations were later posted to various blogs, government in the election that followed shortly after. Some most notably cheese bikini and satanslaundromat that had people are now calling Saturday March 13 “the night of the begun to chronicle the trend and host discussion about it. mobile phone-a reference to the 1981 attempted coup in Spain that was called the night of the transistors” [43]. Flash mobbing shaped and was shaped by a worldwide shift in mobile phone use from private communication characterized Key Points of the successful Flash Mob: primarily by mobile phoning in the late 1980s and 90s to more 1. Avoid Places of business: though it is common collective uses dominated by mobile texting in the late 1990s among flash mob plans, there is too much potential for and the early 2000s. This shift was evident in a corresponding unintended damage. change in sentiments and concerns regarding direct one-to-one mobile phone use versus indirect one-to many mobile phone 2. Don’t get political: the whole idea is just to be silly. uses [38]. In contrast to concerns about person-to-person use, Injecting a flash mob with a political agenda is an unacceptable by 2003 one commentator on flash mobbing mused, “How is it corruption. possiblethat a technology with such potential to empower 3 . No commercial ties. the individual has turned into an irritating clique-machine for 4 . Do not disrupt traffic. the hipster sheep?[39] 5. Surprise the public, don’t alarm them. 6 . Keep your shirt on. In the late 1990s, North American began to use their mobile 7 . No advance publicity. 8. No photos or video: If pictures or video of your event phones to facilitate rapid, decentralized, one-to-many make the news or even the web, you have failed miserably [44] interaction in a practice that called “mobile communication” for lack of a better term. Though decentralized communication Administrative Problems which Creating from the Flash using mobile phones was already widespread in some Asian Mob Actions and European countries, particularly among adolescents, the practice became at once visible and contentious in the USA and 1. Security: The gathering of many people at a moment does not introduce a security gap but as it is unpredictable there Canada as a result of anti-globalization protests in the streets of might be security risks at al. Seattle and Quebec City during WTO meetings in those cities 2. Traffic Jam: Large crowds of people gathering at a in 1999 and 2001 [40]. moment in a place affect the pedestrians and vehicles in traffic negatively. Thus will increase the use of petroleum and cause 2. Targeted Mobbing: Savage defined a flash mob as “a work loss. leaderless group of like-minded people who organize using 3. Pollution: There are often large masses of waste after technologies such as cellphones, e-mail and the web”. the flash mob actions. Local governments have to use Proponents of flash mobbing were keen to emphasize that each manpower, money and time in order to get rid of these wastes. 4. Loss of Image: Although the flash mob actions may occurrence was leaderless. However, it was telling that some be point of attraction for its supporters, rich tourists sometimes postings to blogs lamented that a main obstacle to organizing a could not prefer these places for holiday or may leave there if flash mobbing was the lack of a central authority that can make there is a flash mob action. Likewise the investors should not decisions and tell you where to show up [41]. investigate in this area for reasons of security and other.

While flash mobbing was popular there was no reported KILL SWITCH OPTION violence related to it. In some places, law enforcement officials tried to squash the trend. Following the first flash mobbing in Following Morozov, SNSs cannot only be used by rebels, India in October 2003, police introduced stricter security but also by repressive dictatorships for cyber counter measures to discourage others out of fear that it might provide intelligence and to oppress dissident movements [45]. State cover for sectarian violence of sort that rocked Mumbai in authorities published Twitter-Pics of protesters in the internet August 2003, when bombs killed over 200 people [42]. in order to catch them [46]. Morozov argues that the Iranian government had executed two internet users because of 3. Public Performing: Widespread mobile sharing videos of the "Twitter Revolution 2009" and communicating was certainly a key factor in the creation of Eyptian protesters are instructed to use ordinary propa-ganda flash mobbing in 2003, but timing – punctual start and a paper or e-mails than SNSs in order not to be seen by precise ending-was of the essence at flash mobbing not simply cyberspies from the government [47]. speed. Flash mobbers perpetuated the confusion surrounding the trend by declaring that “This is a struggle against reality Civil Society 2.0 restructures the relationship between the and we refuse to be taken seriously”. government and the citiziens. Authoritarian regimes like Egypt or Iran react harsh, when it comes to SNSs-based opposition. While flash mobbing was both preceded and followed by Egyptian authorieties used technology for political aims too, by political uprising facilitated through mobile mass spreading SMS with pro-governmental propaganda [48]. communication, a March 2004 instance in Spain stands out as an example of how widespread this form of communication has Egyptian activists circumvented the shut-down of the become. internet and mobile phone services by internet access via satellite, foreign SIM cards or via the permitted and March 13, 2004, a moment of “digital democracy”, in Madrid operational ISP called Noor [49]. Egyptian protesters were able REFERENCES to tweet their message by calling ordinary phones [50]. [1] R. Reichert, Amateure im Netz. Selbstmanagement und Wissenstechnik im Web 2.0." Bielefeld, Transcript, 2008 Nonetheless, there are several strategies of by-passing official [2] O. Uckan, "Hem 'orada' hem 'burada': Mobil Toplum?", state structures, and dissidents find their way to spread their Ozgur Uckan Online, http://www.ozguruckan.com/?p=411, no message despite authoritarism, as it is also the case in Cuba: date (accessed 2.09.2010). "So, pioneering blogger Yoani Sanchez had her blog set up on [3] I. Kushchu and M.H. Kuscu, "Mobile Government", M a server outside of the island. Because she (as everybody on the Government Online, no date island) is not legally able to have domestic Internet [!] access, http://www.mgovernment.org/resurces/MgovforEncyclopedia.p she needs to post from public-access sites, such as in df, (accessed May 17, 2010). [4] M. Zalesak, "The future of m-government: Part I, Part II, international hotels, by uploading her writings from USB Part III", M Government Russia, 2002 (http://www.m- sticks." [51] Critical short movies and documentaries can be government.ru/2007/Upload/Content/Documents/Drozhzhinov/ produced with digital cameras, "passed around on CDs" [52], M-government/The%20future%20of%20m-government.pdf, and be uploaded on YouTube, whereas Cuban TV or cinemas accessed May 17, 2010). doni show them. [5] O. Uckan, E-Devlet, E-Demokrasi ve Türkiye. Istanbul Literatür Yayınevi, 2003 According to German hackers, the "kill switch" option, which [6] Z. Tufekci, “Grooming, Gossip, Facebook, and was chosen by the oppressive governments against revolts in Myspace“. Information, Communication & Society, Vol. 11, No. 4, 2008, pp. 544-564. the whole Arap world like in Egypt and Tunisia, is taken under [7] Tufekci, ibid consideration even in Western Countries like in the US and in [8]Tufekci, ibid Austria. Whereas a "kill switch bill" is wanted to be passed in [9] P. Kruse (2009) "Revolution 2.0: Wie die Netzwerkkultur die the US Senate for the fifth time, a project to shut down the Gesellschaft verändert", lpr Forum Medienzunft 2009, whole mobile phone and internet services across EU Europe is http://www.lpr-forum-medienzukunft.de/files/kruse_rede.pdf managed in Austria [53]. Cynically, "kill switch" is one (accessed May 6, 2010) [10] M.G. Siegler, "Every Minute, Just about a Day's Worth of example, where the East can be followed bey the West. Viedo Is Now Uploaded to YouTube", Tech Crunch, May 20, 2009 http://techcrunch.com/2009/05/20/every-minute-just- Flash Mobs banned in Braunschweig, Germany about-a-days-worth-of-video-is-uploaded-to-youtube/ (accessed April, 2011) According to the newspapers [54], artist Dirk Schadt was [11] O. Uckan, no date, ibid. organizing a flash mob picnic at Braunsweigh’s central in [12] Der Spiegel, “Das Märchen vom ehrlichen Karl. (Dr.) zu Germany when he was contacted by someone who claimed to Guttenberg und die Wahrheit“, Der SPIEGEL Vol 8, be from the local Ordnungsamt, the office of public order, to 23.02.2011. tell him such gatherings were prohibited. [13] A. Fischer-Lescano, “Karl-Theodor Frhr. zu Guttenberg, Verfassung undVerfassungsvertrag. Konstitutionelle The Ordnungsamt apparently caught wind of Schadt’s Entwicklungsstufen in den USA und der EU, Berlin (Duncker & upcoming event when an employee monitored a flash mob Humblot) 2009, 475 S., 88,- €“, Kritische Justiz, 201),p..112- group on the social networking site StudiVZ. The bureaucrat 119, requested Schadt’s e-mail address from the group moderator, http://www.kj.nomos.de/fileadmin/kj/doc/zu_guttenberg.pdf (accessed February 28, 2011). and then got in touch with Schadt to tell him such events were [14] R. Preuß, “Plagiatsvorwurf gegen not allowed [55]. Verteidigungsminister Guttenberg soll bei Doktorarbeit Conclusion abgeschrieben haben“, Suddeutsche Online, 16.02.2011, http://www.sueddeutsche.de/politik/plagiatsvorwurf-gegen- Although flash mobs today seem to be peaceful actions verteidigungsminister-guttenberg-soll-bei-doktorarbeit- organized for fun and taking attention, the central or local abgeschrieben-haben-1.1060774 (accessed February 28, 2011) [15]W i k i a , “ Zwischenbericht“, governments and organizers should make some arrangements 21.02.2011,http://de.guttenplag.wikia.com/wiki/Datei:GuttenPlag in order to make this situation continue. _Zwische nbericht.pdf (accessed February 22, 2011). [16] A. Toprak, A. Yildirim, E. Aygul, M. Binark et al., These precautions should be taken into consideration: Toplumsal Paylasim Agi facebook: 'goruluyorum oylese varım!', Istanbul Kalkedon,, 2009 1. The governments should arrange the legal basis of [17] Wenzell etc, ibid this action. [18] Tobesocial, “Die Analyse der Social Media Revolution in 2. The pieces of flash mob and the subjects which are der Arabischen Welt. (Ägypten, Tunesien, Web forbidden for flash mob should be determined and the public 2.0)“,Tobesocial, 16.02.2011, http://tobesocial.de/blog/social- should be informed this. media-revolutionaegypten (accessed February 28, 2011). 3. Some precautions should be put forward before the [19] ESKI 11L. Allnut:,“Tunisia: Can We Please Stop Talking action in order to reduce the negative effects of flash mobs to About'Twitter Revolutions'?“, 15.01.2011, the local area. Spatial terms should be organized in order to http://www.rferl.org/content/tunisia_can_we_please_stop_talki handle with the problems of flash mobs as these mass actions ng_about_twitter_revolutions/2277052.html (accessed are very sensitive indeed. February 28 th, 2011); S. Wenzel, P. Albrecht, J. Eggert, 4. An organizational structure should be established in “Das Internet und die Proteste in Ägypten“, Politik Digital, the local governments to coordinate and control during the 11.02.2011, http://www.politik-digital.de/Aegypten-Internet- flash mob actions. Social-Media-Twitter-Facebook (accessed February 28, 2011). 5. The restrictions about flash mobs should be limited [20] Alnut, ibid as not to bigger social problems. [21] V. Perthes, “Aufstand in Ägypten. Arabiens Facebook-Jugend vejagt die Greise“, Handelsblatt-Online, 4.02.2011, http://www.handelsblatt.com/arabiens- facebook-jugend-verjagt-die-greise/3823834.html (accessed Performance, New York: Cambridge University Press, February 28, 2011). [38] S. Savage, “Posting to smartmobs“, (2003) [22] Los Angeles Times Online, “Tunisia protesters use http://www.smartmobs.com/archive/2003/08/10/rheingold_me Facebook, Twitter and YouTube to help organize and report“, dia.html (accessed February, 12, 2004) 14.01.2011, [39] Nicholson, ibid. http://latimesblogs.latimes.com/technology/2011/01/tunisia- [40] Nicholson, ibid. students-using-facebook-and-twitter-to-organize.html (accessed [41] A. Iles, “The Crowd Compiled“, Ypsite Online, 2011 February 28, 2011). http://ypsite.net/pdfs/TheCrowdCompiled.pdf [23] E. Dickinson, “The First Wikileaks Revolution?“, Foreign [42] I. Urbina, “Mobs are Born as Word Grows by Text Policy, 13.01.2011, Message“, New York Times Online, 25.3.2010, http://wikileaks.foreignpolicy.com/posts/2011/01/13/wikileaks http://www.nytimes.com/2010/03/25/us/25mobs.html?pagewan _and_the_tunisia_protests (accessed February 28, 2011) ted=print (accessed March 29, 2010) [24] Dickinson, ibid [43]Iles, 2010, ibid. [25] O. Uckan and C. Ertem, Wikileaks. Yeni Dunya Duzenine [44]Ibid Hosgeldiniz. Istanbul 2011. [45]E. Morozov, “Das Netz nützt Unterdrückern und [26] M. Ingram, “Was What Happened in Tunisia a Twitter Unterdrückten“, Zeit-Online, 3.02.2011a, Revolution?“, GIGAOM, http://www.zeit.de/2011/06/Internet?page=2 (accessed 14.01.2011,http://gigaom.com/2011/01/14/was-what- February 28, 2011) happened-in-tunisiaa-twitter-revolution/, (accessed February [46] M. von Rohr, “Die Revolution, die keine war, Teil 2“, 28, 2011). Spiegel-Online,31.01.2011a [27] C. Shirky: Here comes everybody. New York. Penguin http://www.spiegel.de/spiegel/0,1518,742430-2,00.html Books. 2008 (accessed February 28, 2011) [ 2 8 ] i b i d . [47] E. Morozov, “Revolution offline“, Zeit-Online, [29] S. Picot, "Politik per Klick." Deutsche Shell (ed.), Jugend 3.02.2011a, http://www.zeit.de/2011/06/Internet (accessed 2002, Frankfurt Fischer 2002. February 28, 2011) [30] A. Toprak et al., ibid. [48] P. Meller, “Twitter, Facebook und die Revolution in [31]S. Picot, ibid. Ägypten“, Cicero, 2011, http://www.cicero.de/97.php?item=5848 [32] M.D.Johnson, “Good Mob, Bad Mob: The Art of The (accessed February 28, 2011). Flash Mob; An Amusing Concept Easily Ruined“, Partial [49]France 24 Online: “What happens to the Twitter Observer, (24 september 2003) Revolution when there is no Internet?“, 28.01.2011, http://www.partialobserver.com/ArticalPrint.cfm?ArticleID=86 http://www.france24.com/en/20110128-egypt-twitter- 4, D. Bedell, “E-mail Communication Facilities New Flash Mob facebook-cairo-internet-censorship (accessed February 28, Phenomenon“, Knight Riddder Tribune Business News, 23 2011). July 2003; C. ControneoPsst 6:30 p.m., ay Yonge&Eg, [50] Morozov, ibid Toronto Star; (2003); S. Shmueli, “FlashMob Craze Spreads“, [51] B. Hoffmann, “Civil Society 2.0?: How the Internet CNN Online (2003) Changes State-Society Relations in Authoritarian Regimes: http://www.cnn.com/2003/TECH/internet/08/04/flashmob The Case of Cuba“, GIGA Working Papers, Vol. 156 [33] M. Delio,; Manhattan Mob Meets its Maker, Wired (January 2011), p. 1-32, News, http://www.giga-hamburg.de/dl/download.php?d=/content/publikat (2003)http://www.wired.com/news/culture/0,1284,60399,00.ht ionen/pdf/wp 156_hoffmann.pdf (accessed February 28, 2011). ml [52] Hoffman, ibid [34]J. A. Nicholson, (2005); Flash! Mobs in the Age of [53] R. Meusers, “Hacker fürchten Internet-"Kill Switch". Mobile Connectivity, Fibreculture Journal, Vol. 6, Spiegel-Online, 02.02.2011, http://journal.fibreculture.org/issue6/issue6_nicholson_print.ht http://www.spiegel.de/netzwelt/web/0,1518,743106,00.html ml (accessed February 28, 2011). [35] Nicholson, ibid. [54] Iles, 2010, ibid [36] Nicholson, ibid. [55] http:// www.thelocal.de/society/20090728-20875.h [37]J. E Katz and M. Aakhus eds. (2003), Perpetual Contact: Mobile Communication, Private Talk, Public