Julie E. Cohen: Configuring the Networked Self: Law, Code, and the Play of Everyday Practice (2012)
Filed under book | Tags: · code, copyright, everyday, internet, law, life, networks, piracy, play, privacy, security, self, surveillance

The legal and technical rules governing flows of information are out of balance, argues Julie E. Cohen in this original analysis of information law and policy. Flows of cultural and technical information are overly restricted, while flows of personal information often are not restricted at all. The author investigates the institutional forces shaping the emerging information society and the contradictions between those forces and the ways that people use information and information technologies in their everyday lives. She then proposes legal principles to ensure that people have ample room for cultural and material participation as well as greater control over the boundary conditions that govern flows of information to, from, and about them.
Publisher Yale University Press, 2012
ISBN 0300125437, 9780300125436
Printable version is under a Creative Commons Attribution NonCommercial ShareAlike license
352 pages
the author discussing her book (video)
Comment (0)Cryptomorphosis (2012)
Filed under slideshow | Tags: · anonymity, cryptoanarchy, cryptography, darknet, floss, hacktivism, i2p, internet, occupy movement, security, surveillance, tor, wikileaks

This is a basic intro to hacktivism, the surveillance industry, online anonymity, encryption, filesharing, and darknets mainly intended for activists, occupiers, and all others passionate about using code and information for social change or just avoiding the seemingly all-seeing eye of the authorities.
Published in January 2012
BY-NC license
54 pages
PDF
View online (Scribd.com)
Deibert, Palfrey, Rohozinski, Zittrain (eds.): Access Contested: Security, Identity, and Resistance in Asian Cyberspace (2011)
Filed under book | Tags: · asia, blogging, botnet, censorship, china, cyberwar, facebook, freedom of expression, internet, journalism, politics, surveillance

A daily battle for rights and freedoms in cyberspace is being waged in Asia. At the epicenter of this contest is China–home to the world’s largest Internet population and what is perhaps the world’s most advanced Internet censorship and surveillance regime in cyberspace. Resistance to China’s Internet controls comes from both grassroots activists and corporate giants such as Google. Meanwhile, similar struggles play out across the rest of the region, from India and Singapore to Thailand and Burma, although each national dynamic is unique. Access Contested, the third volume from the OpenNet Initiative (a collaborative partnership of the Citizen Lab at the University of Toronto’s Munk School of Global Affairs, the Berkman Center for Internet and Society at Harvard University, and the SecDev Group in Ottawa), examines the interplay of national security, social and ethnic identity, and resistance in Asian cyberspace, offering in-depth accounts of national struggles against Internet controls as well as updated country reports by ONI researchers.
The contributors examine such topics as Internet censorship in Thailand, the Malaysian blogosphere, surveillance and censorship around gender and sexuality in Malaysia, Internet governance in China, corporate social responsibility and freedom of expression in South Korea and India, cyber attacks on independent Burmese media, and distributed-denial-of-service attacks and other digital control measures across Asia.
Edited by Ronald Deibert, John Palfrey, Rafal Rohozinski, Jonathan Zittrain
Publisher MIT Press, 2011
Information Revolution and Global Politics series
ISBN 0262516802, 9780262516808
414 pages