Professional Documents
Culture Documents
Alhabash, S., & McAlister, A. R. (2015). Redefining virality in less broad strokes: Predicting
viral behavioral intentions from motivations and uses of Facebook and Twitter. New
Media & Society, 17(8), 13171339. doi:10.1177/1461444814523726
Baird, T. D., & Hartter, J. (2017). Livelihood diversification, mobile phones and information
diversity in Northern Tanzania. Land Use Policy, 67, 460471.
doi:10.1016/j.landusepol.2017.05.031
Barger, W., & Barney, R. D. (2004). Media-citizen reciprocity as a moral mandate. Journal of
Mass Media Ethics, 19(3/4), 191206. doi:10.1080/08900523.2004.9679688
Berger, J., & Milkman, K. (2012). What makes online content viral? Journal of Marketing
Research, 49(2), 192205. doi:10.1509/jmr.10.0353
Brock, A. (2012). From the blackhand side: Twitter as a cultural conversation. Journal of
Broadcasting & Electronic Media, 56(4), 529549.
doi:10.1080/08838151.2012.732147
Comor, E., & Bean, H. (2012). Americas engagement delusion: Critiquing a public
diplomacy consensus. International Communication Gazette, 74(3), 203220.
doi:10.1177/1748048511432603
Crandall, H., & Cunningham, C. M. (2016). Media ecology and hashtag activism:
#Kaleidoscope. Explorations in Media Ecology, 15(1), 2132.
doi:10.1386/eme.15.1.21_1
Crawford, K. (2016). Can an algorithm be agonistic? Ten scenes from life in calculated
publics. Science, Technology, & Human Values, 41(1), 77-92.
doi:10.1177/0162243915589635
Fuchs, C. (2012). The political economy of privacy on Facebook. Television & New Media,
13(2), 139159. doi:10.1177/1527476411415699
John, N. A. (2014). File sharing and the history of computing: Or, why file sharing is called
file sharing. Critical Studies in Media Communication, 31(3), 198211.
doi:10.1080/15295036.2013.824597
Meyer, R. (2017, August 15). Can the U.S. government seize an anti-Trump website's visitor
logs? The Atlantic. Available:
https://www.theatlantic.com/technology/archive/2017/08/department-of-justice-
dreamhost-trump-visitor-logs-million-ip/536886/
Peretti, J. (2013, April 11). Essay: 13 ways to make something go viral. Available at the
Internet Archive:
http://web.archive.org/web/20170317151545/http://www.facebookstories.com/
stories/1942/essay-13-ways-to-make-something-go-viral
Richards, N. M. (2013). The dangers of surveillance. Harvard Law Review, 126, 19341965.
Available: http://harvardlawreview.org/wp-
content/uploads/pdfs/vol126_richards.pdf and (formatted HTML)
http://www.harvardlawreview.org/issues/126/may13/Symposium_9477.php
Shirky, C. (2011). The political power of social media: Technology, the public sphere, and
political change. Foreign Affairs, 90(1), 2841. Available:
https://www.foreignaffairs.com/articles/2010-12-20/political-power-social-media
Taddicken, M. (2014). The privacy paradox in the social web: The impact of privacy
concerns, individual characteristics, and the perceived social relevance on different
forms of self-disclosure. Journal of Computer-Mediated Communication, 19(2), 248
273. doi:10.1111/jcc4.12052
West, A. (2015, June 1). 17 disturbing things Snowden has taught us (so far). Available at
GlobalPost: http://www.globalpost.com/dispatch/news/politics/130703/edward-
snowden-leaks
Wijetunga, D. (2014). The digital divide objectified in the design: Use of the mobile
telephone by underprivileged youth in Sri Lanka. Journal of Computer-Mediated
Communication, 19(3), 712726. doi:10.1111/jcc4.12071
Willson, M. (2016). Algorithms (and the) everyday. Information, Communication & Society
(published online: 20 June 2016). doi:10.1080/1369118X.2016.1200645
Youmans, W. L., & York, J. C. (2012). Social media and the activist toolkit: User agreements,
corporate interests, and the information infrastructure of modern social
movements. Journal of Communication, 62(2), 315329. doi:10.1111/j.1460-
2466.2012.01636.x