-
Notifications
You must be signed in to change notification settings - Fork 0
Readings for Vocabulary
These readings are listed by discipline and are typically listed from 'least technical' to 'most technical'. We do not expect everyone to be able to understand each other's discipline in depth. For example, we would neither expect a philosopher to follow the formal proofs nor a computer scientist to necessarily to follow terms from Plato's diaologues. Nonetheless, we hope we can all get at least a working familiarity with the key readings from other partners and develop a common vocabulary.
-
Tim Berners-Lee and Edward Snowden (2013) Here's how we take back the Internet https://www.ted.com/talks/edward_snowden_here_s_how_we_take_back_the_internet
-
Bernard Stiegler (2014) The Most Precious Good in the Era of Social Technologies http://books.networkcultures.org/unlikeusreader/chapter/chapter-1/
-
Yuk Hui and Harry Halpin (2012) Collective Individuation: The Future of the Social Web http://www.iri.centrepompidou.fr/wp-content/uploads/2011/02/Hui_Halpin_Collective-Individuation.pdf
-
Adam Ierymenko, I want to believe http://adamierymenko.com/decentralization-i-want-to-believe/ discussing from his several years of practical experiences with building P2P systems: "efficiency, security, decentralization, pick two."
-
Gene Youngblood Secession from the broadcast (lecture) http://secessionfromthebroadcast.org/ discussing "the internet and the crisis of social control" from a critical media theorist perspective.
-
Francesca Musiani, 2015, Giants, Dwarfs and Decentralized Alternatives to Internet Services: an Issue of Internet Governance, Westminster Papers in Communication and Culture, vol. 10, no 1, p. 81-94, special issue “The Internet and the Material Turn”. http://www.westminsterpapers.org/articles/10.16997/wpcc.214/
-
Francesca Musiani, 2015, Practice, Plurality, Performativity and Plumbing: Internet Governance Research Meets Science and Technology Studies, Science, Technology and Human Values, vol. 40, no 2, p. 272-286. http://sth.sagepub.com/content/40/2/272
-
Francesca Musiani, 2013, Governance by algorithms, Internet Policy Review, http://policyreview.info/articles/analysis/governance-algorithms (Note by Francesca: these are all articles from which I have drawn for the writing of the Abécédaire shared with the list, and vice-versa. Below are some references to stuff not by me, which is indeed essential reading ;))
-
Susan Leigh Star, The Ethnography of Infrastructure http://bscw.wineme.fb5.uni-siegen.de/pub/nj_bscw.cgi/d759204/11_2_Star_EthnographyOfInfrastructure.pdf
-
Laura DeNardis, Introduction to Protocol Politics https://mitp-web2.mit.edu/sites/default/files/titles/content/9780262042574_sch_0001.pdf
-
Whitten et al. Why Johnny Can't Encrypt http://www.gaudior.net/alma/johnny.pdf
-
Francesca's PhD thesis: https://pastel.archives-ouvertes.fr/pastel-00795169
-
Beginners Guide to PGP http://www.bitcoinnotbombs.com/beginners-guide-to-pgp/
-
Sparrow et al. (2015) LEAP: A next-generation client VPN and encrypted email provider http://satsymposium.org/papers/leap.pdf
-
Tschantz et al. (2016) SoK: Towards Grounding Censorship Circumvention in Empiricism https://www.eecs.berkeley.edu/~sa499/papers/oakland2016.pdf
-
Nissenbaum et al. A Critical Look at Decentralized Personal Data Architectures http://arxiv.org/pdf/1202.4503v1.pdf
-
Melara et al. (2015) CONIKS: Bringing Key Transparency to End Users https://www.usenix.org/system/files/conference/usenixsecurity15/sec15-paper-melara.pdf
-
Troncoso et al. Drac: An Architecture for Anonymous Low-Volume Communications http://freehaven.net/anonbib/papers/pets2010/p12-danezis.pdf
-
Borisov et al. (2015) DP5: A Private Presence Service http://www0.cs.ucl.ac.uk/staff/G.Danezis/papers/popets15-dp5.pdf
-
Frosch et al. (2014) How Secure is TextSecure? https://eprint.iacr.org/2014/904.pdf
-
Unger et al. (2015) SOK: Secure Messaging http://cacr.uwaterloo.ca/techreports/2015/cacr2015-02.pdf