1 / 21

Works Cited

Works Cited. Dibbell, J. (Dec. 1993). A rape in cyberspace; Or, how an evil clown, a Haitian trickster spirit, two wizzards, and a cast of dozens turned a database into a society. Village Voice . Turkle, S. (Jan 1996). Who Am We? Wired .

lamar
Download Presentation

Works Cited

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Works Cited • Dibbell, J. (Dec. 1993). A rape in cyberspace; Or, how an evil clown, a Haitian trickster spirit, two wizzards, and a cast of dozens turned a database into a society. Village Voice. • Turkle, S. (Jan 1996). Who Am We? Wired. • Highland, M. (2006). As real as your life. Presented in D. Perry Are games better than real life? TED (2013). Staying Anonymous Online. What Is My IP Address. • (1963). Civil Rights March on Washington, D.C. [Photograph]. Retrieved from The National Archives Database. • McDonald, D. (1983). Sailing At Sunset. [Photograph]. Key West, Florida. Retrieved from the Florida Memory Online Database. • (1940). Door Lock. [Photograph]. Florida. Retrieved from the Florida Memory Online Database. • Collier, J. (1943). Sailor and Girl at the Tomb of the Unknown Soldier, Washington, D.C. [Photograph]. Washington, D.C. Retrieved from the Library of Congress Online Database. • Hardt, D. (2005). Identity 2.0. OSCON • (n.d.).Retrieved from http://www.wpclipart.com/smiley/best_smiley_set/smiley_5/smiley_question.jpg • (n.d.). Retrieved from http://www.wpclipart.com/computer/PCs/more_computers/computer_on_internet_2.jpg • (n.d.). Retrieved from http://www.wpclipart.com/computer/people_on_computers/computer_users/social_newtworking.jpg • (n.d.). Retrieved from http://www.wpclipart.com/toys/game/controllers/gamepad.jpg • (n.d.). Retrieved from http://www.wpclipart.com/tools/miscellaneous/ladder/step_ladder.jpg • Gee, J. P. (2007). Semiotic domains: Is playing video games a "waste of time"?. New York: Palgrave Macmillan. Retrieved from http://williamwolff.org/wp-content/uploads/2008/02/gee-video-games-2007.pdf • Rettberg, J. (2009). What is a blog?. Malden, MA: Polity Press. Retrieved fromhttp://williamwolff.org/wp-content/uploads/2009/08/rettberg-blogging-ch1.pdf • Rooney, B. (2013, January 13). The debate over online anonymity. The Wall Street Journal. Retrieved from http://online.wsj.com/article/SB10001424127887323468604578245841828280344.html • Rosen, R. J. (2013, January 19). The viral-media prof whose kids got 1 million facebook likes (and a puppy). Retrieved fromhttp://www.theatlantic.com/technology/archive/2013/01/the-viral-media-prof-whose-kids-got-1-million-facebook-likes-and-a-puppy/267338/ • Atwood, M. (2010, March 19). Atwood in the Twittersphere. New York Review of Books. • Kelly, K. (Aug 2005). We Are the Web. Wired. • Aase, L. (2012, December 27). Anonymity is the Enemy of Community. Social Media University, Global. Retrieved April 27, 2013, from http://social-media-university-global.org/2012/12/anonymity-is-the-enemy-of-community/ • Basma, G. (2011, May 26). PRIVACY IN SOCIAL MEDIA – CAN IT EXIST? [Web log post]. Retrieved April 27, 2013, from http://www.pr-media-blog.co.uk/privacy-social-media/ • Brand Security. (2011, June 27). The greatest hacks in history – Pocket. Cyber Crimes Unit. Retrieved April 27, 2013, from http://www.cybercrimesunit.com/the-greatest-hacks-in-history-pocket/ • Hare, B. (2013, January 29). The social network where no one knows your name. CNN.Retrieved April 27, 2013, from http://www.cnn.com/2013/01/29/tech/social-media/social-number-anonymous • Maxon, K. (2012, November 5). Social Media and the Elections: What the Voters Are Doing[Web log post]. Retrieved April 27, 2013, from http://www.advertisingblender.com/social-media-and-the-elections-what-the-voters-are-doing/

More Related