210 likes | 334 Views
Works Cited. Dibbell, J. (Dec. 1993). A rape in cyberspace; Or, how an evil clown, a Haitian trickster spirit, two wizzards, and a cast of dozens turned a database into a society. Village Voice . Turkle, S. (Jan 1996). Who Am We? Wired .
E N D
Works Cited • Dibbell, J. (Dec. 1993). A rape in cyberspace; Or, how an evil clown, a Haitian trickster spirit, two wizzards, and a cast of dozens turned a database into a society. Village Voice. • Turkle, S. (Jan 1996). Who Am We? Wired. • Highland, M. (2006). As real as your life. Presented in D. Perry Are games better than real life? TED (2013). Staying Anonymous Online. What Is My IP Address. • (1963). Civil Rights March on Washington, D.C. [Photograph]. Retrieved from The National Archives Database. • McDonald, D. (1983). Sailing At Sunset. [Photograph]. Key West, Florida. Retrieved from the Florida Memory Online Database. • (1940). Door Lock. [Photograph]. Florida. Retrieved from the Florida Memory Online Database. • Collier, J. (1943). Sailor and Girl at the Tomb of the Unknown Soldier, Washington, D.C. [Photograph]. Washington, D.C. Retrieved from the Library of Congress Online Database. • Hardt, D. (2005). Identity 2.0. OSCON • (n.d.).Retrieved from http://www.wpclipart.com/smiley/best_smiley_set/smiley_5/smiley_question.jpg • (n.d.). Retrieved from http://www.wpclipart.com/computer/PCs/more_computers/computer_on_internet_2.jpg • (n.d.). Retrieved from http://www.wpclipart.com/computer/people_on_computers/computer_users/social_newtworking.jpg • (n.d.). Retrieved from http://www.wpclipart.com/toys/game/controllers/gamepad.jpg • (n.d.). Retrieved from http://www.wpclipart.com/tools/miscellaneous/ladder/step_ladder.jpg • Gee, J. P. (2007). Semiotic domains: Is playing video games a "waste of time"?. New York: Palgrave Macmillan. Retrieved from http://williamwolff.org/wp-content/uploads/2008/02/gee-video-games-2007.pdf • Rettberg, J. (2009). What is a blog?. Malden, MA: Polity Press. Retrieved fromhttp://williamwolff.org/wp-content/uploads/2009/08/rettberg-blogging-ch1.pdf • Rooney, B. (2013, January 13). The debate over online anonymity. The Wall Street Journal. Retrieved from http://online.wsj.com/article/SB10001424127887323468604578245841828280344.html • Rosen, R. J. (2013, January 19). The viral-media prof whose kids got 1 million facebook likes (and a puppy). Retrieved fromhttp://www.theatlantic.com/technology/archive/2013/01/the-viral-media-prof-whose-kids-got-1-million-facebook-likes-and-a-puppy/267338/ • Atwood, M. (2010, March 19). Atwood in the Twittersphere. New York Review of Books. • Kelly, K. (Aug 2005). We Are the Web. Wired. • Aase, L. (2012, December 27). Anonymity is the Enemy of Community. Social Media University, Global. Retrieved April 27, 2013, from http://social-media-university-global.org/2012/12/anonymity-is-the-enemy-of-community/ • Basma, G. (2011, May 26). PRIVACY IN SOCIAL MEDIA – CAN IT EXIST? [Web log post]. Retrieved April 27, 2013, from http://www.pr-media-blog.co.uk/privacy-social-media/ • Brand Security. (2011, June 27). The greatest hacks in history – Pocket. Cyber Crimes Unit. Retrieved April 27, 2013, from http://www.cybercrimesunit.com/the-greatest-hacks-in-history-pocket/ • Hare, B. (2013, January 29). The social network where no one knows your name. CNN.Retrieved April 27, 2013, from http://www.cnn.com/2013/01/29/tech/social-media/social-number-anonymous • Maxon, K. (2012, November 5). Social Media and the Elections: What the Voters Are Doing[Web log post]. Retrieved April 27, 2013, from http://www.advertisingblender.com/social-media-and-the-elections-what-the-voters-are-doing/