Results 41 to 50 of about 1,371,805 (187)

How to Govern the Confidence Machine?

open access: yesRegulation &Governance, Volume 19, Issue 3, Page 706-721, July 2025.
ABSTRACT Emerging technologies pose many new challenges for regulation and governance on a global scale. With the advent of distributed communication networks like the Internet and decentralized ledger technologies like blockchain, new platforms emerged, disrupting existing power dynamics and bringing about new claims of sovereignty from the private ...
Primavera de Filippi   +2 more
wiley   +1 more source

Why doesn’t Julian Assange leave WikiLeaks? [PDF]

open access: yes, 2012
If the Swedish legal pursuit of Julian Assange is, as he seems to suggest, part of an assault on WikiLeaks, why doesn’t he simply separate himself from the organisation for a ...
Beckett, Charlie
core  

Consensus, controversy, and chaos in the attribution of characteristics to the morally exceptional

open access: yesJournal of Personality, Volume 92, Issue 3, Page 715-734, June 2024.
Abstract Objective What do people see as distinguishing the morally exceptional from others? To handle the problem that people may disagree about who qualifies as morally exceptional, we asked subjects to select and rate their own examples of morally exceptional, morally average, and immoral people.
William Fleeson   +6 more
wiley   +1 more source

Affective Media, Cyberlibertarianism and the New Zealand Internet Party

open access: yestripleC: Communication, Capitalism & Critique, 2017
The New Zealand Internet Party tested key notions of affective media politics. Embracing techno-solutionism and the hacker politics of disruption, Kim Dotcom’s party attempted to mobilize the digital natives through an irreverent politics of lulz. While
Olivier Jutel
doaj   +1 more source

The Rhetorical Algorithm: WikiLeaks and the Elliptical Secrets of Donald J. Trump [PDF]

open access: yes, 2018
Algorithms were a generative force behind many of the leaks and secrets that dominated the 2016 election season. Taking the form of the identity-anonymizing Tor software that protected the identity of leakers, mathematical protocols occupied a prominent ...
Hallsby, Atilla
core   +2 more sources

Fly me to Cuba (I mean Ecuador)! Julian Assange hijacks WikiLeaks [PDF]

open access: yes, 2012
Call me a contrarian, but I don’t entirely like the way that critics of Julian Assange have seized on his move from a manor house in Norfolk to the Ecuadorian embassy in ...
Beckett, Charlie
core  

Different Spirals of Sameness: A Study of Content Sharing in Mainstream and Alternative Media

open access: yes, 2019
In this paper, we analyze content sharing between news sources in the alternative and mainstream media using a dataset of 713K articles and 194 sources.
Adali, Sibel   +2 more
core   +2 more sources

Doce tesis sobre WikiLeaks [PDF]

open access: yes, 2011
The authors analyze the features that characterize WikiLeaks phenomenon, dealing with all the pros and cons of this new information system, which affects the professional journalism as well as the society as a whole.
Lovink, Gertz, Riemens, Patrick
core   +2 more sources

Szabadságot Julian Assange-nak!

open access: yes, 2018
Mosolyogva, férfiúi büszkesége teljében, úgy ötven fényképésztől és operatőrtől körülvéve Jim Acosta, a CNN (Cable News Network) sztárújságírója, november 17-én dicsőségesen térhetett vissza a Fehér Házba.
Halimi, Serge, Morva Judit
openaire   +1 more source

O silenciamento (do) político de Julian Assange na mídia nacional

open access: yes, 2020
Após sete anos em asilo político na embaixada do Equador, em Londres, Julian Assange – fundador do WikiLeaks – foi preso no dia 11 de abril de 2019. Acusado como criminoso desde 2010, o ativista estamparia mais uma vez os jornais de todo o mundo.
Carlos Eduardo Madureira Barbosa   +1 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy