How can activists avoid burnout?
Gordon, Hava Rachel. 2009. We Fight to Win: Inequality and the Politics of Youth Activism. New Brunswick, NJ: Rutgers University Press
Klandermans, Bert. 1997. The Social Psychology of Protest. Oxford, UK: Blackwell Publishers.
See also: Sharon Erickson Nepstad’s video on the same topic
Three relevant pieces of research about social movement leadership:
Classic: Robnett, Belinda. 2000. How long? How long?: African-American women in the struggle for civil rights. Oxford University Press.
Review: Morris, Aldon and Suzanne Staggenborg. 2004. “Leadership in Social Movements” Pp. 171-96 in The Blackwell Companion to Social Movements, edited by D. A. Snow, S. A. Soule and H. Kriesi. Oxford: Blackwell Publishing.
Contemporary: Nepstad, Sharon and Clifford Bob. 2006. “When Do Leaders Matter? Hypotheses on Leadership Dynamics in Social Movements.” Mobilization: An International Quarterly. 11(1):1-22.
Andrews, Kenneth T., Marshall Ganz, Matthew Baggetta, Hahrie Han, Chaeyoon Lim. 2010. “Leadership, Membership, and Voice: Civic Associations That Work.” American Journal of Sociology 115(4): 1191-1242.
Three relevant pieces of research about social movements and the Arab Spring:
Mobilization Journal’s special issue on the Arab Spring:
Howard, Philip N., and Muzammil M. Hussain. 2013. “Democracy’s fourth wave?: digital media and the Arab Spring.” Oxford University Press.
Alimi, Eitan Y., and David S. Meyer. 2011. “Seasons of change: Arab Spring and political opportunities.” Swiss Political Science Review 17.4: 475-479.
How can I protect myself legally when I am active online?
Professor Bambauer mentions several resources that you can use to protect yourself online. We have compiled links to these sources below.
The EFF (Electronic Frontier Foundation)’s Surveillance Self-Defense offers overviews, tutorials, and briefings for how to keep your identity and your information safe online.
Fire (Foundation for Individual Rights in Education)
The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked.
The Tails system is a live operating system that you can start on almost any computer from a DVD, USB stick, or SD card. It aims at preserving your privacy and anonymity, and helps you to: use the Internet anonymously and circumvent censorship; all connections to the Internet are forced to go through the Tor network; leave no trace on the computer you are using unless you ask it explicitly; use state-of-the-art cryptographic tools to encrypt your files, emails and instant messaging.
Marx, Gary T. 1988. Undercover: police surveillance in America. Berkeley, CA: Univ of California Press,
Lyon D. 2007. Surveillance Studies: An Overview. Malden, MA: Polity
Rafail, Patrick. 2014. “What Makes Protest Dangerous? Ideology, Contentious Tactics, and Covert Surveillance.” Intersectionality and Social Change. Emerald Group Publishing Limited. 235-263.