Classic: Robnett, Belinda. 2000. How long? How long?: African-American women in the struggle for civil rights. Oxford University Press.
Author Archives: thomasvmaher
Three relevant pieces of research about social movements and the Arab Spring:
Mobilization Journal’s special issue on the Arab Spring:
Howard, Philip N., and Muzammil M. Hussain. 2013. “Democracy’s fourth wave?: digital media and the Arab Spring.” Oxford University Press.
Alimi, Eitan Y., and David S. Meyer. 2011. “Seasons of change: Arab Spring and political opportunities.” Swiss Political Science Review 17.4: 475-479.
How can I protect myself legally when I am active online?
Professor Bambauer mentions several resources that you can use to protect yourself online. We have compiled links to these sources below.
The EFF (Electronic Frontier Foundation)’s Surveillance Self-Defense offers overviews, tutorials, and briefings for how to keep your identity and your information safe online.
The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked.
The Tails system is a live operating system that you can start on almost any computer from a DVD, USB stick, or SD card. It aims at preserving your privacy and anonymity, and helps you to: use the Internet anonymously and circumvent censorship; all connections to the Internet are forced to go through the Tor network; leave no trace on the computer you are using unless you ask it explicitly; use state-of-the-art cryptographic tools to encrypt your files, emails and instant messaging.