|
Reference
|
|
*** (1961) The constitutional right to anonymity: Free speech, disclosure and the devil. Yale Law Journal, 70, 1084-1128
|
|
Akdeniz, Y. (2002) Anonymity, democracy, and cyberspace. Social Research: An International Quarterly, 69, 1, 223-237
|
|
Asenbaum, H. (2018) Anonymity and democracy: Absence as presence in the public sphere. American Political Science Review, 112(3), 459-472
|
|
Barnett, L.L., Cotter, T. (2007) Authorship, audiences, and anonymous speech. Notre Dame Law Review, 82, 1537-1604
|
2
|
Bek, U. (2001) Rizično društvo. Beograd: Filip Višnjić
|
|
Bernal, P. (2020) What do we now and what should we do about Intenet privacy. London: SAGE
|
|
Brin, D. (1999) Transparent society. Basic Books
|
|
Chandler, J. (2009) Privacy versus national security. u: Kerr Ian, Steevens Valerie, Luckock Carole [ur.] Lessons from the Identity Trail, Oxford: Oxford University Press, 121-138
|
|
Clark, J., Gauvin, P., Adams, C. (2009) Exit node repudiation for anonymity networks. u: Kerr Ian, Steevens Valerie, Luckock Carole [ur.] Lessons from the Identity Trail, Oxford: Oxford University Press, 399-416
|
|
Cobb, N. (2007) Governance through publicity: Anti-social behaviour orders, young people, and the problematization of the right to anonymity. Journal of Law and Society, 34, 3, 342-373
|
|
Cohen, J.E. (2008) Privacy, visibility, transparency, and exposure. U. Chi. L. Rev, 75, 181-201
|
|
Coleman, G. (2019) How has the fight for anonymity and privacy advanced since Snowden's whistle-blowing?. Media, Culture & Society, 41, 7, 565-571
|
|
Cooper, C.A. (2020) Public servants, anonymity, and political activity online: Bureaucratic neutrality in peril?. International Review of Administrative Sciences, 86, 3, 496-512
|
1
|
Cushman, D.P., Cahn, D.D. (1985) Communication in interpersonal relationships. Albany, NY: SUNY Press
|
|
Electronic Frontier Foundation (2015) Anonymity and encription - comments submitted to the United Nations special rapporteur on the promotion and protection of the right to freedom of opinion and expression. https://www.ohchr.org/Documents/Issues/Opinion/Communications/EFF.pdf, 23. jula 2021
|
|
Feenberg, A. (1999) Questioning technology. New York: Routledge
|
|
Feenberg, A. (2000) Constructivism and technology critique: Replies to critics. Inquiry, 43, 2, 225-237
|
|
Flanagan, M., Howe, D., Nissenbaum, H. (2008) Embodying values in technology: Theory and practice. u: van den Hoven Jeroen, Weckert John [ur.] Information Technology and Moral Philosophy, Cambridge: Cambridge University Press, 322-353
|
1
|
Flaxman, S., Goel, S., Rao, J.M. (2016) Filter bubbles, echo chambers, and online news consumption. Public opinion quarterly, 80, 298-320
|
|
Froomkin, M. (2009) Anonymity and the Law in the United States. u: Kerr Ian, Steevens Valerie, Luckock Carole [ur.] Lessons from the Identity Trail, Oxford: Oxford University Press, 441-464
|
|
Froomkin, M. (1999) Legal issues in anonymity and pseudoanonymity. Information Society: An International Journal, 15, 2, 113-127
|
|
Fry, J.D. (2015) Privacy, predictability and internet surveillance in the US and China: Better the devil you know. University of Pennsylvania Journal of International Law, 37, 419-501
|
24
|
Fuko, M. (1997) Nadzirati i kažnjavati - nastanak zatvora. Sremski Karlovci - Novi Sad: Izdavačka knjižarnica Zorana Stojanovića
|
|
Gramši, A. (2018) Intelektualci, kultura, hegemonija. Novi Sad: Mediterran Publishing
|
|
Gross, E. (2004) The struggle of a democracy against terrorism -protection of human rights: The right to privacy versus the national interest - the proper balance. Cornell Int. Law Journal, 37, 1, 27-93
|
|
Haimson, O.L., Hoffmann, A.L. (2016) Constructing and enforcing: 'Authentic' identity online: Facebook, real names, and non-normative identities. First Monday, 21(6), https://journals.uic.edu/ojs/index.php/fm/article/view/6791/5521, 22. jula 2021
|
|
Heins, M. (2010) The right to be let alone: Privacy and anonymity at the U.S. Supreme Court. Revue francaise d etudes americaines, 123, 54-72
|
|
Jardine, E. (2018) Tor, what is it good for?: Political repression and the use of online anonymity-granting technologies. New media & society, 20(2), 435-452
|
2
|
Kastels, M. (2014) Moć komunikacija. Beograd: Clio
|
|
Knorr, L. (2020) www: kritički potencijali anonimnog dijela interneta. Jahr-European Journal of Bioethics, 11, 2, 517-529
|
|
La, R.F. (2013) Report of the Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression, Frank La Rue to the U.N. Human Rights Council [A/HRC/14/23]. Geneva: United Nations
|
|
Lewis, J.A. (2005) The internet and terrorism. u: Proceedings of the ASIL Annual Meeting, 99, 112-115
|
3
|
Maffesoli, M. (1996) The time of the tribes: The decline of individualism in mass society. London: SAGE Publications
|
|
Martin, J.A., Fargo, A.L. (2015) Anonimity as a legal right: Where and why it matters. North Carolina Journal of Law and Technology, 16(2), 311-376
|
|
Marx, G.T. (1999) What's in a name?: Some reflections on the sociology of anonymity. information society, 15, 2, 99-112
|
|
Marx, G.T. (2004) Internet anonymity as a reflection of broader issues involving technology and society. Asia-Pacific Review, 11, 1, 142-166
|
|
Moore, A.D. (2010) Privacy rights: Moral and legal foundations. Pennsylvania State University Press
|
|
Papacharissi, Z. (2004) Democracy online: Civility, politeness, and the democratic potential of online political discussion groups. New media & Society, 6(2), 259-283
|
1
|
Petrović, D. (2013) Društvenost u doba interneta. Novi Sad: Akademska knjiga
|
|
Petrović, D. (2008) U međumrežju. Beograd: ISIFF
|
84
|
Platon (1993) Država. Beograd: BIGZ
|
|
Posner, R. (2006) Not a suicide pact: The constitution in a time of national emergency. New York: Oxford University Press
|
|
Pulung, P.S., Rahayu, R., Nur, A.I. (2018) Online political participation and netizen anonymity in Indonesia's digital democracy. PCD Journal, 6, 2, 185-212
|
|
Radojković, M. (2015) Da li će građansko novinarstvo zameniti profesionalno?. Beograd: Univerzitet u Beogradu, Fakultet političkih nauka, 305-314
|
|
Rheingold, H. (2000) The virtual community, revised edition: Homesteading on the electronic frontier. MIT press
|
|
Sai, T.P., Ross, K.W., Cappos, J. (2017) User anonymity on twitter. IEEE Security & Privacy, 15, 3, 84-87
|
|
Sardá, T., Natale, S., Sotirakopoulos, N., Monaghan, M. (2019) Understanding online anonymity. Media, Culture & Society, 41, 4, 557-564
|
|
Simmel, G. (2012) The metropolis and mental life. London: Routledge, 37-45
|
|
Strossen, N. (2001) Protecting privacy and free speech in cyberspace symposium: The unwanted gaze, by Jeffrey Rosen. Georgia Law Journal, 89, 2103-2115
|
6
|
Suler, J. (2004) The online disinhibition effect. Cyberpsychology & behavior, 7(3), 321-326
|
|
Taylor, C. (1991) The malaise of modernity. Toronto: House of Anansi Press
|
|
Turkle, S. (1995) Life on the screen: Identity in the age of internet. New York: Simon & Schuster
|
|
Voorhoof, D. (2010) Internet i pravo na anonimnost. u: Surčulija Jelena [ur.] Sloboda izražavanja na internetu, Beograd: Centar za razvoj interneta, 73-83
|
|
Vujović, S. (1988) Sociologija grada. Beograd: Zavod za udžbenike i nastavna sredstva
|
|
Wallace, K.A. (1999) Anonymity. Ethics and Information technology, 1, 21-31
|
|
Wang, S.A., Pang, M.S., Pavlou, P.A. (2018) 'Cure or poison?': Identity verification and the spread of fake news on social media: Identity verification and the spread of fake news on social media. u: Fox School of Business Research Paper (18-040), (September 14, 2018)
|
|
Westin, A. (1967) Privacy and freedom. New York: Ig Publishing
|
|
Witzleb, N., Lindsay, D., Paterson, M., Rodrick, S. (2014) Emerging challenges in privacy law: Comparative perspectives. Cambridge: Cambridge University Press
|
|
Zubof, Š. (2021) Doba nadzornog kapitalizma. Beograd: Clio
|
|
|
|