References

1) Applebaum, J. (2014). Jacob Appelbaum – People Think They’re Exempt From NSA (2014). YouTube. Retrieved 16 October 2015, from https://www.youtube.com/watch?v=JyT7yzap1Wc

 

2) Abbott, R. (2010). An Onion A Day Keeps The NSA Away. Journal Of Internet Law, 22-28.

 

3) Bamman, D., Connor, B., & Smith, N. (2012). Censorship and deletion practices in Chinese social media. First Monday, 17(3). Retrieved from http://journals.uic.edu/ojs/index.php/fm/article/view/3943/3169

 

4) Bloomberg Business,. (2015). Obama, Xi Jinping Agree to Curb Computer Hacking. Retrieved from https://www.youtube.com/watch?v=QN5YH9dKFK8

 

5) Brown, S., Kang,S., Kiesler,S. (n.d). Why Do People Seek Anonymity on the Internet?, Informing Policy and Design  Human Computer Interaction Institute. Retrieved from  Department of Psychology2 Carnegie Mellon University.

 

6) Christopherson, K.M (2007). Computers in Human Behavior, 23(6), 2581-3056

 

7) Davenport, D (2002). Anonymity on the Internet, Viewpoint, 45(4), 33-35

 

8) Deans, P. (2004). Chapter 6: The Internet in the People’s Republic of China, Censorship and Participation in Abbott, J P. ‘The Political Economy of the Internet in Asia and the Pacific Digital Divides, Economic Competitiveness, and Security Challenges’ (Ed), (pp. 123-138) New York, Praeger

 

9) Denyer, S. (2015, February 7)  Why Internet users all around the world should be worried about China’s Great Firewall, The Washington Post, Retrieved from:  https://www.washingtonpost.com/news/worldviews/wp/2015/02/02/why-internet-users-all-around-the-world-should-be-worried-about-chinas-great-firewall/

 

 

10) Dixon, P. (2015). China as world’s dominant superpower – Impact on America, Russia and EU. Globalchange.com. Retrieved 15 October 2015, from http://www.globalchange.com/china-as-worlds-dominant-superpower-impact-on-america-russia-and-eu.htm

 

11) Gellman, B., Timberg, C., & Rich, S. (2013). Secret NSA documents show campaign against Tor encrypted network. Washington Post. Retrieved 16 October 2015, from https://www.washingtonpost.com/world/national-security/secret-nsa-documents-show-campaign-against-tor-encrypted-network/2013/10/04/610f08b6-2d05-11e3-8ade-a1f23cda135e_story.html

 

12) Haraty, R., & Zantout, B. (2014). The TOR Data Communication System. Journal Of Communications And Networks, 16(4), 415-420.

 

13) Johnson, G (2010). The Impact of Anonymity on Internet Safety, Security, and Content Integrity. Retrieved 14 October 2015 from http://www.resourcesforlife.com/docs/item2560.

 

14) Levine, Y. (2014). Almost everyone involved in developing Tor was (or is) funded by the US government. Pando. Retrieved 13 October 2015, from https://pando.com/2014/07/16/tor-spooks/

 

15) Masters, A (2011). Identity on the Internet: The pros and cons of anonymity. Retrieved 14 Oct 2015 from http://blogs.independent.co.uk/2011/09/19/identity-on-the-internet-the-pros-and-cons-of-anonymity/.

 

16) Osborne, C. (2015). Hornet Tor alternative for high-speed anonymous browsing revealed | ZDNet. ZDNet. Retrieved 16 October 2015, from http://www.zdnet.com/article/hornet-tor-alternative-for-high-speed-anonymous-browsing-revealed/

 

17) Osborne, C. (2015). Tor Cloud Project closes its doors | ZDNet. ZDNet. Retrieved 16 October 2015, from http://www.zdnet.com/article/tor-cloud-project-closes-its-doors/

 

18) Owen, M. (2007). Fun with onion routing. Network Security, 2007(4), 8-12. http://dx.doi.org/10.1016/s1353-4858(07)70044-2

 

19) Powell, B. (2015). Newsweek.com. Retrieved 12 October 2015, from http://www.newsweek.com/what-expect-when-chinese-president-xi-jinping-visits-obama-374556

 

20) Roger, D. (2006). United States.

 

21) Sherman, C., & Price, G. (2001). The Invisible Web. Medford, N.J.: CyberAge Books.

 

22) Smith, T. (2015). No Conspiracy Theory Needed: Tor Created for U.S. Gov’t Spying. Network World. Retrieved 13 October 2015, from http://www.networkworld.com/article/2228873/microsoft-subnet/no-conspiracy-theory-needed–tor-created-for-u-s–gov-t-spying.html

 

23)The Congressional-Executive Commission on China, Blocking, Filtering, and Monitoring, Retrieved from: http://www.cecc.gov/blocking-filtering-and-monitoring

 

24) The Tor Project, I. (2013). Who uses Tor?. Torproject.org. Retrieved 14 October 2015, from https://www.torproject.org/about/torusers.html.en

 

25) The Tor Project, (2009), Tor partially blocked in China. Retrieved from: https://blog.torproject.org/blog/tor-partially-blocked-china

 

26) The Tor Project, (2010), China blocking Tor: Round Two. Retrieved from:  https://blog.torproject.org/blog/china-blocking-tor-round-two

 

27) Usg.edu,. A Brief History of the Internet. Retrieved 14 October 2015, from http://www.usg.edu/galileo/skills/unit07/internet07_02.phtml

 

28) Winter, P & Crandall J R (2012), The Great Firewall of China: How it Blocks Tor and Why it is Hard to Pinpoint,  Retrieved from: https://www.usenix.org/system/files/login/articles/login1212_winter.pdf

 

29) Winter, P & Lindskog, S (2010), How the Great Firewall of China is Blocking Tor, Free and Open Communications on the Internet, Retrieved from: http://www.cs.kau.se/philwint/pdf/foci2012.pdf

 

30) Zetter, K. (2005). Tor | WIRED. WIRED. Retrieved 15 October 2015, from http://www.wired.com/tag/tor/

 

 

Leave a Reply

Your email address will not be published. Required fields are marked *