PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Utopia Lost – Human Rights in a Digital World

Autorzy
Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
The long progress towards universal human rights is regressing. This regression is pronounced within digital spaces once thought to be potential bulwarks of a new era in human rights. But on the contrary, new technologies have given rise to threats that undermine the autonomy, empathy, and dignity of human beings. Early visions of human rights being strengthened by networked technologies have instead crashed into technological realities which not only fail to advance human rights discourses, but rather serve to actively undermine fundamental human rights in countries around the world. The future of human rights is increasingly threatened by advances that would make George Orwell blush. Omnipresent data collection and algorithmic advances once promising a utopian world of efficiency and connection are deeply interwoven with challenges to anonymity, privacy, and security. This paper examines the impact of technological advances on the regression of human rights in digital spaces. The paper examines the development of human rights through changes in concepts of autonomy, empathy, and dignity, it charts their regression as technologies are used to increasingly prey on these very same characteristics that undergird human rights discourses.
Rocznik
Strony
1--19
Opis fizyczny
Bibliogr. 118 poz.
Twórcy
  • Department of Political Science, Tech4Humanity Lab, Hume Center for National Security and Technology, Virginia Tech, USA
Bibliografia
  • 1. A. Wendt, “Anarchy is what states make of it,” International Organization, vol. 46, no. 2, 1992.
  • 2. M. Finnemore, K. Sikkink, “International norm dynamics and political change,” International Organization, vol. 52, no. 4, pp. 887–917, 2003, doi: 10.1162/002081898550789.
  • 3. D. Ronald, Access contested: Security, identity, and resistance in Asian cyberspace information revolutionand global politics. Cambridge, MA: MIT Press, 2012.
  • 4. R. Deibert, J. Palfrey, R. Rohozinski, J. Zittrain, Access controlled: The shaping of power, rights, and rule incyberspace. Cambridge, MA: MIT Press, 2010.
  • 5. R. Deibert, J. Palfrey, R. Rohozinski, J. Zittrain, Access denied: The practice and policy of global internetfiltering. Cambridge, MA: MIT Press, 2008.
  • 6. A. Brantly, “The Cyber Losers,” Democracy and Security, vol. 10, no. 2, pp. 132–155, 2014, doi:10.1080/17419166.2014.890520.
  • 7. R. MacKinnon, Consent of the networked: The worldwide struggle for Internet freedom. New York, NY: Basic Books, 2012.
  • 8. L. Diamond, “Liberation Technology,” Journal of Democracy, vol. 21, no. 3, pp. 69–83, 2010, doi: 10.1353/jod.0.0190.
  • 9. T. Zeynep, Twitter and tear gas: The power and fragility of networked protest. New Haven, CT: Yale University Press, 2017.
  • 10. A. Brantly, “From cyberspace to independence square: Understanding the impact of social media onphysical protest mobilization during Ukraine’s Euromaidan revolution,” Journal of Information TechnologyPolitics, pp. 1–19, 2019, doi: 10.1080/19331681.2019.1657047.
  • 11. A. Brantly. (2014, Jan. 24). You were identified as a participant in a mass disturbance. [Online]. Available: https://www.nditech.org/you-were-identified-participant-mass-disturbance. [Accessed: Nov. 29, 2022].
  • 12. B. Marczak, J. Scott-Railton. (2016, May 29). Keep calm and (don’t) enable macros: A new threat actortargets uae dissidents - the citizen lab. [Online]. Available: https://citizenlab.ca/2016/05/stealth-falcon/. [Accessed: Nov. 29, 2022].
  • 13. J. Scott-Railton, S. Hardy. (2014, Dec. 18). Malware attacks targeting syrian isis critics. [Online]. Available: http://citizenlab.ca/2014/12/malware-attack-targeting-syrian-isis-critics/. [Accessed: Nov. 29, 2022].
  • 14. R. Deibert, Reset: Reclaiming the Internet for civil society. Toronto, ON: Anansi, 2020.
  • 15. S. Zuboff, The age of surveillance capitalism: the fight for a human future at the new frontier of power,New York: PublicAffairs Press, 2019.
  • 16. H. Lynn, Inventing human rights: A history. New York: W.W. Norton & Company, 2007.
  • 17. R. Dean, The value of humanity in Kant’s moral theory. New York: Oxford University Press, 2006.
  • 18. D. von der Pfordten, “On the dignity of man in Kant,” Philosophy, vol. 84, no. 3, pp. 371–391, 2009, doi:10.1017/s0031819109000370.
  • 19. M. Wollstonecraft, A vindication of the rights of woman. Harmondsworth. UK: Penguin Books, 1975.
  • 20. C. Beccaria, G. Newman, P. Marongiu, On crimes and punishments. New Brunswick, NJ: Transaction Publishers, 2009, doi: 10.4324/9781315125527.
  • 21. Voltaire, S. Harvey, Treatise on tolerance. Cambridge, UK: Cambridge University Press, 2000.
  • 22. E. Weitz, A world divided: the global struggle for human rights in the age of nation-states. Princeton, NJ: Princeton University Press, 2019.
  • 23. H. Arendt, The origins of totalitarianism. New York: Harcourt Brace, 1985.
  • 24. J. Kingdon, Agendas, alternatives, and public policies. New York: Longman, 2003.
  • 25. J. Donnelly, Universal human rights in theory and practice, 3rd ed. Ithaca, NY: Cornell University Press, 2013.
  • 26. United Nations, Universal declaration of human rights. [Online]. Available: https://www.un.org/en/aboutus/universal-declaration-of-human-rights. [Accessed: Mar. 9, 2022].
  • 27. J. Habermas, “The concept of human dignity and the realistic utopia of human rights,” Metaphilosophy, vol. 41, no. 4, 2010.
  • 28. A. Moravcsik, “Explaining international human rights regimes: Liberal theory and Western Europe,”European Journal of International Relations, vol. 1, no. 2, pp. 157–189, 1995.
  • 29. T. Solomon, “Norms and human rights in international relations,” Political Studies Review, vol. 4, no. 1, pp. 36–47, 2005, doi: 10.1111/j.1478-9299.2006.00038.x.
  • 30. M. Caprioli, P. F. Trumbore, “Human rights rogues in interstate disputes, 1980–2001,” Journal of Peace Research, vol. 43, no. 2, pp. 131–148, 2006, doi: 10.1177/0022343306061356.
  • 31. E. Neumayer, “Do international human rights treaties improve respect for human rights?,” Journal ofConflict Resolution, vol. 49, no. 6, pp. 925–953, 2005, doi: 10.1177/0022002705281667.
  • 32. K. Sikkink, “Human rights, principled issue-networks, and sovereignty in Latin America,” International Organization, vol. 47, no. 3, pp. 411–441, 1993, doi: 10.1017/s0020818300028010.
  • 33. B. Simmons, Mobilizing for human rights: international law in domestic politics. Cambridge, UK: Cambridge University Press, 2009.
  • 34. J. Abbate, Inventing the Internet. Cambridge, MA: MIT Press, 2000.
  • 35. K. Hafner, M. Lyon, Where wizards stay up late: The origins of the Internet. Simon & Schuster, 1996.
  • 36. P. Baran. (1962). On distributed communications networks. [Online]. Available: https://pages.cs.wisc.edu/~akella/CS740/F08/740-Papers/Bar64.pdf. [Accessed: Nov. 29, 2022].
  • 37. F. Heart. (1970). Interface message processors for the ARPA computer network. [Online]. Available:https://apps.dtic.mil/sti/pdfs/AD0709621.pdf. [Accessed: Nov. 29, 2022].
  • 38. V. G. Cerf, R. E. Kahn, “A protocol for packet network intercommunication,” Data Communications of theIEEE Communications Society, p. 1–13, 1974.
  • 39. L. DeNardis, Protocol politics: the globalization of Internet governance. Cambridge, MA: MIT Press, 2009.
  • 40. A. Brantly, “A holistic approach to the encryption debate,” in Cyber insecurity: navigating the perils of thenext information age, T. Herr, R. Harrison, Eds. Lanham, Maryland: Rowman & Littlefield, 2016.
  • 41. D. Kehl, A. Wilson, K. Bankston. (2015). Doomed to repeat history? Lessons from the Crypto Wars ofthe 1990s, Open Technology Institute. [Online]. Available: https://static.newamerica.org/attachments/3407-doomed-to-repeat-history-lessons-from-the-crypto-wars-of-the-1990s/Crypto%20Wars_ReDo.7cb491837ac541709797bdf868d37f52.pdf. [Accessed: Nov. 29, 2022].
  • 42. A. F. Brantly, “Conceptualizing cyber policy through complexity theory,” Journal of Cyber Policy, pp. 1–15, 2019, doi: 10.1080/23738871.2019.1583763.
  • 43. S. K. Pell, “You can’t always get what you want: How will law enforcement get what it needs in a Post-CALEA, cybersecurity-centric encryption era?,” North Carolina Journal of Law and Technology, vol. 17, no. 4, pp. 599–643, 2016.
  • 44. H. Klein, “ICANN and internet governance: leveraging technical coordination to realize global publicpolicy,” Information Soc, vol. 18, no. 3, pp. 193–207, 2011, doi: 10.1080/01972240290074959.
  • 45. J. P. Barlow. (1996). A declaration of the independence of cyberspace, Electronic Frontier Foundation.[Online]. Available: https://www.eff.org/cyberspace-independence. [Accessed: Aug. 30, 2021].
  • 46. M. Webb, C. Doctorow. (2020). Coding democracy: how hackers are disrupting power, surveillance, andauthoritarianism. [Online]. Available: https://img1.od-cdn.com/ImageType-100/0111-1/{024C8725-D290-45E4-944F-0057B65CFB00}Img100.jpg. [Accessed: Nov. 29, 2022].
  • 47. J. Menn, Cult of the Dead Cow: How the original hacking supergroup might just save the world. NewYork: PublicAffairs, 2019.
  • 48. H. Abelson, R. Anderson. S.M. Bellovin, J. Benaloh, M. Blaze, W. Diffie, J. Gilmore, M. Green, S. Landau,P.G. Neumann, R.L. Rivest, J.I. Schiller, B. Schneier, M. Specter, D.J. Weitzner, “Keys under doormats: mandating in security by requiring government access to all data and communications,” Journal of Cybersecurity, vol. 44, no. 1, p. tyv009–11, 2015, doi: 10.1093/cybsec/tyv009.
  • 49. W. Diffie, S. Landau, Privacy on the line, updated and expanded edition. Cambridge, MA: MIT Press, 2007.
  • 50. M. L. Mueller, Networks and states: The global politics of internet governance. Cambridge, MA: MIT Press, 2013.
  • 51. L. Denardis, The global war for Internet governance. New Haven, CT: Yale University Press, 2014.
  • 52. A. Greenberg, This machine kills secrets: How WikiLeakers, cypherpunks and hacktivists aim to free theworld’s information. New York: Dutton, 2012.
  • 53. J. Zittrain, The future of the Internet and how to stop it. New Haven, London: Yale University Press, 2008.
  • 54. C. Shirky, Here comes everybody: The power of organizing without organizations. New York: PenguinPress, 2008.
  • 55. H. R. Clinton. (2011, Feb. 15). Remarks on Internet freedom. [Online]. Available: https://www.eff.org/files/filenode/clinton_internet_rights_wrongs_20110215.pdf. [Accessed: Nov. 29, 2022].
  • 56. BBC News. (2014, Jan. 17). Edward Snowden: Leaks that exposed US spy. [Online]. Available: http://www.bbc.com/news/world-us-canada-23123964. [Accessed: Nov. 29, 2022].
  • 57. G. Greenwald. (2014). No place to hide: Edward Snowden, the NSA, and the US surveillance state. [Online]. Available: http://www.glenngreenwald.net/. [Accessed: Nov. 29, 2022].
  • 58. E. Morozov, The net delusion: The dark side of internet freedom. New York: Public Affairs, 2011.
  • 59. P. N. Howard, S. D. Agarwal, M. M. Hussain, “When do states disconnect their digital networks? Regimeresponses to the political uses of social media,” The Communication Review, vol. 14, no. 3, pp. 216–232, 2011, doi: 10.1080/10714421.2011.597254.
  • 60. M. M. Hussain, P. N. Howard, “What best explains successful protest cascades? ICTs and the fuzzy causesof the arab spring,” International Studies Review, vol. 15, no. 1, pp. 48–66, 2013, doi: 10.1111/misr.12020.
  • 61. Y. Benkler, The wealth of networks: how social production transforms markets and freedom. New Haven, CT: Yale University Press, 2006.
  • 62. J. Scott-Railton, B. Marczak, S. Anstis, B. A. Razzak, M. Crete-Nishihata, R. Deibert. (2018). RECKLESS VI: Mexican journalists investigating cartels targeted with nso spyware following assassination of colleague, TheCitizen Lab. [Online]. Available: https://tspace.library.utoronto.ca/bitstream/1807/96737/1/Report%23116--Reckless%20VI.pdf. [Accessed: Nov. 29, 2022].
  • 63. B. Marczak, A. Abdulemam, N. Al-Jizawi, S. A. Berdan, J. Scott-Railton, R. Deibert. (2021, Aug. 24). From Pearl to Pegasus Bahraini government hacks activists with NSO Group Zero-Click iPhone exploits, TheCitizen Lab. [Online]. Available: https://citizenlab.ca/2021/08/bahrain-hacks-activists-with-nso-group-zeroclick-iphoneexploits/. [Accessed: Aug. 30, 2022].
  • 64. K. Zetter. (2021, July 22). The NSO ‘surveillance list’: What it is and isn’t, Zero Day. [Online]. Available:https://zetter.substack.com/p/the-nso-surveillance-list-what-it [Accessed: Aug. 30, 2022].
  • 65. P. Tucker, The naked future: What happens in a world that anticipates your every move. New York: Current, 2014.
  • 66. S. J. Shackelford, Internet of things. New York: Oxford University Press, 2020.
  • 67. J. Lukito, “Coordinating a multi-platform disinformation campaign: Internet research agency activity onthree US social media platforms, 2015 to 2017,” Political Communication, vol. 37, no. 2, pp. 1–18, 2019, doi: 10.1080/10584609.2019.1661889.
  • 68. P. N. Howard, M. M. Hussain, “The role of digital media,” Journal of Democracy, vol. 22, no. 3, pp. 35–48,2011, doi: 10.1353/jod.2011.0041.
  • 69. K. C. Desouza, A. Ahmad, H. Naseer, M. Sharma, “Weaponizing information systems for politicaldisruption: The actor, lever, effects, and response taxonomy (ALERT),” Computers and Security, vol. 88, p. 101606, 2019, doi: 10.1016/j.cose.2019.101606.
  • 70. T. Lehtiniemi, “Personal data spaces: An intervention in surveillance capitalism?” Surveillance & Society, vol. 15, no. 5, pp. 626–639, 2017, doi: 10.24908/ss.v15i5.6424.
  • 71. M. Zajc, “The social media dispositive and monetization of user-generated content,” Information Society, vol. 31, no. 1, pp. 61–67, 2014, doi: 10.1080/01972243.2015.977636.
  • 72. S. Brewster et al., “Social media as a passive sensor in longitudinal studies of human behavior andwellbeing,” CHI ‘19: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, pp. 1–8, 2019, doi: 10.1145/3290607.3299065.
  • 73. A. Bogomolov, B. Lepri, J. Staiano, N. Oliver, F. Pianesi, A. Pentland, “Once upon a crime: Towards crimeprediction from demographics and mobile data,” Arxiv, 2014, doi: 10.48550/arXiv.1409.2983.
  • 74. R. Bolla, F. Davoli, “Road traffic estimation from location tracking data in the mobile cellular network,” vol. 3, pp. 1107–1112, 2000, doi: 10.1109/wcnc.2000.904783.
  • 75. D. Oosterlinck, D. F. Benoit, P. Baecke, N. V. de Weghe, “Bluetooth tracking of humans in an indoorenvironment: An application to shopping mall visits,” Applied Geography, vol. 78, pp. 55–65, 2017, doi: 10.1016/j.apgeog.2016.11.005.
  • 76. S. Abdelhamid, H. S. Hassanein, G. Takahara, “Vehicle as a mobile sensor,” Procedia Computer Science, vol. 34, pp. 286–295, 2014, doi: 10.1016/j.procs.2014.07.025.
  • 77. S. Feldstein, The rise of digital repression: How technology is reshaping power, politics, and resistance. New York: Oxford University Press, 2021.
  • 78. T. M. Payton, T. Claypoole, Privacy in the age of big data: recognizing threats, defending your rights, andprotecting your family. Lanham, MD: Rowman & Littlefield, 2014.
  • 79. A. Hern. (2018, Apr. 17). Facebook admits tracking users and non-users off-site, The Guardian. [Online]. Available: https://www.theguardian.com/technology/2018/apr/17/facebook-admits-tracking-users-andnon-users-off-site. [Accessed: Mar. 14, 2022].
  • 80. X. Qiang, “The road to digital unfreedom: President Xi’s surveillance state,” Journal of Democracy, vol. 30, no. 1, pp. 53–67, 2019, doi: 10.1353/jod.2019.0004.
  • 81. C. Pope, “Biometric data collection in an unprotected world exploring the need for federal legislation,”Journal of Law and Policy, vol. 26, no. 2, pp. 769–803, 2018.
  • 82. G. King, J. Pan, M. E. Roberts, “How censorship in China allows government criticism but silencescollective expression,” American Political Science Review, vol. 107, no. May, p. 326–343, 2012, doi: 10.1017/s0003055413000014.
  • 83. S. González-Bailón, J. Borge-Holthoefer, A. Rivero, Y. Moreno, “The Dynamics of Protest Recruitmentthrough an online network,” Scientific Reports, vol. 1, no. 1, p. 197, 2011, doi: 10.1038/srep00197.
  • 84. K. Hylton, Y. Levy, L. P. Dringus, “Utilizing webcam-based proctoring to deter misconduct in onlineexams,” Computers & Education, vol. 92, pp. 53–63, 2016, doi: 10.1016/j.compedu.2015.10.002.
  • 85. G. A. Teixeira, M. M. da Silva, R. Pereira, “The critical success factors of GDPR implementation:a systematic literature review,” Digital Policy Regulation and Governance, vol. 21, no. 4, pp. 402–418, 2019, doi: 10.1108/dprg-01-2019-0007.
  • 86. W. L. Youmans, J. C. York, “Social media and the activist toolkit: User agreements, corporate interests,and the information infrastructure of modern social movements,” Journal of Communication, vol. 62, no. 2, pp. 315–329, 2012, doi: 10.1111/j.1460-2466.2012.01636.x.
  • 87. E. P. Robinson, Y. Zhu, “Beyond ‘I agree’: Users’ understanding of web site terms of service,” Social Media+Society, vol. 6, no. 1, 2020, doi: 10.1177/2056305119897321.
  • 88. D. Hunter, N. Evans, “Facebook emotional contagion experiment controversy,” Research Ethics, vol. 12, no. 1, pp. 2–3, 2016, doi: 10.1177/1747016115626341.
  • 89. P. Gerbaudo, F. Marogna, C. Alzetta, “When ‘positive posting’ attracts voters: User engagement andemotions in the 2017 UK election campaign on facebook,” Social Media + Society, vol. 5, no. 4, 2019, doi: 10.1177/2056305119881695.
  • 90. A. G. Shu-Sha, H. Sophia, C. Jennifer, R. Andrea, “Social media use and empathy: A mini meta-analysis,”Social Networking, vol. 8, no. 4, pp. 147–157, 2019, doi: 10.4236/sn.2019.84010.
  • 91. L. V. Bryant, “The youtube algorithm and the alt-right filter bubble,” Open Information Science, vol. 4, no. 1, pp. 85–90, 2020, doi: 10.1515/opis-2020-0007.
  • 92. A. J. Flanagin, C. Flanagin, J. Flanagin, “Technical code and the social construction of the internet,” NewMedia & Society, vol. 12, no. 2, pp. 179–196, 2010, doi: 10.1177/1461444809341391.
  • 93. S. U. Noble, “Algorithms of oppression: How search engines reinforce racism”, NYU Press, pp. 119–133,2018, doi: 10.2307/j.ctt1pwt9w5.8.
  • 94. M. Hildebrandt et al., “Mitigating bias in algorithmic hiring,” Proceedings of the 2020 Conference onFairness, Accountability and Transparency, pp. 469–481, 2020, doi: 10.1145/3351095.3372828.
  • 95. M. Oluwasanmi, “Algorithms and the border: The human rights implications of automated decisionsystems in Canadian immigration,” Federalism-E, vol. 22, no. 1, 2021.
  • 96. J. Gerards, “The fundamental rights challenges of algorithms,” Netherlands Quarterly of Human Rights, vol. 37, no. 3, pp. 205–209, 2019, doi: 10.1177/0924051919861773.
  • 97. L. McGregor, D. Murray, V. Ng, “International human rights law as a framework for algorithmicaccountability,” International and Comparative Law Quarterly, vol. 68, no. 2, pp. 309–343, 2019, doi: 10.1017/s0020589319000046.
  • 98. J. S. Hiller, G. Berger-Walliser, A. F. Brantly, “Critical protection for the network of persons,” Journal of Law and Social Change, vol. 25, no. 2, pp. 117–152, 2021.
  • 99. C. W. Fitzgerald, A. F. Brantly, “Subverting reality: The role of propaganda in 21st century intelligence,”International Journal of Intelligence and Counter intelligence, vol. 30, no. 2, pp. 215–240, 2017, doi: 10.1080/08850607.2017.1263528.
  • 100. G. Bolsover, P. Howard, “Computational propaganda and political big data: Moving toward a morecritical research agenda,” Big Data, vol. 5, no. 4, pp. 273–276, 2017, doi: 10.1089/big.2017.29024.cpr.
  • 101. P. N. Howard, S. Woolley, R. Calo, “Algorithms, bots, and political communication in the US 2016 election: The challenge of automated political communication for election law and administration,” Journal ofInformation Technology and Politics, vol. 15, no. 2, pp. 1–13, 2018, doi: 10.1080/19331681.2018.1448735.
  • 102. R. S. Baker, A. Hawn, “Algorithmic bias in education,” International Journal of Artificial Intelligence inEducation, 2021, doi: 10.1007/s40593-021-00285-9.
  • 103. T. Panch, H. Mattie, R. Atun, “Artificial intelligence and algorithmic bias: Implications for health systems,”Journal of Global Health, vol. 9, no. 2, 2019, doi: 10.7189/jogh.09.020318.
  • 104. A. Brantly, N. D. Brantly, “Patient-centric cybersecurity,” Journal of Cyber Policy, vol. 5, no. 3, pp. 1–20, 2020, doi: 10.1080/23738871.2020.1856902.
  • 105. A. Završnik, “Algorithmic justice: Algorithms and big data in criminal justice settings,” European Journalof Criminology, vol. 18, no. 5, pp. 623–642, 2021, doi: 10.1177/1477370819876762.
  • 106. K. O’Hara and W. Hall, Four internets: Data, geopolitics, and the governance of cyberspace. New York: Oxford University Press, 2021.
  • 107. M. Milton, Will the Internet fragment?: Sovereignty, globalization and cyberspace. Cambridge: Polity Press, 2017.
  • 108. C. Baxter, O. Tkacheva, M. C. Libicki, L. H. Schwartz, J. E. Taylor, J. Martini, Internet freedom and politicalspace. Santa Monica, CA: The RAND Corporation, 2013.
  • 109. M. E. Roberts, Censored: Distraction and diversion inside China’s great firewall. Princeton, NJ: Princeton University Press, 2018.
  • 110. V. Carty, Social movements and new technology. New York and London: Routledge, 2015.
  • 111. M. Joyce, Ed., Digital activism decoded: The new mechanics of change. New York: International Debate Education Association, 2010.
  • 112. B. Rolfe, “Building an electronic repertoire of contention,” Social Movement Studies, vol. 4, no. 1, pp. 65–74, 2005, doi: 10.1080/14742830500051945.
  • 113. R. Rohrschneider, R. Dalton, “A global network? Transnational cooperation among environmentalgroups,” The Journal of Politics, vol. 64, no. 2, pp. 510–533, 2002.
  • 114. S. H. Kamel, “Egypt’s ongoing uprising and the role of social media: Is there development?” InformationTechnology for Development, vol. 20, no. 1, p. 78–91, 2014, doi: 10.1080/02681102.2013.840948.
  • 115. A. Karatzogianni, Cyber conflict and global politics. Abingdon, Oxon: Routledge, 2009, doi: 10.4324/9780203890769.
  • 116. V. P. Shannon, “Norms are what states make of them: The political psychology of norm violation,”International Studies Quarterly, vol. 44, pp. 293–316, 2000.
  • 117. S. Moyn, Not enough human rights in an unequal world. Cambridge, MA: Harvard University Press, 2018.
  • 118. N. Nanjala, Digital democracy, analogue politics: How the internet era is transforming Kenya. London, UK: Zed Books LTD, 2018.
Uwagi
Opracowanie rekordu ze środków MEiN, umowa nr SONP/SP/546092/2022 w ramach programu "Społeczna odpowiedzialność nauki" - moduł: Popularyzacja nauki i promocja sportu (2022-2023).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-e0830d58-bb21-42a0-835b-fff0b2fe70e1
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.