Franklin (2004). Chapter 6 (The Real World Of Technology).

“… if somebody robs a store, it’s a crime and the state is all set and ready to nab the criminal. But if somebody steals from the commons and from the future, it’s seen as entrepreneurial activity and the state cheers and gives them tax concessions rather than arresting them.” (p 123)

See this page at https://kinasevych.ca/index.php

Morris (2016). An Example of Excellence: Chickasaw Language Revitalization through Technology.

“Indeed, through this article, in the Western academic sense, we see technology, adaption and adoption, synthesis and innovation by the Chickasaw Nation. But those from Native communities, including this author, see self-determination in praxis. Language is a matter of cultural survival.” (p 302)

See this page at https://kinasevych.ca/index.php

Snyder (2018). Cybercolony USA.

“And that’s what I mean, by the way, by being cyber-colonized. That things that are happening out in a world where no one cares about you are, in fact, affecting the things that you care about and the people that you care about.”

See this page at https://kinasevych.ca/index.php

Canadian Press. (2018). Can U.S. border guards search your phone? Yes, and here are some details on how.

“Agents can demand a password to open your phone, without probable cause, Nielsen confirmed during the hearing. However, Electronic Frontier Foundation (EFF) staff attorney Sophia Cope says the directive, which she calls confusing, also allows you to refuse to do so. That, of course, is not without its consequences she says in a statement to CBC News. Your device could be seized or detained. The border agent could delay your travel or even deny entry if you are not a U.S. citizen.” (¶ 9)

See this page at https://kinasevych.ca/index.php

Kemper (2016). Cultural Hybridity, Resilience and the Communication of Contemporary Cherokee Culture through Mobile Technologies. (Indigenous People and Mobile Technologies.)

“Since adaptability is inevitable, the original culture makes the best of things, as we will see in the example of the Cherokee and mobile technologies.” (p 243)

See this page at https://kinasevych.ca/index.php

Lanchester (2017). You Are the Product.

“In the open air, fake news can be debated and exposed; on Facebook, if you aren’t a member of the community being served the lies, you’re quite likely never to know that they are in circulation. It’s crucial to this that Facebook has no financial interest in telling the truth. No company better exemplifies the internet-age dictum that if the product is free, you are the product. … If your only interest is in connecting people, why would you care about falsehoods? They might even be better than the truth, since they are quicker to identify the like-minded.” (¶14)

See this page at https://kinasevych.ca/index.php

Cadwalladr (2017). The great British Brexit robbery: How our democracy was hijacked.

“And it was Facebook that made it possible. It was from Facebook that Cambridge Analytica obtained its vast dataset in the first place. Earlier, psychologists at Cambridge University harvested Facebook data (legally) for research purposes and published pioneering peer-reviewed work about determining personality traits, political partisanship, sexuality and much more from people’s Facebook ‘likes’.” (¶41)

See this page at https://kinasevych.ca/index.php