Home

My bibliography on Zotero:

Pacheco, J. M., Vasconcelos, V. V., Santos, F. C., & Skyrms, B. (2015). Co-evolutionary Dynamics of Collective Action with Signaling for a Quorum. PLOS Computational Biology, 11(2), e1004101. doi:10.1371/journal.pcbi.1004101
List of ancient legal codes. (2015, January 24). In Wikipedia, the free encyclopedia. Retrieved from https://en.wikipedia.org/w/index.php?title=List_of_ancient_legal_codes&oldid=643957751
Elazar, D. J. (1992). Deuteronomy as Israel’s Ancient Constitution: Some Preliminary Reflections. Jewish Political Studies Review, 3–39.
Bostrom, N. (n.d.). A Primer on the Doomsday Argument. Retrieved February 28, 2015, from http://www.anthropic-principle.com/?q=anthropic_principle/doomsday_argument
Mathews, J. T. (2015, March 19). The Road from Westphalia. The New York Review of Books. Retrieved from http://www.nybooks.com/articles/archives/2015/mar/19/road-from-westphalia/
Betterific | Welcome to Betterific. (n.d.). Retrieved February 27, 2015, from https://betterific.com/
BERREBY, D. (n.d.). Yes, You’re Irrational, and Yes, That’s OK. Retrieved February 27, 2015, from http://nautil.us/issue/21/information/yes-youre-irrational-and-yes-thats-ok
Peterson, J. (n.d.). A Decentralized Lie Detector. Retrieved February 27, 2015, from http://www.augur.net/blog/a-decentralized-lie-detector
Worstall, T. (n.d.). Jeremy Rifkin’s Very Strange Idea About The Danger To Capitalism.
Rifkin, J. (2015, February 25). Implications of The Third Industrial Revolution. Retrieved from http://www.theeuropean-magazine.com/jeremy-rifkin--2/9652-implications-of-the-third-industrial-revolution
Lanchester, J. (2015, March 5). The Robots Are Coming. London Review of Books, pp. 3–8. Retrieved from http://www.lrb.co.uk/v37/n05/john-lanchester/the-robots-are-coming
the cluetrain manifesto - 95 theses. (n.d.). Retrieved February 25, 2015, from http://www.cluetrain.com/book/95-theses.html
Stross, C. (n.d.). A different cluetrain. Retrieved February 25, 2015, from http://www.antipope.org/charlie/blog-static/2015/02/a-different-cluetrain.html
Schneier, B. (n.d.). It’s Time to Break Up the NSA. Retrieved February 25, 2015, from https://www.schneier.com/essays/archives/2014/02/its_time_to_break_up.html
Kerry, J. (2015, February 19). Kerry on Action Agenda to Counter Violent Extremism [Transcript]. Retrieved February 25, 2015, from http://iipdigital.usembassy.gov/st/english/texttrans/2015/02/20150219313678.html
István Eörsi. (n.d.). Megpróbálok udvarias lenni. Retrieved February 25, 2015, from http://www.es.hu/eorsi_istvan;megprobalok_udvarias_lenni;2005-08-21.html
Weinberg, G. (n.d.). Privacy is at a crossroads. Choose wisely. Retrieved February 24, 2015, from https://medium.com/@yegg/privacy-is-at-a-crossroads-choose-wisely-96bac0644ec1
Kamdar, A., Nazer, D., & Ranieri, V. (2015). Defend Innovation: How to Fix Our Broken Patent System.
György Spiró. (n.d.). „Le volt ez zsírozva” – Spiró György a rendszerváltásról. Retrieved from http://hvg.hu/kultura/20150224_Le_volt_ez_zsirozva__Spiro_Gyorgy_a_re
Casciani, D. (2005, January 21). Are we subjects or citizens? BBC. Retrieved from http://news.bbc.co.uk/2/hi/uk_news/magazine/4191613.stm
Epps, G. (2012, September 49). Voting: Right or Privilege? Retrieved February 22, 2015, from http://www.theatlantic.com/national/archive/2012/09/voting-right-or-privilege/262511/
Van Alstyne, W. W. (1968). The demise of the right-privilege distinction in constitutional law. Harvard Law Review, 1439–1464.
Kálmán C., G. (n.d.). Az Emmi szótára 2. Retrieved February 21, 2015, from http://magyarnarancs.hu/elso_valtozat/az-emmi-szotara-2-93856
Why the Euro will ultimately fail. (n.d.). Retrieved February 21, 2015, from http://www.maximise.dk/why-the-euro-will-ultimately-fail/
IPFS is a new peer-to-peer hypermedia protocol. (n.d.). Retrieved February 21, 2015, from http://ipfs.io
admin. (n.d.). rescueforensics.com. Retrieved February 21, 2015, from http://www.rescueforensics.com/
National Security Strategy. (2015).
Wolchover, N. (n.d.). In Fake Universes, Evidence for String Theory. Retrieved February 20, 2015, from https://www.quantamagazine.org/20150218-string-theory-only-game-in-town/
Szótár: Az ágazati kommunikáció ajánlott és nem használható elemei. (2015).
Mannino, A. (n.d.). Anti-Epistemology. Retrieved February 19, 2015, from http://crucialconsiderations.org/rationality/anti-epistemology/
EFF to Supreme Court: The Fourth Amendment Covers DNA Collection. (n.d.). Retrieved February 19, 2015, from https://www.eff.org/press/releases/eff-supreme-court-fourth-amendment-covers-dna-collection
Constitute. (n.d.). Retrieved February 18, 2015, from https://www.constituteproject.org/
Kessler, S. (n.d.). The Gig Economy Won’t Last Because It's Being Sued To Death. Retrieved February 17, 2015, from http://www.fastcompany.com/3042248/the-gig-economy-wont-last-because-its-being-sued-to-death
Streithorst, T. (n.d.). Why the World’s Biggest Military Keeps Losing Wars. Retrieved February 17, 2015, from http://www.pieria.co.uk/articles/why_the_worlds_biggest_military_keeps_losing_wars
Scudellari, M. (n.d.). Worried Sick. Retrieved February 17, 2015, from http://www.the-scientist.com/?articles.view/articleNo/36126/title/Worried-Sick/
Lefkowitz, J. A. (n.d.). How winners win: John Boyd and the four qualities of victorious organizations. Retrieved February 17, 2015, from http://jasonlefkowitz.net/2013/03/how-winners-win-john-boyd-and-the-four-qualities-of-victorious-organizations/
Boyd, J. R., Richards, C. W., Spinney, F. C., & Richards, G. G. (1986). Patterns of conflict. Defense and the National Interest.
Wood, G. (n.d.). What ISIS Really Wants. Retrieved February 17, 2015, from http://www.theatlantic.com/features/archive/2015/02/what-isis-really-wants/384980/
Звериный оскал патриотизма. (2015). Retrieved from https://www.youtube.com/watch?v=n8moLsg_eT8&feature=youtube_gdata_player
Altman, S. (n.d.). The Software Revolution. Retrieved February 17, 2015, from http://blog.samaltman.com/the-software-revolution
Barker, P. (2014). The Creed of Illiberal Constitutionalism: Discursive Patterns of Inclusion and Exclusion in the Hungarian Fundamental Law.
Hainmueller, J., Hangartner, D., & Yamamoto, T. (2015). Validating vignette and conjoint survey experiments against real-world behavior. Proceedings of the National Academy of Sciences, 201416587. doi:10.1073/pnas.1416587112
Storr, W. (n.d.). The Man Who Destroyed America’s Ego. Retrieved February 15, 2015, from https://medium.com/matter/the-man-who-destroyed-americas-ego-94d214257b5
Romm, C. (2015, January 23). Rethinking One of Psychology’s Most Infamous Experiments. Retrieved February 14, 2015, from http://www.theatlantic.com/health/archive/2015/01/rethinking-one-of-psychologys-most-infamous-experiments/384913/
Moyn, S. (n.d.). Did Christianity Create Liberalism? Retrieved February 14, 2015, from https://bostonreview.net/books-ideas/samuel-moyn-larry-siedentop-christianity-liberalism-history
Rushe, D. (n.d.). Apple CEO Tim Cook challenges Obama with impassioned stand on privacy. Retrieved February 14, 2015, from http://www.theguardian.com/technology/2015/feb/13/apple-ceo-tim-cook-challenges-obama-privacy
De Cock, C. (n.d.). Europe: Now is the time to fix copyright! Retrieved February 14, 2015, from http://j.mp/1vpSs7k
Callaway, E. (n.d.). European languages linked to migration from the east. Retrieved February 13, 2015, from http://www.nature.com/news/european-languages-linked-to-migration-from-the-east-1.16919
Backdoor in a Public RSA Key. (n.d.). Retrieved February 13, 2015, from http://kukuruku.co/hub/infosec/backdoor-in-a-public-rsa-key
Superrationality. (n.d.). Retrieved February 13, 2015, from https://en.wikipedia.org/wiki/Superrationality
Hilbe, C., Röhl, T., & Milinski, M. (2014). Extortion subdues human players but is finally punished in the prisoner’s dilemma. Nature Communications, 5. doi:10.1038/ncomms4976
Stewart, A. J., & Plotkin, J. B. (2013). From extortion to generosity, evolution in the Iterated Prisoner’s Dilemma. Proceedings of the National Academy of Sciences, 110(38), 15348–15353. doi:10.1073/pnas.1306246110
Singer, E. (n.d.). Game Theory Calls Cooperation Into Question. Retrieved February 13, 2015, from https://www.quantamagazine.org/20150212-game-theory-calls-cooperation-into-question/
Multicellular organism. (n.d.). Retrieved February 13, 2015, from https://en.wikipedia.org/wiki/Multicellular_organism
Stewart, A. J., & Plotkin, J. B. (2014). The evolution of robust strategies in iterated multi-player games. arXiv Preprint arXiv:1407.1022.
Stewart, A. J., & Plotkin, J. B. (2014). Collapse of cooperation in evolving games. Proceedings of the National Academy of Sciences of the United States of America, 111(49), 17558–17563. doi:10.1073/pnas.1408618111
Press, W. H., & Dyson, F. J. (2012). Iterated Prisoner’s Dilemma contains strategies that dominate any evolutionary opponent. Proceedings of the National Academy of Sciences of the United States of America, 109(26), 10409–10413. doi:10.1073/pnas.1206569109
Powell, D. (n.d.). Brains Make Decisions the Way Alan Turing Cracked Codes. Retrieved February 12, 2015, from http://www.smithsonianmag.com/science-nature/brains-make-decisions-way-alan-turing-cracked-codes-180954212/
Lightweight Directory Access Protocol. (n.d.). Retrieved February 12, 2015, from https://en.wikipedia.org/wiki/Lightweight_Directory_Access_Protocol
Foxpass. (n.d.). Retrieved February 12, 2015, from https://www.foxpass.com/
Chu-Carroll, M. (n.d.). Paxos, a really beautiful protocol for distributed consensus. Retrieved February 12, 2015, from http://www.goodmath.org/blog/2015/01/30/paxos-a-really-beautiful-protocol-for-distributed-consensus/
Brignull, H. (n.d.). Dark Patterns: inside the interfaces designed to trick you. Retrieved February 12, 2015, from http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you
Metzger, P. T., Muscatello, A., Mueller, R. P., & Mantovani, J. (2013). Affordable, Rapid Bootstrapping of the Space Industry and Solar System Civilization. Journal of Aerospace Engineering, 26(1), 18–29. doi:10.1061/(ASCE)AS.1943-5525.0000236
Haddow, D. (n.d.). DATAcide: The Total Annihilation of Life as We Know It. Retrieved February 11, 2015, from https://www.adbusters.org/magazine/115/datacide-total-annihilation-life-we-know-it.html
Differential privacy. (2015, February 6). In Wikipedia, the free encyclopedia. Retrieved from https://en.wikipedia.org/w/index.php?title=Differential_privacy&oldid=645947121
Shapiro, J. (n.d.). It’s hard for me to talk or even think about US drone strikes without becoming very emotional very quickly. Retrieved February 10, 2015, from https://www.facebook.com/groups/144017955332/permalink/10155127404470333/
Rodrigues, B. (n.d.). w00tsec: Firmware Forensics: Diffs, Timelines, ELFs and Backdoors. Retrieved February 10, 2015, from http://w00tsec.blogspot.co.uk/2015/02/firmware-forensics-diffs-timelines-elfs.html
firmware · ǝɹ - Free Online Firmware Unpacker, Scanner, Analyser - Firmware Genomics/Genome Project - Firmware Vulnerability and Backdoor Discovery - Firmware Mounting, Modification, Loading and Emulation - Embedded and Internet-of-Things Security. (n.d.). Retrieved February 10, 2015, from http://firmware.re/
Burnett, M. (n.d.). Today I Am Releasing Ten Million Passwords. Retrieved February 10, 2015, from https://xato.net/passwords/ten-million-passwords/
Burnett, M. (n.d.). Is Mozilla’s Persona the Authentication System That We’ve All Been Waiting For? Probably Not. Retrieved February 10, 2015, from https://xato.net/passwords/mozillas-persona-authentication/
Walsh, C. (n.d.). Why it’s brave to think like a coward. Retrieved February 10, 2015, from http://aeon.co/magazine/philosophy/is-cowardice-a-form-of-bravery/
Heath, B. (n.d.). New police radars can “see” inside homes. Retrieved February 9, 2015, from http://www.usatoday.com/story/news/2015/01/19/police-radar-see-through-walls/22007615/
Harman, O. (2015, February 9). The Altruism Game. The Chronicle of Higher Education. Retrieved from https://chronicle.com/article/The-Altruism-Game/151625
Applebaum, A. (2015, February 8). The long view with Russia. The Washington Post. Retrieved from http://www.washingtonpost.com/opinions/the-long-view-with-russia/2015/02/08/cdd7a6a4-aee8-11e4-abe8-e1ef60ca26de_story.html
Körösi, I. (n.d.). Szerelem nélkül könnyebb. Retrieved February 9, 2015, from http://nol.hu/kultura/szerelem-nelkul-konnyebb-1514603
Vitali, S., Glattfelder, J. B., & Battiston, S. (2011). The network of global corporate control. PloS One, 6(10), e25995.
Wheeler, D. A. (n.d.). Fully Countering Trusting Trust through Diverse Double-Compiling (DDC) - Countering Trojan Horse attacks on Compilers. Retrieved February 9, 2015, from http://www.dwheeler.com/trusting-trust/
Thompson, K. (1984). Reflections on trusting trust. Communications of the ACM, 27(8), 761–763.
The Iron Law Of Evaluation And Other Metallic Rules. (2012, September 18). Retrieved February 9, 2015, from http://www.gwern.net/docs/1987-rossi
Frieden, J. A. (2012). After the fall the future of global cooperation. Geneva; London: International Center for Monetary and Banking Studies (ICMB) ; Centre for Economic Policy Research. Retrieved from http://site.ebrary.com/lib/ucmerced/Doc?id=10676152
Klein, M. C. (n.d.). Michael Pettis explains the euro crisis (and a lot of other things, too). Retrieved February 8, 2015, from http://ftalphaville.ft.com/2015/02/06/2113951/michael-pettis-explains-the-euro-crisis-and-a-lot-of-other-things-too/
Pettis, M. (n.d.). Syriza and the French indemnity of 1871-73. Retrieved February 8, 2015, from http://blog.mpettis.com/2015/02/syriza-and-the-french-indemnity-of-1871-73/
Bonica, A. (2014). Mapping the ideological marketplace. American Journal of Political Science, 58(2), 367–386.
Breyha, W., Durvaux, D., Dussa, T., Kaplan, L. A., Mendel, F., Mock, C., … others. (2014). Applied Crypto Hardening.
Tu, Y., & Soman, D. (2014). The Categorization of Time and Its Impact on Task Initiation. Journal of Consumer Research, 41(3), 810–822. doi:10.1086/677840
Viewpoint: Would Athenian-style democracy work in the UK today? (n.d.). Retrieved February 7, 2015, from http://www.bbc.com/news/magazine-30846162
Jónsdóttir, B. (n.d.). Democracy in the digital era. Retrieved February 7, 2015, from http://newint.org/features/2015/01/01/democracy-digital-era-keynote/
Confessions of a congressman: 9 secrets from the inside. (n.d.). Retrieved February 7, 2015, from http://www.vox.com/2015/2/5/7978823/congress-secrets
Evans, R. J. (n.d.). Why are we obsessed with the Nazis? Retrieved February 7, 2015, from http://www.theguardian.com/books/2015/feb/06/why-obsessed-nazis-third-reich
Black, T. (n.d.). Oxford, abortion and the closing of the Western mind. Retrieved February 7, 2015, from http://www.spiked-online.com/freespeechnow/fsn_article/oxford-abortion-and-the-closing-of-the-western-mind
Hampsher-Monk, I. (2015, January–February). How to Think Like Edmund Burke. Foreign Affairs, (January/February 2015). Retrieved from http://www.foreignaffairs.com/articles/142487/iain-hampsher-monk/how-to-think-like-edmund-burke
Alexander Demandt. (n.d.). 210 Reasons for the decline of the Roman Empire. Retrieved February 6, 2015, from https://www.utexas.edu/courses/rome/210reasons.html
Keybase. (n.d.). Retrieved February 6, 2015, from https://keybase.io/
Making PGP Key Management Invisible So Johnny Can Encrypt. (n.d.). Retrieved February 6, 2015, from http://blog.whiteout.io/2015/02/06/making-pgp-key-management-invisible-so-johnny-can-encrypt/
Jaffe, S. (n.d.). Can worker cooperatives alleviate income inequality? Retrieved February 6, 2015, from http://america.aljazeera.com/articles/2015/1/13/worker-run-cooperatives.html
DMARC.org - Domain-based Message Authentication, Reporting and Conformance. (n.d.). Retrieved February 6, 2015, from http://www.dmarc.org/
Schnurer, E. B. (2015, January 28). E-Stonia and the Future of the Cyberstate. Foreign Affairs. Retrieved from http://www.foreignaffairs.com/articles/142825/eric-b-schnurer/e-stonia-and-the-future-of-the-cyberstate
Myers, R. (n.d.). The Art of Management. Retrieved February 6, 2015, from http://avant.org/media/art-of-management

[…]
See more on Zotero.

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong> <p>

This site is protected with Urban Giraffe's plugin 'HTML Purified' and Edward Z. Yang's Powered by HTML Purifier. 75773 items have been purified.