{"id":575,"date":"2021-02-26T13:57:56","date_gmt":"2021-02-26T12:57:56","guid":{"rendered":"http:\/\/www.julienrossi.com\/blog\/?p=575"},"modified":"2021-03-19T17:30:04","modified_gmt":"2021-03-19T16:30:04","slug":"information-et-societes-contemporaines-edition-2021","status":"publish","type":"post","link":"https:\/\/www.julienrossi.com\/blog\/2021\/02\/26\/information-et-societes-contemporaines-edition-2021\/","title":{"rendered":"Information et soci\u00e9t\u00e9s contemporaines, \u00e9dition 2021"},"content":{"rendered":"<p align=\"center\"><span style=\"font-size: small;\"><span lang=\"fr-FR\"><b>Information et soci\u00e9t\u00e9s contemporaines<\/b><\/span><\/span><\/p>\n<p lang=\"fr-FR\"><span style=\"font-size: small;\"><u>Objectif g\u00e9n\u00e9ral du cours<\/u><\/span><\/p>\n<p lang=\"fr-FR\" align=\"justify\"><span style=\"font-size: small;\">Les flux d\u2019information a toujours ont toujours fait l\u2019objet d\u2019une forme de contr\u00f4le politique. Dans le cadre du capitalisme cognitif contemporain, le contr\u00f4le de l\u2019information et de sa circulation est devenu l\u2019objet d\u2019une attention croissante, tant des autorit\u00e9s publiques que de la soci\u00e9t\u00e9 civile et du secteur priv\u00e9.<\/span><\/p>\n<p lang=\"fr-FR\" align=\"justify\"><span style=\"font-size: small;\">La soci\u00e9t\u00e9 informationnelle dans laquelle nous vivons est \u00e0 la fois la cause et la cons\u00e9quence de la diffusion de nouvelles technologies de l\u2019information et de la communication, qui permettent un traitement automatis\u00e9 et en r\u00e9seau d\u2019informations inscrites sur des supports num\u00e9riques.<\/span><\/p>\n<p lang=\"fr-FR\" align=\"justify\"><span style=\"font-size: small;\">L&#8217;informatique est une affaire d&#8217;informaticiens. Mais pas que. L&#8217;objectif du cours est d&#8217;acqu\u00e9rir les bases th\u00e9oriques dans les diff\u00e9rences sciences sociales pour analyser les transformations \u00e9conomiques et politiques dans la fa\u00e7on de s\u2019informer et de communiquer dans nos soci\u00e9t\u00e9s contemporaines.<\/span><\/p>\n<p lang=\"fr-FR\"><span style=\"font-size: small;\"><u>1. Technologies, communication et soci\u00e9t\u00e9<\/u><\/span><\/p>\n<p lang=\"fr-FR\" align=\"justify\"><span style=\"font-size: small;\">La premi\u00e8re s\u00e9ance de trois heures abordera deux th\u00e9matiques\u00a0: d&#8217;abord nous verrons ce que les diff\u00e9rentes sciences sociales ont \u00e0 dire sur la technologie, puis nous aborderons la question de comment l&#8217;informatique transforme les objets et les m\u00e9thodes des sciences sociales en faisant na\u00eetre des projets \u00e9pist\u00e9mologiques nouveaux.<\/span><\/p>\n<p lang=\"fr-FR\"><span style=\"font-size: small;\"><u>2. Informatique et politique<\/u><\/span><\/p>\n<p lang=\"fr-FR\" align=\"justify\"><span style=\"font-size: small;\">La deuxi\u00e8me s\u00e9ance visera \u00e0 comprendre les liens entre informatique et politique, \u00e0 travers deux d\u00e9marches.<br \/>\n<\/span><span style=\"font-size: small;\">La premi\u00e8re vise \u00e0 disposer d&#8217;un minimum de connaissances sur ce qu&#8217;est Internet, d&#8217;un point de vue mat\u00e9riel, pour comprendre les enjeux de pouvoir qui se nouent autour de termes techniques.<br \/>\n<\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">La seconde visera \u00e0 \u00e9tudier un certain nombre de discours et de philosophies politiques ayant pour objet l&#8217;informatique, et qui d\u00e9montrent que les questions d&#8217;apparence <\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\"><i>a priori<\/i><\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\"> purement techniques qui auront pr\u00e9c\u00e9demment \u00e9t\u00e9 abord\u00e9es font en r\u00e9alit\u00e9 l&#8217;objet de luttes politiques et id\u00e9ologiques.<\/span><\/span><\/p>\n<p lang=\"fr-FR\"><span style=\"font-size: small;\"><u>3. Internet est-il ingouvernable ?<\/u><\/span><\/p>\n<p lang=\"fr-FR\" align=\"justify\"><span style=\"font-size: small;\">La troisi\u00e8me s\u00e9ance de trois heures posera une question de d\u00e9bat\u00a0: Internet est-il ingouvernable\u00a0?<\/span><\/p>\n<p align=\"justify\"><span style=\"font-size: small;\"><span lang=\"fr-FR\">De la \u00ab\u00a0D\u00e9claration d&#8217;ind\u00e9pendance du Cyberespace\u00a0\u00bb<!-- La mettre en PPT --> aux discours contemporains sur la disruption (des m\u00e9dias, des taxis, de la sant\u00e9 \u2026 ), l&#8217;informatique, et en particulier Internet, semblent \u00e9chapper \u00e0 la r\u00e9gulation.<\/span><\/span><\/p>\n<p lang=\"fr-FR\" align=\"justify\"><span style=\"font-size: small;\">Cette hypoth\u00e8se souvent reprise dans les discours politiques comme m\u00e9diatiques fera l&#8217;objet d&#8217;une mise \u00e0 l&#8217;\u00e9preuve en \u00e9tudiant diff\u00e9rents domaines de r\u00e9gulation appliquables \u00e0 l&#8217;Internet. Le droit \u00e0 la protection des donn\u00e9es \u00e0 caract\u00e8re personnel fera l&#8217;objet d&#8217;une attention particuli\u00e8re.<\/span><\/p>\n<p lang=\"fr-FR\" align=\"justify\"><span style=\"font-size: small;\"><u><b>Evaluation finale<\/b><\/u><\/span><\/p>\n<ul>\n<li>\n<p lang=\"fr-FR\"><span style=\"font-size: small;\">Une partie de l\u2019\u00e9valuation a \u00e9t\u00e9 d\u00e9finie par M. Gardes<\/span><\/p>\n<\/li>\n<li>\n<p lang=\"fr-FR\"><span style=\"font-size: small;\">Une dissertation \u00e0 rendre (voir la fiche sur la dissertation)<\/span><\/p>\n<\/li>\n<\/ul>\n<p style=\"text-align: center;\"><strong><a href=\"http:\/\/www.julienrossi.com\/blog\/wp-content\/uploads\/2021\/02\/Fiche-dissertation.pdf\">Fiche dissertation<\/a> \u00e0 t\u00e9l\u00e9charger (contient les consignes \u00e0 suivre)<br \/>\n<\/strong><\/p>\n<p style=\"text-align: center;\"><a href=\"http:\/\/www.julienrossi.com\/blog\/wp-content\/uploads\/2021\/02\/ppt-2021.pdf\">Support de pr\u00e9sentation 2021<\/a><\/p>\n<p><u><b>Bibliographie<\/b><\/u><\/p>\n<p>&nbsp;<\/p>\n<p><span lang=\"fr-FR\"><u><b>Autre<\/b><\/u><\/span><\/p>\n<p><span lang=\"fr-FR\">Couture S., 2012, <\/span><span lang=\"fr-FR\">\u00ab\u00a0L\u2019\u00e9criture collective du code source informatique\u00a0\u00bb, <\/span><span lang=\"fr-FR\"><i>Revue d\u2019anthropologie des connaissances<\/i><\/span><span lang=\"fr-FR\">, <\/span><span lang=\"fr-FR\"><i>6, n\u00b0 1<\/i><\/span><span lang=\"fr-FR\">, 1, p.\u00a021\u201142.<\/span><\/p>\n<p><span lang=\"fr-FR\">Ganascia, J-G. <\/span><span lang=\"fr-FR\">2019. \u00ab Peut-on contenir l\u2019intelligence artificielle\u00a0?\u00a0\u00bb, <\/span><span lang=\"fr-FR\"><i>Pouvoirs<\/i><\/span><span lang=\"fr-FR\">, n\u00b0 170, pp. 71-81<\/span><\/p>\n<p><span lang=\"fr-FR\">Souchier E.<\/span><span lang=\"fr-FR\">, 1996, \u00ab\u00a0L\u2019\u00e9crit d\u2019\u00e9cran, pratiques d\u2019\u00e9criture &amp; informatique\u00a0\u00bb, <\/span><span lang=\"fr-FR\"><i>Communication et langages<\/i><\/span><span lang=\"fr-FR\">, <\/span><span lang=\"fr-FR\"><i>107<\/i><\/span><span lang=\"fr-FR\">, 1, p.\u00a0105\u2011119.<\/span><\/p>\n<p><span lang=\"fr-FR\"><u><b>Capitalisme informationnel\/cognitif<\/b><\/u><\/span><\/p>\n<p>Cardon D., Casilli A.A., 2015, <i>Qu\u2019est-ce que le digital labor\u202f?<\/i>, Bry-sur-Marne, INA.<\/p>\n<p><span lang=\"fr-FR\">Castells M.<\/span><span lang=\"fr-FR\">, 2001, <\/span><span lang=\"fr-FR\"><i>La soci\u00e9t\u00e9 en r\u00e9seaux. Tome 1\u202f: l\u2019\u00e8re de l\u2019information<\/i><\/span><span lang=\"fr-FR\">, 2e \u00e9dition, Paris, Fayard.<\/span><\/p>\n<p><span lang=\"fr-FR\">Cecere G., Guel F.L., Rochelandet F., 2015, <\/span><span lang=\"fr-FR\">\u00ab\u00a0Les mod\u00e8les d\u2019affaires num\u00e9riques sont-ils trop indiscrets\u202f?, Are digital business models too indiscreet?\u00a0\u00bb, <\/span><span lang=\"fr-FR\"><i>R\u00e9seaux<\/i><\/span><span lang=\"fr-FR\">, 189, p.\u00a077\u2011101.<\/span><\/p>\n<p><span lang=\"fr-FR\">Moulier Boutang Y., 2007, <\/span><span lang=\"fr-FR\"><i>Le capitalisme cognitif. La nouvelle grande transformation.<\/i><\/span><span lang=\"fr-FR\">, Paris, Editions Amsterdam.<\/span><\/p>\n<p><span lang=\"fr-FR\"><u><b>Cybers\u00e9curit\u00e9<\/b><\/u><\/span><\/p>\n<p><span lang=\"fr-FR\">Timmers, P., 2018, <\/span><span lang=\"fr-FR\">\u00ab\u00a0The European Union\u2019s cybersecurity industrial policy\u00a0\u00bb, <\/span><span lang=\"fr-FR\"><i>Journal of Cyber Policy<\/i><\/span><span lang=\"fr-FR\">, vol. 3, nr. 3, <\/span><span lang=\"fr-FR\">p. 363 \u2013 384.<\/span><\/p>\n<p><span lang=\"fr-FR\"><u><b>Histoire et sur l<\/b><\/u><\/span><span lang=\"fr-FR\"><u><b>a<\/b><\/u><\/span><u><b> gouvernance d<\/b><\/u><span lang=\"fr-FR\"><u><b>\u2019Internet<\/b><\/u><\/span><\/p>\n<p><span lang=\"fr-FR\">Bing J., 2009, <\/span><span lang=\"fr-FR\">\u00ab\u00a0Building cyberspace: a brief history of Internet\u00a0\u00bb, dans <\/span><span lang=\"fr-FR\"><i>Internet Governance: Infrastructure and Institutions<\/i><\/span><span lang=\"fr-FR\">, Oxford, Oxford University Press, p.\u00a08\u201147.<\/span><\/p>\n<p><span lang=\"fr-FR\">Bray F.<\/span><span lang=\"fr-FR\">, 2007, \u00ab\u00a0Gender and Technology\u00a0\u00bb, <\/span><span lang=\"fr-FR\"><i>Annual Review of Anthropology<\/i><\/span><span lang=\"fr-FR\">, <\/span><span lang=\"fr-FR\"><i>36<\/i><\/span><span lang=\"fr-FR\">, 1, p.\u00a037\u201153.<\/span><\/p>\n<p><span lang=\"fr-FR\">Doty N., Mulligan D.K., 2013, <\/span><span lang=\"fr-FR\">\u00ab\u00a0Internet Multistakeholder Processes and Techno-Policy Standards.\u00a0\u00bb, <\/span><span lang=\"fr-FR\"><i>11<\/i><\/span><span lang=\"fr-FR\">, p.\u00a0135\u2011184.<\/span><\/p>\n<p><span lang=\"fr-FR\">Kleinw\u00e4chter W.<\/span><span lang=\"fr-FR\">, 2012, \u00ab\u00a0Internet, soci\u00e9t\u00e9s civiles et gouvernements\u202f: cohabitation ou choc des cultures\u202f?\u00a0\u00bb, <\/span><span lang=\"fr-FR\"><i>Politique \u00e9trang\u00e8re<\/i><\/span><span lang=\"fr-FR\">, <\/span><span lang=\"fr-FR\"><i>Et\u00e9<\/i><\/span><span lang=\"fr-FR\">, 2, p.\u00a0263\u2011275.<\/span><\/p>\n<p><span lang=\"fr-FR\">Lessig L.<\/span><span lang=\"fr-FR\">, 2000, \u00ab\u00a0Code Is Law\u00a0\u00bb, <\/span><span lang=\"fr-FR\"><i>Harvard Magazine<\/i><\/span><span lang=\"fr-FR\">, <\/span><a href=\"http:\/\/harvardmagazine.com\/2000\/01\/code-is-law-html\">http:\/\/harvardmagazine.com\/2000\/01\/code-is-law-html<\/a><span lang=\"fr-FR\"> .<\/span><\/p>\n<p><span lang=\"fr-FR\">Massit<\/span><span lang=\"fr-FR\">&#8211;<\/span><span lang=\"fr-FR\">Folea<\/span><span lang=\"fr-FR\">, Fran\u00e7oise. <\/span><span lang=\"fr-FR\"><i>La r\u00e9gulation de l\u2019internet : fictions et frictions<\/i><\/span><span lang=\"fr-FR\"> In : <\/span><span lang=\"fr-FR\"><i>Les d\u00e9bats du num\u00e9rique<\/i><\/span><span lang=\"fr-FR\">. Paris:Presses des Mines, 2013<\/span><\/p>\n<p><span lang=\"fr-FR\">Musiani F.<\/span><span lang=\"fr-FR\">, <\/span><span lang=\"fr-FR\">Schafer V.<\/span><span lang=\"fr-FR\">, 2011, \u00ab\u00a0Le mod\u00e8le Internet en question (ann\u00e9es 1970-2010)\u00a0\u00bb, <\/span><span lang=\"fr-FR\"><i>Flux<\/i><\/span><span lang=\"fr-FR\">, <\/span><span lang=\"fr-FR\"><i>n\u00b0 85<\/i><\/span><span lang=\"fr-FR\">&#8211;<\/span><span lang=\"fr-FR\"><i>86<\/i><\/span><span lang=\"fr-FR\">, 3, p.\u00a062.<\/span><\/p>\n<p><span lang=\"fr-FR\">Rossi J.<\/span><span lang=\"fr-FR\">, 2020, \u00ab\u00a0What rules the Internet? A study of the troubled relation between web standards and legal instruments in the field of privacy\u00a0\u00bb, <\/span><span lang=\"fr-FR\"><i>2020 Annual Giga-Net Symposium<\/i><\/span><span lang=\"fr-FR\">, <\/span><a href=\"https:\/\/www.giga-net.org\/2020symposiumPaper\/Rossi.pdf\">https:\/\/www.giga-net.org\/2020symposiumPaper\/Rossi.pdf<\/a> <span lang=\"fr-FR\">.<\/span><\/p>\n<p><span style=\"font-size: medium;\"><span lang=\"fr-FR\">Sire G.<\/span><\/span><span style=\"font-size: medium;\"><span lang=\"fr-FR\">, 2017, \u00ab\u00a0Gouverner le HTML\u00a0\u00bb, <\/span><\/span><span style=\"font-size: medium;\"><span lang=\"fr-FR\"><i>R\u00e9seaux<\/i><\/span><\/span><span style=\"font-size: medium;\"><span lang=\"fr-FR\">, 206, p.\u00a037\u201160.<\/span><\/span><\/p>\n<p><u><b>Libert\u00e9 d<\/b><\/u><span lang=\"fr-FR\"><u><b>\u2019expression<\/b><\/u><\/span><\/p>\n<p><span lang=\"fr-FR\">Bird K., 2001, \u00ab<\/span><span lang=\"fr-FR\">\u00a0L\u2019impossible r\u00e9glementation des propos \u00e0 caract\u00e8re raciste aux \u00c9tats-unis\u00a0\u00bb, <\/span><span lang=\"fr-FR\"><i>Revue fran\u00e7aise de droit constitutionnel<\/i><\/span><span lang=\"fr-FR\">, <\/span><span lang=\"fr-FR\"><i>46<\/i><\/span><span lang=\"fr-FR\">, 2, p.\u00a0265\u2011287.<\/span><\/p>\n<p><span lang=\"fr-FR\">Coslin C.<\/span><span lang=\"fr-FR\">, <\/span><span lang=\"fr-FR\">Curien N.<\/span><span lang=\"fr-FR\">, 2014, \u00ab\u00a0L\u2019efficacit\u00e9 \u00e0 l\u2019\u00e9tranger des d\u00e9cisions fran\u00e7aises en mati\u00e8re de communication\u00a0: le cas des \u00c9tats-Unis et du Premier Amendement\u00a0\u00bb, <\/span><span lang=\"fr-FR\"><i>LEGICOM<\/i><\/span><span lang=\"fr-FR\">, <\/span><span lang=\"fr-FR\"><i>52<\/i><\/span><span lang=\"fr-FR\">, 1, p.\u00a077\u201187.<\/span><\/p>\n<p><span lang=\"fr-FR\">Dahlgren P.<\/span><span lang=\"fr-FR\">, 1994, \u00ab\u00a0L\u2019espace public et les m\u00e9dias\u202f: une \u00e8re nouvelle\u202f?\u00a0\u00bb, <\/span><span lang=\"fr-FR\"><i>Herm\u00e8s<\/i><\/span><span lang=\"fr-FR\">, 13\u201114, p.\u00a0243.<\/span><\/p>\n<p><span lang=\"fr-FR\">Derieux E.<\/span><span lang=\"fr-FR\">, 2014, \u00ab\u00a0Une exclusion non l\u00e9galement justifi\u00e9e. Tr\u00e8s favorable aux m\u00e9dias et pr\u00e9judiciable aux victimes d\u2019abus de la libert\u00e9 d\u2019expression\u00a0\u00bb, <\/span><span lang=\"fr-FR\"><i>LEGICOM<\/i><\/span><span lang=\"fr-FR\">, <\/span><span lang=\"fr-FR\"><i>52<\/i><\/span><span lang=\"fr-FR\">, 1, p.\u00a015\u201122.<\/span><\/p>\n<p><span style=\"font-size: medium;\"><span lang=\"fr-FR\">Fran\u00e7ois L., 2014, \u00ab<\/span><\/span><span style=\"font-size: medium;\"><span lang=\"fr-FR\">\u00a0Les droits nationaux de la libert\u00e9 d\u2019expression et le principe europ\u00e9en de proportionnalit\u00e9\u00a0<\/span><\/span><span style=\"font-size: medium;\"><span lang=\"fr-FR\">\u00bb, <\/span><\/span><span style=\"font-size: medium;\"><span lang=\"fr-FR\"><i>LEGICOM<\/i><\/span><\/span><span style=\"font-size: medium;\"><span lang=\"fr-FR\">,<\/span><\/span> <span style=\"font-size: medium;\"><span lang=\"fr-FR\"><i>52<\/i><\/span><\/span><span style=\"font-size: medium;\"><span lang=\"fr-FR\">, 1, p.\u00a0101\u2011107.<\/span><\/span><\/p>\n<p><span style=\"font-size: medium;\"><span lang=\"fr-FR\">Pigeat H.<\/span><\/span><span style=\"font-size: medium;\"><span lang=\"fr-FR\">, 2003, \u00ab\u00a0Libert\u00e9 de la presse, qualit\u00e9 de l\u2019information. \u00c0 la recherche d\u2019une autor\u00e9gulation\u00a0\u00bb, <\/span><\/span><span style=\"font-size: medium;\"><span lang=\"fr-FR\"><i>Commentaire<\/i><\/span><\/span><span style=\"font-size: medium;\"><span lang=\"fr-FR\">, <\/span><\/span><span style=\"font-size: medium;\"><span lang=\"fr-FR\"><i>Num\u00e9ro 104<\/i><\/span><\/span><span style=\"font-size: medium;\"><span lang=\"fr-FR\">, 4, p.\u00a0961\u2011968.<\/span><\/span><\/p>\n<p><span style=\"font-size: medium;\"><span lang=\"fr-FR\">Weiss M.-A.<\/span><\/span><span style=\"font-size: medium;\"><span lang=\"fr-FR\">, 2014, \u00ab\u00a0Libert\u00e9 d\u2019expression sur les r\u00e9seaux sociaux. Regards crois\u00e9s \u00c9tats-Unis\/Europe\u00a0\u00bb, <\/span><\/span><span style=\"font-size: medium;\"><span lang=\"fr-FR\"><i>Documentaliste-Sciences de l\u2019Information<\/i><\/span><\/span><span style=\"font-size: medium;\"><span lang=\"fr-FR\">, <\/span><\/span><span style=\"font-size: medium;\"><span lang=\"fr-FR\"><i>Vol.\u00a051<\/i><\/span><\/span><span style=\"font-size: medium;\"><span lang=\"fr-FR\">, 3, p.\u00a020\u201122.<\/span><\/span><\/p>\n<p><u><b>M\u00e9thodes \u00ab num\u00e9riques \u00bb en sciences humaines et sociales<\/b><\/u><\/p>\n<p>Boullier D., 2015, \u00ab\u00a0Les sciences sociales face aux traces du Big Data\u00a0\u00bb, <i>Revue fran\u00e7aise de science politique<\/i>, 5-6, p.\u00a0805\u2011828.<\/p>\n<p>Bourdeloie H., 2014, \u00ab\u00a0Ce que le num\u00e9rique fait aux sciences humaines et sociales. \u00e9pist\u00e9mologie, m\u00e9thodes et outils en questions\u00a0\u00bb, <i>tic&amp;soci\u00e9t\u00e9<\/i>, Vol. 7, N\u00b0 2.<\/p>\n<p>Boyadjian J., 2014, \u00ab\u00a0Twitter, un nouveau \u00ab\u202fbarom\u00e8tre de l\u2019opinion publique\u202f\u00bb\u202f?\u00a0\u00bb, <i>Participations<\/i>, <i>8<\/i>, 1, p.\u00a055.<\/p>\n<p><u><b>Pens\u00e9e politique et informatique<\/b><\/u><\/p>\n<p>Broca S., 2013, <i>Utopie du logiciel libre\u202f; du bricolage informatique \u00e0 la r\u00e9invention sociale<\/i>, Neuvy-en-Champagne, Le passager clandestin.<\/p>\n<p>Flichy P., 2001, <i>L\u2019imaginaire d\u2019Internet<\/i>, Paris, D\u00e9couverte (Sciences et soci\u00e9t\u00e9), 272\u00a0p.<\/p>\n<p><span style=\"font-size: medium;\"><span lang=\"fr-FR\">Turner F.<\/span><\/span><span style=\"font-size: medium;\"><span lang=\"fr-FR\">, 2008, <\/span><\/span><span style=\"font-size: medium;\"><span lang=\"fr-FR\"><i>From counterculture to cyberculture: Stewart Brand, the Whole Earth Network, and the rise of digital utopianism<\/i><\/span><\/span><span style=\"font-size: medium;\"><span lang=\"fr-FR\">, 1. paperback ed, Chicago, Ill., Univ. of Chicago Pr, 327\u00a0p.<\/span><\/span><\/p>\n<p><u><b>P<\/b><\/u><u><b>hilosophie et la sociologie des sciences et des techniques<\/b><\/u><\/p>\n<p>Bachimont B., 2010, <i>Le sens de la technique: le num\u00e9rique et le calcul<\/i>, Paris, Belles lettres (Encre marine), 185\u00a0p.<\/p>\n<p>Beck U., 2008, <i>La soci\u00e9t\u00e9 du risque<\/i>, Paris, Flammarion.<\/p>\n<p>Ellul J., 2004, <i>Le syst\u00e8me technicien<\/i>, 2e \u00e9dition, Paris, Cherche Midi.<\/p>\n<p>Jaur\u00e9guiberry F., Proulx S., 2011, <i>Usages et enjeux des technologies de communication<\/i>, Toulouse, \u00e9r\u00e8s.<\/p>\n<p>Latouche S., 2012, <i>L\u2019\u00c2ge des limites<\/i>, Paris, Fayard\/Mille et une nuits, 152\u00a0p.<\/p>\n<p>Mumford L., 1964, \u00ab\u00a0Authoritarian and Democratic Technics\u00a0\u00bb, <i>Technology and Culture<\/i>, <i>5<\/i>, 1, p.\u00a01\u20118.<\/p>\n<p><span style=\"font-size: medium;\"><span lang=\"fr-FR\">Winner L.<\/span><\/span><span style=\"font-size: medium;\"><span lang=\"fr-FR\">, 1980, \u00ab\u00a0Do Artifacts Have Politics?\u00a0\u00bb, <\/span><\/span><span style=\"font-size: medium;\"><span lang=\"fr-FR\"><i>Daedalus<\/i><\/span><\/span><span style=\"font-size: medium;\"><span lang=\"fr-FR\">, <\/span><\/span><span style=\"font-size: medium;\"><span lang=\"fr-FR\"><i>109<\/i><\/span><\/span><span style=\"font-size: medium;\"><span lang=\"fr-FR\">, 1, p.\u00a0121\u2011136.<\/span><\/span><\/p>\n<p><u><b>Plateformes<\/b><\/u><\/p>\n<p>Conseil d<span lang=\"fr-FR\">\u2019\u00c9tat (France), <\/span><span lang=\"fr-FR\">2017.<\/span> <span lang=\"fr-FR\"><i>Puissance publique et plateformes num\u00e9riques\u00a0: accompagner l\u2019\u00ab\u00a0ub\u00e9risation\u00a0\u00bb.<\/i><\/span><span lang=\"fr-FR\"> \u00c9tude annuelle. <\/span><span lang=\"fr-FR\">Paris, <\/span><span lang=\"fr-FR\">D<\/span><span lang=\"fr-FR\">irection de l&#8217;information l\u00e9gale et administrative<\/span><\/p>\n<p><span lang=\"fr-FR\">Loveluck B.<\/span><span lang=\"fr-FR\">, 2015, \u00ab\u00a0Internet, une soci\u00e9t\u00e9 contre l\u2019\u00c9tat\u202f?\u00a0\u00bb, <\/span><span lang=\"fr-FR\"><i>R\u00e9seaux<\/i><\/span><span lang=\"fr-FR\">, 192, p.\u00a0235\u2011270.<\/span><\/p>\n<p><u><b>Politiques de d\u00e9veloppement et fracture num\u00e9rique<\/b><\/u><\/p>\n<p>Kiyindou A., 2009, <i>Les pays en d\u00e9veloppement face \u00e0 la soci\u00e9t\u00e9 de l\u2019information<\/i>, Paris, Harmattan, 267\u00a0p.<\/p>\n<p><span lang=\"fr-FR\">Rossi J., 2017, <\/span><span lang=\"fr-FR\">\u00ab\u00a0Les enjeux de l\u2019infrastructure num\u00e9rique dans les politiques de d\u00e9veloppement\u00a0\u00bb, dans <\/span><span lang=\"fr-FR\"><i>Stabilit\u00e9, int\u00e9gration, coop\u00e9ration et d\u00e9veloppement<\/i><\/span><span lang=\"fr-FR\">, Szeged, Centre universitaire francophone (Cahiers du Centre universitaire francophone), p.\u00a0141\u2011166.<\/span><\/p>\n<p><u><b>V<\/b><\/u><u><b>ie priv\u00e9e et la surveillance<\/b><\/u><\/p>\n<p>Acquisti A., Gross R., 2006, \u00ab\u00a0Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook\u00a0\u00bb, <i>Proceedings of the 6th International Conference on Privacy Enhancing Technologies<\/i>, p.\u00a036\u201158.<\/p>\n<p>Alloing C., 2016, \u00ab\u00a0La sousveillance: Vers un renseignement ordinaire\u202f?\u00a0\u00bb, <i>Herm\u00e8s<\/i>, 76, p.\u00a068\u201176.<\/p>\n<p>Cardon D., 2012, \u00ab\u00a0Le parler priv\u00e9-public des r\u00e9seaux sociaux d\u2019Internet\u00a0\u00bb, dans Proulx S., Millette M., Heaton L. (dirs.), <i>M\u00e9dias sociaux. Enjeux pour la communication<\/i>, Qu\u00e9bec, Presses de l\u2019Universit\u00e9 du Qu\u00e9bec, p.\u00a033\u201145.<\/p>\n<p>Englehardt S., Narayanan A., 2016, \u00ab\u00a0Online Tracking:A 1-million-site Measurement and Analysis\u00a0\u00bb, <i>ACM Conference on Computer and Communications Security<\/i>, <a href=\"https:\/\/www.cs.princeton.edu\/~arvindn\/publications\/OpenWPM_1_million_site_tracking_measurement.pdf\">https:\/\/www.cs.princeton.edu\/~arvindn\/publications\/OpenWPM_1_million_site_tracking_measurement.pdf<\/a>.<\/p>\n<p>Goupy M., 2014, \u00ab\u00a0La bienveillante neutralit\u00e9 des technologies d\u2019espionnage des communications\u202f: le cas tunisien\u00a0\u00bb, <i>Cultures &amp; Conflits<\/i>, 93, p.\u00a0109\u2011124.<\/p>\n<p>Jones R., Raab C., Sz\u00e9kely I., 2018, \u00ab\u00a0Surveillance and resilience: Relationships, dynamics, and consequences\u00a0\u00bb, <i>Democracy and Security<\/i>, p.\u00a01\u201138.<\/p>\n<p>Khatchatourov A., 2018, \u00ab\u00a0La confiance dans le num\u00e9rique. Des signes ext\u00e9rieurs vers la r\u00e9gulation de soi.\u00a0\u00bb, dans Levallois-Barth C. (dir.), <i>Signes de confiance, l\u2019impact des labels sur la gestion des donn\u00e9es personnelles<\/i>, Paris, Telecom ParisTech (Chaire et Valeurs des Politiques des Informations Personnelles), p.\u00a05\u201120.<\/p>\n<p>Luk\u00e1cs A., 2016, \u00ab\u00a0What is Privacy? The History and Definition of Privacy\u00a0\u00bb Keresztes G. (dir.), <i>Tavaszi Sz\u00e9l 2016 Tanulm\u00e1nyk\u00f6tet I.<\/i>, p.\u00a0256\u2011265.<\/p>\n<p>Lyon D., 2015, <i>Surveillance After Snowden<\/i>, Cambridge, Mass., Polity Press.<\/p>\n<p><span lang=\"fr-FR\">Rouvroy A.<\/span><span lang=\"fr-FR\">, <\/span><span lang=\"fr-FR\">Berns T.<\/span><span lang=\"fr-FR\">, 2013, \u00ab\u00a0Gouvernementalit\u00e9 algorithmique et perspectives d\u2019\u00e9mancipation: Le disparate comme condition d\u2019individuation par la relation\u202f?\u00a0\u00bb, <\/span><span lang=\"fr-FR\"><i>R\u00e9seaux<\/i><\/span><span lang=\"fr-FR\">, <\/span><span lang=\"fr-FR\"><i>177<\/i><\/span><span lang=\"fr-FR\">, 1, p.\u00a0163.<\/span><\/p>\n<p><span lang=\"fr-FR\">Simon B.<\/span><span lang=\"fr-FR\">, 2002, \u00ab\u00a0The Return of Panopticism: Supervision, Subjection and the New Surveillance\u00a0\u00bb, <\/span><span lang=\"fr-FR\"><i>Surveillance &amp; Society<\/i><\/span><span lang=\"fr-FR\">, <\/span><span lang=\"fr-FR\"><i>3<\/i><\/span><span lang=\"fr-FR\">, 1.<\/span><\/p>\n<p><span lang=\"fr-FR\">Vitalis A.<\/span><span lang=\"fr-FR\">, <\/span><span lang=\"fr-FR\">Mattelart A.<\/span><span lang=\"fr-FR\">, 2014, <\/span><span lang=\"fr-FR\"><i>Le profilage des populations: Du livret ouvrier au cybercontr\u00f4le<\/i><\/span><span lang=\"fr-FR\">, Paris, La D\u00e9couverte, 156\u00a0p.<\/span><\/p>\n<p><u><b>P<\/b><\/u><u><b>rotection des donn\u00e9es<\/b><\/u><\/p>\n<p>Cl\u00e9ment-Fontaine M., 2017, \u00ab\u00a0L\u2019union du droit \u00e0 la protection des donn\u00e9es \u00e0 caract\u00e8re personnel et du droit \u00e0 la vie priv\u00e9e\u00a0\u00bb, <i>LEGICOM<\/i>, <i>N\u00b0 59<\/i>, 2, p.\u00a061\u201168.<\/p>\n<p>Gellert R., 2015, \u00ab\u00a0Data protection: a risk regulation? Between the risk management of everything and the precautionary alternative\u00a0\u00bb, <i>International Data Privacy Law<\/i>, <i>5<\/i>, 1, p.\u00a03\u201119.<\/p>\n<p>Gray C., Santos C., Bielova N., Toth M., Clifford D., 2021, \u00ab\u00a0Dark Patterns and the Legal Requirements of Consent Banners: An Interaction Criticism Perspective\u00a0\u00bb, <i>ACM CHI Conference on Human Factors in Computing Systems<\/i>, <a href=\"https:\/\/hal.inria.fr\/hal-03117307\">https:\/\/hal.inria.fr\/hal-03117307<\/a> .<\/p>\n<p><span lang=\"fr-FR\">Mattatia F.<\/span><span lang=\"fr-FR\">, 2018, <\/span><span lang=\"fr-FR\"><i>RGPD et droit des donn\u00e9es personnelles<\/i><\/span><span lang=\"fr-FR\">, 3e \u00e9dition, Paris, Eyrolles.<\/span><\/p>\n<p><span lang=\"fr-FR\">Newman A.<\/span><span lang=\"fr-FR\">, 2008, <\/span><span lang=\"fr-FR\"><i>Protectors of Privacy. Regulating Personal Data in the Global Economy<\/i><\/span><span lang=\"fr-FR\">, Ithaca, Cornell University Press.<\/span><\/p>\n<p><span lang=\"fr-FR\">Rochelandet F.<\/span><span lang=\"fr-FR\">, 2010, <\/span><span lang=\"fr-FR\"><i>\u00c9conomie des donn\u00e9es personnelles et de la vie priv\u00e9e<\/i><\/span><span lang=\"fr-FR\">, Paris, D\u00e9couverte.<\/span><\/p>\n<p><span lang=\"fr-FR\">Rossi J., 2018, <\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">\u00ab\u00a0Qu\u2019est-ce que le droit \u00e0 la protection des donn\u00e9es \u00e0 caract\u00e8re personnel\u202f?\u00a0\u00bb, Working Paper, <\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\"><i>Geopolitics of Risk Working Papers<\/i><\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">, 1\/2018, Paris, Chaire de g\u00e9opolitique du risque de l\u2019Ecole normale sup\u00e9rieure<\/span><\/span><span lang=\"fr-FR\">.<\/span><\/p>\n<p><span lang=\"fr-FR\">T\u00fcrk A., 2011, <\/span><span lang=\"fr-FR\"><i>La vie priv\u00e9e en p\u00e9ril: des citoyens sous contr\u00f4le<\/i><\/span><span lang=\"fr-FR\">, Paris, Odile Jacob, 269\u00a0p.<\/span><\/p>\n<p><a name=\"__DdeLink__21376_1111125361\"><\/a><\/p>\n<p lang=\"fr-FR\"><span style=\"font-size: small;\"><i>Films<\/i><\/span><\/p>\n<ul>\n<li><span style=\"font-size: small;\"><span lang=\"fr-FR\"><i>Citizenfour<\/i><\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\"> (documentaire sur Edward Snowden)<\/span><\/span><\/li>\n<li><span style=\"font-size: small;\"><span lang=\"fr-FR\"><i>La vie des autres<\/i><\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\"> (film de fiction sur la Stasi)<\/span><\/span><\/li>\n<li><span style=\"font-size: small;\"><span lang=\"fr-FR\"><i>Life of an Agent<\/i><\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\"> (film documentaire sur la formation des agents de la police politique hongroise \u00e0 l&#8217;\u00e9poque de la dictature communiste) (<\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\"><i>Egy \u00fcgyn\u00f6k \u00e9lete magyarul<\/i><\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">)<\/span><\/span><\/li>\n<li><span style=\"font-size: small;\"><span lang=\"fr-FR\"><i>Pirates of the Silicon Valley<\/i><\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\"> (docufiction, histoire de l&#8217;informatique\u00a0; naissance de Microsoft et d&#8217;Apple)<\/span><\/span><\/li>\n<li><span style=\"font-size: small;\"><span lang=\"fr-FR\"><i>Black Code\u00a0<\/i><\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">: sur des exemples concrets de surveillance d\u2019\u00c9tat et de ses risques et effets sur la population<\/span><\/span><\/li>\n<li><span style=\"font-size: small;\"><span lang=\"fr-FR\"><i>Nothing to hide\u00a0<\/i><\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">: documentaire sur <\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">la surveillance par les donn\u00e9es contemporaine<\/span><\/span><\/li>\n<\/ul>\n<p lang=\"fr-FR\"><span style=\"font-size: small;\"><i>Vid\u00e9os en ligne<\/i><\/span><\/p>\n<ul>\n<li><span style=\"font-size: small;\"><span lang=\"fr-FR\">Richard Stallman\u00a0: \u00ab\u00a0qu&#8217;est-ce que le logiciel libre\u00a0?\u00a0\u00bb (conf\u00e9rence \u00e0 Sciences Po Lille en f\u00e9vrier 2011)\u00a0: <a href=\"http:\/\/www.f.0x2501.org\/p\/rms\/\" target=\"_top\">http:\/\/www.f.0x2501.org\/p\/rms\/<\/a><\/span><\/span><\/li>\n<li><span style=\"font-size: small;\"><span lang=\"fr-FR\">Benjamin Bayart\u00a0: \u00ab\u00a0Internet libre ou le Minitel 2.0\u00a0?\u00a0\u00bb (conf\u00e9rence aux RMLL d&#8217;Amiens en 2007)\u00a0: <a href=\"https:\/\/www.youtube.com\/watch?v=AoRGoQ76PK8\" target=\"_top\">https:\/\/www.youtube.com\/watch?v=AoRGoQ76PK8<\/a><\/span><\/span><\/li>\n<li><span style=\"font-size: small;\"><span lang=\"fr-FR\">Dominique Cardon\u00a0: \u00ab\u00a0Nos vies \u00e0 l&#8217;heure des big data\u00a0\u00bb (conf\u00e9rence \u00e0 l&#8217;Universit\u00e9 de Nantes de 2010)\u00a0: <a href=\"https:\/\/www.youtube.com\/watch?v=D_Eyzt2uJZk\" target=\"_top\">https:\/\/www.youtube.com\/watch?v=D_Eyzt2uJZk<\/a><\/span><\/span><\/li>\n<li><span style=\"font-size: small;\"><span lang=\"fr-FR\">Ray Kurzweil at the IMF\u00a0: <a href=\"https:\/\/www.youtube.com\/watch?v=Vx9RkPYpqag\" target=\"_top\">https:\/\/www.youtube.com\/watch?v=Vx9RkPYpqag<\/a><\/span><\/span><\/li>\n<li><span style=\"font-size: small;\"><span lang=\"fr-FR\">Cha\u00eene Youtube sur les <\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\"><i>game studies\u00a0<\/i><\/span><\/span><span style=\"font-size: small;\"><span lang=\"fr-FR\">: <a href=\"https:\/\/www.youtube.com\/channel\/UCXg4udeWdzZbaL8Y8otOLSw\" target=\"_top\">https:\/\/www.youtube.com\/channel\/UCXg4udeWdzZbaL8Y8otOLSw<\/a><\/span><\/span><\/li>\n<li><span style=\"font-size: small;\"><span lang=\"fr-FR\">Danah boyd\u00a0: \u00ab\u00a0Be careful what you code for\u00a0\u00bb\u00a0: <a href=\"https:\/\/www.youtube.com\/watch?v=UWBZNxPzoUY\" target=\"_top\">https:\/\/www.youtube.com\/watch?v=UWBZNxPzoUY<\/a><\/span><\/span><\/li>\n<li><span style=\"font-size: small;\"><span lang=\"fr-FR\">Antonio Casilli\u00a0: \u00ab\u00a0Making sense of digital platform labor\u00a0\u00bb (conf\u00e9rence \u00e0 l&#8217;EM Lyon le 21 octobre 2016)\u00a0: <a href=\"https:\/\/www.youtube.com\/watch?v=hCV1OTSByOQ\" target=\"_top\">https:\/\/www.youtube.com\/watch?v=hCV1OTSByOQ<\/a><\/span><\/span><\/li>\n<li><span style=\"font-size: small;\"><span lang=\"fr-FR\">Yann Moulier-Boutang\u00a0: \u00ab\u00a0R\u00e9gime de la propri\u00e9t\u00e9 dans le capitalisme cognitif\u00a0\u00bb\u00a0: <a href=\"https:\/\/www.youtube.com\/watch?v=8gXd_YfqtGw\">https:\/\/www.youtube.com\/watch?v=8gXd_YfqtGw<\/a><\/span><\/span><\/li>\n<li><span style=\"font-size: small;\"><span lang=\"fr-FR\">F\u00e9lix Tr\u00e9guer\u00a0: \u00ab\u00a0Internet et libert\u00e9s publiques\u00a0: ce qui a chang\u00e9 de puis Snowden\u00a0\u00bb\u00a0: <a href=\"https:\/\/www.youtube.com\/watch?v=FCViX9uaI8E\">https:\/\/www.youtube.com\/watch?v=FCViX9uaI8E<\/a> <\/span><\/span><\/li>\n<li><span style=\"font-size: small;\"><span lang=\"fr-FR\">Ksenia Ermoshina\u00a0: Conf\u00e9rence sur le chiffrement\u00a0: <a href=\"https:\/\/www.youtube.com\/watch?v=Ka6_gNMILxw\">https:\/\/www.youtube.com\/watch?v=Ka6_gNMILxw<\/a> <\/span><\/span><\/li>\n<li>Toutes les vid\u00e9os de la conf\u00e9rence CPDP : https:\/\/www.youtube.com\/user\/CPDPConferences<\/li>\n<\/ul>\n<p><span style=\"font-size: small;\"><span lang=\"fr-FR\">Guide de la jurisprudence europ\u00e9enne sur la protection des donn\u00e9es\u00a0: <a href=\"http:\/\/www.julienrossi.com\/blog\/wp-content\/uploads\/2018\/10\/guide-de-la-jurisprudence-v0-9-21.pdf\" target=\"_top\">http:\/\/www.julienrossi.com\/blog\/wp-content\/uploads\/2018\/10\/guide-de-la-jurisprudence-v0-9-21.pdf<\/a><\/span><\/span><\/p>\n<p><span lang=\"fr-FR\"><i>Manuel de droit europ\u00e9en en mati\u00e8re de protection des donn\u00e9es \u00e0 caract\u00e8re personnel, <\/i><\/span><span lang=\"fr-FR\">Conseil de l&#8217;Europe, Court Europ\u00e9enne des Droits de l&#8217;Homme et Agence europ\u00e9enne des droits fondamentaux, 2014<\/span><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><span style=\"font-size: small;\"><span lang=\"fr-FR\">Disponible en ligne\u00a0: <\/span><\/span><a href=\"http:\/\/www.echr.coe.int\/Documents\/Handbook_data_protection_FRA.pdf\" target=\"_top\"><span style=\"font-size: small;\"><span lang=\"fr-FR\"><u><b>http:\/\/www.echr.coe.int\/Documents\/Handbook_data_protection_FRA.pdf<\/b><\/u><\/span><\/span><\/a><\/li>\n<li><span style=\"font-size: small;\"><span lang=\"fr-FR\">Mis \u00e0 jour en 2018 (mais disponible uniquement en anglais pour l\u2019instant)\u00a0: <\/span><\/span>Union europ\u00e9enne, Conseil de l\u2019Europe (dirs.), 2018, <i>Handbook on European data protection law<\/i>, 2018 edition, Luxembourg, Publications Office of the European Union (Handbook \/ FRA, European Union Agency for Fundamental Rights), 397\u00a0p.\u00a0<span style=\"font-size: small;\"><span lang=\"fr-FR\">: <\/span><\/span><a href=\"https:\/\/fra.europa.eu\/en\/publication\/2018\/handbook-european-data-protection-law\">https:\/\/fra.europa.eu\/en\/publication\/2018\/handbook-european-data-protection-law<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p lang=\"fr-FR\"><u><b>Pour s&#8217;initier aux aspects techniques<\/b><\/u><\/p>\n<p><span lang=\"fr-FR\">Les meilleurs tutoriels en langue fran\u00e7aise pour s&#8217;initier \u00e0 l&#8217;informatique sont sur le<\/span><span lang=\"fr-FR\">s archives de l\u2019ancien Site du Z\u00e9ro<\/span><span lang=\"fr-FR\">\u00a0: <\/span><a href=\"http:\/\/sdz.tdct.org\/\"><span style=\"color: #000000;\"><span style=\"font-family: Liberation Serif, sans-serif;\"><span style=\"font-size: small;\"><span lang=\"fr-FR\">http:\/\/sdz.tdct.org<\/span><\/span><\/span><\/span><\/a><\/p>\n<p><span style=\"font-size: small;\"><span lang=\"fr-FR\">Une bonne explication des aspects techniques du r\u00e9seau Internet, par Benjamin Bayart\u00a0: <a href=\"https:\/\/www.youtube.com\/watch?v=pwT2egqlke4\" target=\"_top\">https:\/\/www.youtube.com\/watch?v=pwT2egqlke4<\/a><\/span><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Information et soci\u00e9t\u00e9s contemporaines Objectif g\u00e9n\u00e9ral du cours Les flux d\u2019information a toujours ont toujours fait l\u2019objet d\u2019une forme de contr\u00f4le politique. Dans le cadre du capitalisme cognitif contemporain, le contr\u00f4le de l\u2019information et de sa circulation est devenu l\u2019objet&#8230;<\/p>\n","protected":false},"author":1,"featured_media":578,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14],"tags":[15,29,23,21],"class_list":["post-575","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-enseignement","tag-cours","tag-droit","tag-relations-internationales","tag-science-politique"],"_links":{"self":[{"href":"https:\/\/www.julienrossi.com\/blog\/wp-json\/wp\/v2\/posts\/575","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.julienrossi.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.julienrossi.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.julienrossi.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.julienrossi.com\/blog\/wp-json\/wp\/v2\/comments?post=575"}],"version-history":[{"count":4,"href":"https:\/\/www.julienrossi.com\/blog\/wp-json\/wp\/v2\/posts\/575\/revisions"}],"predecessor-version":[{"id":584,"href":"https:\/\/www.julienrossi.com\/blog\/wp-json\/wp\/v2\/posts\/575\/revisions\/584"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.julienrossi.com\/blog\/wp-json\/wp\/v2\/media\/578"}],"wp:attachment":[{"href":"https:\/\/www.julienrossi.com\/blog\/wp-json\/wp\/v2\/media?parent=575"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.julienrossi.com\/blog\/wp-json\/wp\/v2\/categories?post=575"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.julienrossi.com\/blog\/wp-json\/wp\/v2\/tags?post=575"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}