Bloss, W. (2009). Transforming US Police Surveillance in a New Privacy Paradigm. Police Practice and Research,10(3), 225-238.
After the devastating effect of the 9/11 terrorist attack, there were heightened counterterrorism approaches adopted and implemented by the government and the security agencies. The aftermath represented a drastic change in socially acceptable belief of security and privacy. In his book, Bloss has investigated the established statutes, doctrines and laws legalizing this new conceptualization and he has efficiently commented on its impact to individual’s privacy. He articulates views of this paradigm and describes it as a unique entity; a tenet that has not been fully described by various authors. His work is essential to the study of the state surveillance to personal privacy and the effects it has on the citizens. His work is relevant to this research because it systematically provides the different laws and doctrines that led to this new paradigm.
Champion, J. (2005). The Revamped FISA: Striking a Better Balance Between the Government’s Need to Protect Itself and the 4th Amendment. Vanderbilt Law Review, 58(5), 125-145.
Champion has articulated the constitutionality and the history of the state’s online surveillance. In his article, Champion has traced the FISA-like law evolution throughout history, and he has spent a large portion of his work discussing the works that had been adopted after the 9/11 terrorist attack. With its efficient discussion concerning the recent applicability of the Fourth Amendments to the digital communications, the article has successfully explained the history of surveillance and its impact to the security efforts implemented in the society. The article has successfully contributed to the topic because it has efficiently provided the history as to why the mass surveillance has been adopted by the government.
D’Arcus, B. (2006). Boundaries of Dissent: Protest and State Power in the Media Age. New York: Routledge.
D’Arcus has comprehensively investigated the effect that digital age has on the traditional perception on both the private and the public sphere. He determines how the political protects are constrained and structured by the dynamic media technologies. He has evaluated on how the state agents and the protestors have navigated this changing field to maintain and challenge the balance to the power of the society. The book has illuminated the spatial politics insights that have contributed to the twenty-first digital age. The book is essential to the topic because it provides comprehensive insight on how technology has changed and how the government and the public are utilizing it to determine security.
Fuchs, C. (2012). Internet and Surveillance: The Challenges of Web 2.0 and Social Media. New York: Routledge.
The descriptive title the book articulates its contents and the description of the book that compellingly assesses the stakes and the realities of the current distribution of power, whereby corporations and governments assume that their existence necessitates their collection of troves of individual data. Fuchs argues that corporations and the government use technologies to facilitate an authoritarian society that allows surveillance and also their control. He describes the essential software and processes implemented by the authorities that facilitate collection and the analysis of consumer data. The book describes the advantages and the disadvantages of such processes in the society, making the book relevant to the topic. It also provide the implications to the existence and control of democracy. It comprehensively articulates the implications of society surveillance.
Mullen, M., Hart, P., & Dinev, P. (2008). Internet Privacy Concerns and Beliefs about Government Surveillance – An Empirical Investigation. The Journal of Strategic Information Systems, 17(3), 214-233.
Mullen, Hart and Dinev provide comprehensive empirical evidence concerning the primary societal perception regarding the relationship between the government surveillance and individual privacy. Their research confirm that the concerns concerning individual privacy are vital to individuals demonstrating their willingness to provide/disclose their informant due to the collective security. The authors comprehensively explains the reasons as to why the government conducts their security surveillance aiming to enhance the security its population. However, the citizens believe that the government needs to adopt appropriate strategies of conducting their surveillance. This article is relevant to the topic because it provides the advantages and the disadvantages of the state surveillance. Although it violates privacy rights, when performed appropriately by adhering to the norms, then, it is essential to the community.
Nissenbaum, H. (2010). Privacy in Context: Technology, Policy, and the Integrity of Social life. Stanford: Stanford University Press.
In her book, Nissenbaum provides a detailed and nuanced philosophical assessment of the various problems associated with privacy in the digital age. She proceeds by formulating an analytical structure by adopting a contextual integrity arguing appropriate steps to solve the contemporary privacy issues. The contextual integrity is the core concept provided in the book, and she asserts that it is used to provide efficient explanation what it means when the state violates the privacy rights of an individual. The book is relevant to the topic because it helps to understand the advantages and the disadvantages of state surveillance and that an appropriate privacy framework respects the social contexts. It is important to understand that when the state ignores these norms, then, it is perceived as violating privacy.
Slobogin, C. (2007). Slobogin, Christopher. Privacy at Risk: The New Government Surveillance and the Fourth Amendment. Chicago: University of Chicago.
Slobogin has presented one of the most straightforward discussion concerning individual’s privacy. In this book, Slobogin has efficiently detailed the present landscape and also the dominant surveillance acts affirming that these practices contradict with the norms that have been set in the Fourth Amendments. He concludes his work by arguing that the government and various security agencies need to establish a more efficient regulatory regime providing protection to the privacy rights. He has placed several recommendations that the appropriate authorities need to enshrine in the new legislations. His works are useful to the topic because it helps to analyze the existing privacy policies and ways to recommend on adopting new policies that protect privacy rights.