Você está na página 1de 8

Source and Author Info Categorical Definition Cause and Value/ Action Jurisdiction

Source Type Effect (Causal) Evaluation


1.Jon Penney Jon Penney lawyer, Wikipedia contains chilling-effect The release of Does the chilling .
Scholarly- doctoral student at the over 30 million articles (the idea that NSA documents effect exist and
Berkeley Oxford Internet Institute. available in over 200 laws, regulations, caused the have any impact?
Technology Law Specializes in digital languages and is among or state chilling effect
ournal media, cyber-security, and the ten most visited surveillance can on Wikipedia.
human rights. websites globally. deter people from Traffic to
exercising their Wikipedia
freedoms or articles on
engaging in topics that raise
entirely legal privacy
activities) concerns
decreased.
2. Lee Fang Lee Fang journalist Several tech companies -Algorithms by -Collecting
Online News specializing in public pursuing research on private intelligence on
Publication - The policy. Co-founded social media mining companies to foreign
ntercept RepublicReport.org, a blog and surveillance fund predict your adversaries has
to cover political In-Q-Tel, a firm that behavior based potential benefits
corruption. equips CIA to support on your for
its intelligence personal data counterterrorism,
capabilities. could lead to but such CIA-
unlawfully supported
targeting people.surveillance
technology is
also used for
domestic law
enforcement and
by private sector
to spy on activist
groups.
3. Jonathan Jonathan Manes As a result of Merrills -NSL is -Online service Online service
Manes Assistant Clinical successful lawsuit, he an administrative providers should providers and
Scholarly - Yale Professor at the University was able to disclose subpoena issued reclaim their other companies
Law Journal. at Buffalo School publicly a list of sixteenby the United simple right to that mediate our
of Law. specific categories of States speak. digital
information that the government to communications
FBI believes it can gather information are in a special
obtain from him for national position to
using an NSL. security purposes. enhance
surveillance
transparency.

4 Scholarly- Christian Pieter (professor privacy paradox Privacy also Why do users The concept of Institutions and
Cyberpsycholog of communication is a divergence clashes with choose to cynicism should governments
y: Journal of management at University between attitudes itself. disclose be applied to should pay
Psychosocial of Leipzig). Hoffmann, and behavior Enhancing or significant online self- attention to
Research on Christoph Lutz, related to (online) preserving amounts of disclosure and privacy cynicism,
Cyberspace Giulia Ranzini privacy. privacy along a personal data on institutional as individuals who
certain axis may the Internet privacy threats, in are cynical about
entail despite reporting particular. their online
compromising privacy privacy might not
privacy along concerns? limit their lack of
another axis. trust to Internet
service providers,
especially if they
feel unprotected or
ignored.
5 Scholarly- David E. Pozen, professor Privacy-privacy Whenever A sense of Privacy should be
University of at the Columbia Law tradeoffs come in a securing privacy security about identified as an
Chicago Law School. variety of flavors. on one margin ones online data interest in
School Sometimes they are compromises is a necessary if breathing room to
unexpected and privacy on insufficient engage in socially
unwanted. another margin, a condition for the situated processes
privacy-privacy attainment of of boundary
tradeoff arises. privacy in the management.
digital age.

6 Scholarly- Shaun B. Spencer, Under the binary The expectation Should the law
South Carolina Assistant Professor of Law conception, courts of privacy must treat information
Law Review and the Director of Legal and legislators be one that as private even
Skills at the University of decide whether society is though others may
Massachusetts School of information is prepared to know about it?
Law. private by recognize as
examining reasonable.
whether anyone
outside the
subject, or the
subjects
confidants, has
access to the
information.

7 Third Way- An Mieke Eoyang, Vice Section 702 was The legitimate Policymakers Members of
online public President for Third Way's written to be an security concerns should craft Congress
policy National Security Program important that motivated reforms that
ommentary intelligence tool. Section 702 guard against the
publication. currently misuse of Section
outweigh valid 702 by law
concerns related enforcement and
to civil liberties redefine the
and commerce. relationship
between the IC
and tech
companies.
8 Time weekly Manoush Zomorodi, Being in control of who But if we care so Use unique Corporations like
news Host and managing can get information much, why do we passwords on all Google and
publication. editor of Note to Self . about us is very keep giving our your accounts; Facebook - as well
important to 74% of information Consider some as retailers - track
Americans. away? encrypted tools. us.

9. Slate Elizabeth The author Surveillance This study


(Popular online Stoycheff discovered that chills in a way should serve as
magazine) Professor of exposure to the that suppresses yet another red
Communication terms of the ideas of flag, signaling
at Wayne State agreement those on the the need for
University. dampened fringes of greater
individuals society, while transparency,
willingness to amplifying skepticism,
express or dominant, and
otherwise mainstream quantifiable
support their opinions. research.
political views.

10. Betanews Mauricio The major Is the so-called The people of


(Online niche Prinzlau threat of intrusion on our America must
tech news) terrorism fuels online activities a decide whether they
the need for the threat to the value their "privacy"
NSAs common man or or the security of
surveillance. only to those with their nation in
cruel intentions? general more.
11. U.S. News Daniel J. To what extent Everywhere in Would such an
Online news and Gallington have the various the approach to Our main
ranking website democratic undemocratic looking at Internet focus should
(Popular) governments world, e.g., traffic for spies, be on how,
betrayed the China, terrorists and who and on
modern day everyone is criminals be 1) what basis a
realities of the watched all the reasonable 2) determination
Internet by their time, including constitutional? is made to look
various degrees all Internet at a particular
of monitoring? activity, Internet
because communicatio
all dissent is a n or category
threat to the of
regime in communicatio
power. ns, and how
this
determination
is monitored
and by who.

12. Popular Chuck Is government U.S. Are government Even the FISA
Source: CQ McCutcheon surveillance surveillance surveillance (Foreign Intelligence
Researcher Coeditor of conducted by laws are based programs crucial Surveillance) Court
Congressional law on the to prevention? has objected to the
Quarterly's enforcement Constitutions NSAs surveillance
Politics in officials or the Fourth Is government practices.
America and a rest of the Amendment. surveillance
reporter for the government? making the
Newhouse country safer?
News Service.

13. Scholarly: Neil M. Surveillance is We should Surveillance is not


Harvard Law Richards the focused, carefully just for governments
Review. Professor of systematic and scrutinize any either. Private
Law, routine surveillance companies big and
Washington attention to that threatens small generate vast
University personal details our intellectual fortunes from the
School of Law. for purposes of privacy. collection, use, and
influence, sale of personal data.
management,
protection or
direction.

14.
Working Bibliography

Eoyong, Mieke. Why Electronic Surveillance Reform is Necessary? ThirdWay February 28, 2017 Web. 5 April. 2017.

Fang, Lee. The CIA is Investing in Firms that Mine Your Tweets and Instagram Photos The Intercept 14 Apr 2016

Web. 5 April 2017.

Hoffman, Christian. The impact of online media on stakeholder engagement and the governance of corporations

Journal of Public Affairs 25 June 2014: Web. 5 April. 2017.

J. Gallington, Daniel. The Case for Internet Surveillance. US News, 18 Sept 2013. Web. 6 March. 2017.

McCutcheon, Chuck. Government Surveillance: Is Government Spying on Americans Excessive?. CQ Researcher, 30 Aug 2013. Web. 6 March. 2017.

M. Neal, Richards. The Dangers of Surveillance Harvard Law Review, 20 May 2013. Web. 5 April. 2017.

Manes, Jonathan. Online Service Providers and Surveillance Law Transparency. The Yale Law Journal 14.12 (2002): 21. Academic Search Premier.

Web. 5 April. 2017.

Penney, Jon. Chilling Effects: Online Surveillance and Wikipedia Use. Berkeley Technology Law Review, 27 Apr 2016

Web. 5 April. 2017.


Pozen, David. Technological Change In The Workplace: A Statewide Survey Of Community College Library And.. Harvard Law Review (25 June 2015):

Web. 5 April. 2017.

Prinlau, Maricio. Cooperating with the good guys: Is NSA snooping really that bad?. Betanews, 25 Feb 2016. Web. 6 March. 2017.

Stoycheff, Elizabeth. Mass Surveillance Chills Online Speech Even When People Have Nothing to Hide. Slate, 3 May 2016. Web. 6 March. 2017.

Shaun, B Spencer. The Surveillance Society and the Third-Party Privacy Problem. South Carolina Law Review (1 Feb 2014): 84. Web. 5 April. 2017.

Você também pode gostar