The digital divide in the post-Snowden era

Clark, Ian The digital divide in the post-Snowden era. Journal of Radical Librarianship, 2016, vol. 2. [Journal article (Unpaginated)]

[img] Text
Clark-2016.pdf - Published version
Available under License Creative Commons Attribution.

Download (208kB)

English abstract

Edward Snowden's disclosure of mass surveillance of the internet has necessitated a re-examining of our relationship with the internet. Rather than a tool that broadens democratic engagement, the internet is increasingly used as a tool to manage and direct citizens, particularly via the mass collection of personal data by both the state and large multi-national corporations. Although online tools are available to protect intellectual privacy and ensure individuals can fully engage in the democratic process, they are subject to the same limitations as other aspects of the digital divide in terms of social, economic and cultural capital. Regarding online intellectual privacy, the evidence suggests there are more efforts by the library profession to protect the rights of the individual in the United States, the home of the NSA, than in the United Kingdom. This paper seeks to investigate the state of this aspect of the digital divide and what is being done to address it.

Item type: Journal article (Unpaginated)
Keywords: mass surveillance; digital divide; intellectual privacy; democracy
Subjects: B. Information use and sociology of information > BZ. None of these, but in this section.
E. Publishing and legal issues. > EE. Intellectual freedom.
L. Information technology and library technology > LH. Computer and network security.
Depositing user: Stuart Lawson
Date deposited: 23 Mar 2016 15:02
Last modified: 23 Mar 2016 15:02
URI: http://hdl.handle.net/10760/29131

References

Ahmad, M. S., Musa, N. E., Nadarajah, R., Hassan, R., & Othman, N. E. (2013). Comparison between android and iOS Operating System in terms of security. 2013 8th International Conference on Information Technology in Asia – Smart Devices Trend: Technologising Future Lifestyle, Proceedings of CITA 2013, 2–5. https://doi.org/10.1109/CITA.2013.6637558

ALA Office for Intellectual Freedom. (2015). ALA’s Office for Intellectual Freedom announces sponsorship of Let’s Encrypt initiative. Retrieved 8 November 2015, from http://www.oif.ala.org/oif/?p=5536

American Library Association. (1996). Library Bill of Rights. Retrieved 27 November 2015, from http://www.ala.org/advocacy/intfreedom/librarybill

American Library Association. (2002). Privacy: An Interpretation of the Library Bill of Rights. Retrieved 27 November 2015, from http://www.ala.org/Template.cfm?Section=interpretations&Template=/ContentManagement/ContentDisplay.cfm&ContentID=88625

American Library Association. (2015). Key Issue: Library Funding, 8410. Retrieved from http://www.ala.org/offices/sites/ala.org.offices/files/content/ogr/FINAL LIBRARY FUNDING One-Pager SJM 06-17-15.pdf

arma. (2014). Tor security advisory: “relay early” traffic confirmation attack. Retrieved 2 December 2015, from https://blog.torproject.org/blog/tor-security-advisory-relay-early-traffic-confirmation-attack

Barclays. (2015). Barclays Digital Eagles. Retrieved 15 November 2015, from http://www.barclays.co.uk/DigitalEagles/P1242671738729

Barron, S. (2016). 11 open-source alternatives. Retrieved 23 February 2016, from https://undaimonia.wordpress.com/2016/01/07/open-source-listicle/

Bauman, Z. (2001). The individualized society. Cambridge UK: Polity Press.

BBC Learning. (2014). BBC Basic Online Skills. Retrieved from http://downloads.bbc.co.uk/aboutthebbc/insidethebbc/whatwedo/learning/audienceresearch/basic-online-skills-nov-2014.pdf

Bentham, J. (1995). The Panopticon Writings. (M. Bozovic, Ed.). London: Verso.

Bernal, P. (2015). The Surveillance Elephant in the Room…. Retrieved 27 November 2015, from https://paulbernal.wordpress.com/2015/10/07/the-surveillance-elephant-in-the-room/

Bernal, P. (2016). You can’t deny message encryption to some individuals without denying it to all. Retrieved from http://blogs.lse.ac.uk/businessreview/2016/03/08/you-cant-deny-encryption-to-some-individuals-without-denying-it-to-all

Big Lottery Fund. (2004). The People’s Network: evaluation summary. Retrieved from http://www.biglotteryfund.org.uk/er_eval_peoples_network_evaluation_summary_uk.pdf

Birdwell, J., Cadywould, C., & Reynolds, L. (2015). Tune In, Turn Out. Demos. Retrieved from http://www.demos.co.uk/files/Tune_in_-_web.pdf?1419813387

Bloom, D. (2014). SXSW: Edward Snowden Panel Says Don’t Count On Ad-Based Online Companies To Safeguard Your Data. Retrieved 8 November 2015, from http://deadline.com/2014/03/edward-snowden-sxsw-panel-internet-privacy-696465/

Brass Horn Communications. (2015). About us. Retrieved 7 December 2015, from https://brasshorncommunications.uk/about/

Brennan, J. O., Hamre, J. J., & Lynn III, W. J. “Bill.” (2015). Center for Strategic and International Studies Global Security Forum 2015: Opening Session. Retrieved from https://csis.org/files/attachments/151116_GSF_OpeningSession.pdf

Brown, I. (2011). Communications data retention in an evolving internet. International Journal of Law and Information Technology, 19(2), 95–109. https://doi.org/10.1093/ijlit/eaq016

Brown, I. (2014). The feasibility of transatlantic privacy-protective standards for surveillance. International Journal of Law and Information Technology, 0, 1–18. https://doi.org/10.1093/ijlit/eau007

Brown, I., & Korff, D. (2009). Terrorism and the Proportionality of Internet Surveillance. European Journal of Criminology, 6 (2), 119–134. https://doi.org/10.1177/1477370808100541

Burns, D. (2015). Interview with Alison Macrina. Retrieved 8 November 2015, from http://hacklibraryschool.com/2015/05/27/interview-with-alison-macrina-flexlibris/

Cannataci, J. A. (2016). Report of the Special Rapporteur on the right to privacy. Retrieved from http://www.ohchr.org/Documents/Issues/Privacy/A-HRC-31-64.doc

Carmon, I. (2013). How we broke the NSA story. Retrieved 11 November 2015, from http://www.salon.com/2013/06/10/qa_with_laura_poitras_the_woman_behind_the_nsa_scoops/

Carpenter, Z. (2015). Librarians Versus the NSA. Retrieved 8 November 2015, from http://www.thenation.com/article/librarians-versus-nsa/

Casciani, D. (2003). Spy pictures of suffragettes revealed. Retrieved 8 November 2015, from http://news.bbc.co.uk/1/hi/magazine/3153024.stm

Castells, M. (2004). The network society : a cross-cultural perspective. Northampton, Mass.: Edward Elgar Publishing.

Charteris, S. (2009). A local Inquiry into the Public Library Service Provided by Wirral Metropolitan Borough Council. Department for Culture, Media and Sport. Retrieved from https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/77448/wirral_local_inquiry.doc

Cilip. (2005). Statement on intellectual freedom, access to information and censorship. Retrieved 8 November 2015, from http://www.cilip.org.uk/cilip/archived-policy-statements/statement-intellectual-freedom-access-information-and-censorship

Cilip. (2012). Ethical Principles for Library and Information Professionals, 2004. Retrieved from http://www.cilip.org.uk/sites/default/files/documents/Ethical%20principles%20for%20library%20and%20information%20professionals%20October%202012.pdf

Cilip. (2013). Short Briefing on the Public Libraries and Museums Act 1964, (January), 2013. Retrieved from http://www.cilip.org.uk/sites/default/files/documents/Briefing on Public Libraries and Museums Act 1964.pdf

Clark, I. (2012). To what extent do community libraries address the concerns of the digital divide ? University of Aberystwyth.

Clark, I. (2016). Barclays and the library marketing opportunity. Retrieved 3 February 2016, from http://infoism.co.uk/2016/01/barclays-and-the-library-marketing-opportunity/

Cohen, J. E. (2013). What Privacy Is For. Harvard Law Review, 126 (7), 1904–1933. Retrieved from http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2175406

Council of Europe. (2000). New information technologies: public access and freedom of expression in cultural institutions. Retrieved from http://www.coe.int/t/dg4/cultureheritage/culture/Resources/DECS_CULT_NTI_libex(2000)2_EN.pdf

Council of Europe. (2002). Guidelines on human rights and the fight against terrorism. Retrieved from http://www.coe.int/t/dlapil/cahdi/Source/Docs2002/H_2002_4E.pdf

Cox, J. (2015). Encryption App Telegram Probably Isn’t as Secure for Terrorists as ISIS Thinks. Retrieved 20 November 2015, from http://motherboard.vice.com/read/encryption-app-telegram-probably-isnt-as-secure-for-terrorists-as-isis-thinks

Cox, J. (2016). Pssst, Your PGP Is Leaking. Retrieved 2 February 2016, from http://motherboard.vice.com/read/pssst-your-pgp-is-leaking

Crocker, A. (2015). EFF Asks Court on Behalf of Libraries and Booksellers to Recognize Readers’ Right to Be Free of NSA’s Online Surveillance. Retrieved 8 November 2015, from https://www.eff.org/deeplinks/2015/09/eff-asks-court-behalf-libraries-and-booksellers-recognize-readers-right-be-free

Crocker, A., Rumold, M., Greene, D., & Berlage, J. I. Wikimedia Foundation, et al. v. National Security Agency, et al., Case 1:15-cv-00662-TSE (2015). Retrieved from https://www.eff.org/files/2015/09/03/wikimedia_amicus_brief_filed.pdf

Cunningham, A. (2015). Android 6.0 re-implements mandatory storage encryption for new devices. Retrieved 24 February 2016, from http://arstechnica.com/gadgets/2015/10/android-6-0-re-implements-mandatory-device-encryption-for-new-devices/

De Marco, S., Robles, J. M., & Antino, M. (2014). Digital skills as a conditioning factor for digital political participation. Communications, 39 (1), 43–65. https://doi.org/10.1515/commun-2014-0004

Deloitte Insight. (2014). Data Nation 2014 Putting customers first. Retrieved from http://www2.deloitte.com/uk/en/pages/deloitte-analytics/articles/data-nation-2014-putting-customers-first.html

DiMaggio, P., & Hargittai, E. (2001). From the ’ Digital Divide ’ to ’ Digital Inequality ': Studying Internet Use as Penetration Increases. Princeton Center for Arts and Cultural Policy Studies, Working Paper, 15(15). Retrieved from http://webuse.umd.edu/webshop/resources/Dimaggio_Digital_Divide.pdf

Dobija, J. (2014). The First Amendment Needs New Clothes. American Libraries, 38 (8), 50–53.

Doyle-Burr, N. (2015). Despite Law Enforcement Concerns, Lebanon Board Will Reactivate Privacy Network Tor at Kilton Library. Retrieved 8 November 2015, from http://www.vnews.com/home/18620952-95/library-joins-privacy-network

Dredge, S. (2014). Worried about leaky chats? Messaging apps are responding with security features. Retrieved 17 January 2016, from http://www.theguardian.com/technology/2014/dec/11/messenger-private-chats

Dreyfuss, E. (2015). Sanity and Privacy Win Out in the Library-Tor Kerfuffle. Retrieved 8 November 2015, from http://www.wired.com/2015/09/sanity-privacy-win-library-tor-kerfuffle/

Eubanks, V. (2011). Digital dead end fighting for social justice in the information age. Cambridge, Mass.: MIT Press.

European Court of Human Rights. Osman v. The United Kingdom (1998). Retrieved from http://hudoc.echr.coe.int/eng?i=001-58257

European Court of Human Rights. (2000). Case of Amann v. Switzerland, (September 2000). Retrieved from http://hudoc.echr.coe.int/eng?i=001-58497

European Court of Human Rights. (2008). S. and Marper v. The United Kingdom. Retrieved from http://hudoc.echr.coe.int/eng?i=001-90051

European Court of Human Rights. Roman Zakharov v. Russia (2015). Retrieved from http://hudoc.echr.coe.int/fre?i=001-159324

European Court of Justice. (2015). Maximillian Schrems v. Data Protection Commissioner. Retrieved 8 November 2015, from http://curia.europa.eu/juris/document/document.jsf?text=&docid=168421&pageIndex=0&doclang=en&mode=lst&dir=&occ=first∂=1&cid=326249

Evans, M. (2005). The data-informed marketing model and its social responsibility. In S. Lace (Ed.), The glass consumer life in a surveillance society. Bristol: Policy.

Evans, R., & Lewis, P. (2013). Undercover : the true story of Britain’s secret police. London: Faber and Faber.

Farivar, C. (2012). Private: some search engines make money by not tracking users. Retrieved 16 February 2016, from http://arstechnica.com/business/2012/05/private-the-search-engines-that-make-money-by-not-tracking-users/

Flashpoint Partners. (2014). Measuring the Impact of the Snowden Leaks on the Use of Encryption by Online Jihadists. Retrieved from https://fpjintel.com/portal/assets/File/Flashpoint_Jihadi_Encryption_Software_Sept2014.pdf

Foucault, M. (1977). Discipline and punish : the birth of the prison. New York: Pantheon Books.

Fuchs, C. (2010). Internet and society: social theory in the information age. London: Routledge.

Gallagher, R. (2015). From Radio to Porn, British Spies Track Web Users’ Online Identities. Retrieved 8 November 2015, from https://theintercept.com/2015/09/25/gchq-radio-porn-spies-track-web-users-online-identities/

Gangadharan, S. P. (2012). Digital inclusion and data profiling. First Monday. Retrieved from http://firstmonday.org/ojs/index.php/fm/article/view/3821/3199

Gibbs, S. (2015a). Facebook accused of spying on Belgian citizens like the NSA. Retrieved 8 November 2015, from http://www.theguardian.com/technology/2015/sep/21/facebook-spying-belgian-citizens-nsa-data-regulator-lawsuit

Gibbs, S. (2015b). Google can unlock some Android devices remotely, district attorney says. Retrieved 6 December 2015, from http://www.theguardian.com/technology/2015/nov/24/google-can-unlock-android-devices-remotely-if-phone-unencrypted

Giroux, H. A. (2015). Totalitarian Paranoia in the Post-Orwellian Surveillance State. Cultural Studies, 29 (2), 108–140. https://doi.org/10.1080/09502386.2014.917118

Google. (2015). Ads in Gmail. Retrieved 8 November 2015, from https://support.google.com/mail/answer/6603

Greenwald, G., MacAskill, E., Poitras, L., Ackerman, S., & Rushe, D. (2013). Microsoft handed the NSA access to encrypted messages. Retrieved 8 November 2015, from http://www.theguardian.com/world/2013/jul/11/microsoft-nsa-collaboration-user-data

grugq. (2015a). Operational Telegram. Retrieved 20 November 2015, from http://grugq.tumblr.com/post/133453305233/operational-telegram

grugq. (2015b). Signals, Intelligence. Retrieved 20 November 2015, from https://medium.com/@thegrugq/signal-intelligence-free-for-all-5993c2f72f90#.kcrudz6bm

Hargittai, E. (2002). Differences in people’s online skills. First Monday. Ghosh, Rishab Aiyer. Retrieved from http://firstmonday.org/ojs/index.php/fm/article/view/942/864

Harris, J. (2009). Wirral library closures: Centralisation is undone by people power. Retrieved 28 January 2016, from http://www.theguardian.com/commentisfree/2009/apr/06/libraries-andyburnham

Home Office. (2012). Draft Communications Data Bill. Retrieved from http://www.official-documents.gov.uk/document/cm83/8359/8359.pdf

Home Office. (2015). Draft Investigatory Powers Bill. Retrieved from https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/473770/Draft_Investigatory_Powers_Bill.pdf

Home Office. (2016a). Investigatory Powers Bill : Government Response to Pre-Legislative Scrutiny. Retrieved from https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/504174/54575_Cm_9219_WEB.PDF

Home Office. (2016b). Investigatory Powers Bill: overarching documents – Publications – GOV.UK. Retrieved from https://www.gov.uk/government/publications/investigatory-powers-bill-overarching-documents

Humphreys, L. (2011). Who’s Watching Whom? A Study of Interactive Technology and Surveillance. Journal of Communication, 61 (4), 575–595. https://doi.org/10.1111/j.1460-2466.2011.01570.x

Ifla. (2015). IFLA Publishes a Statement on Privacy in the Library Environment. Retrieved 8 November 2015, from http://www.ifla.org/node/9803

Ipsos MORI. (2015). Basic Digital Skills. Retrieved from https://goon-uk-prod.s3-eu-west-1.amazonaws.com/uploads/Basic Digital Skills_UK Report 2015_131015_FINAL.pdf

Jordan, T. (2015). Information politics: liberation and exploitation in the digital society. Pluto Press.

Kaye, D. (2015). Report of the Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression. Retrieved from http://www.ohchr.org/EN/Issues/FreedomOpinion/Pages/CallForSubmission.aspx

King, S., McMenemy, D., & Poulter, A. (2006). Effectiveness of ICT training for public library staff in the UK: staff views. The Electronic Library, 24 (2), 265–276. https://doi.org/10.1108/02640470610649281

Lee, M. (2015a). Chatting in Secret While We’re All Being Watched. Retrieved 5 March 2016, from https://theintercept.com/2015/07/14/communicating-secret-watched/

Lee, M. (2015b). Edward Snowden Explains How To Reclaim Your Privacy. Retrieved 16 February 2016, from https://theintercept.com/2015/11/12/edward-snowden-explains-how-to-reclaim-your-privacy/

Leopold, J. (2014). Exclusive: Emails reveal close Google relationship with NSA. Retrieved 8 November 2015, from http://america.aljazeera.com/articles/2014/5/6/nsa-chief-google.html

Lichtblau, E. (2005). F.B.I., Using Patriot Act, Demands Library’s Records. Retrieved 24 February 2016, from http://www.nytimes.com/2005/08/26/politics/fbi-using-patriot-act-demands-librarys-records.html

Lynch, M. P. (2015). The philosophy of privacy: why surveillance reduces us to objects. Retrieved 23 February 2016, from http://www.theguardian.com/technology/2015/may/07/surveillance-privacy-philosophy-data-internet-things

Lyon, D. (1994). From Big Brother to Electronic Panopticon. In The Electronic Eye: The Rise of Surveillance Society (pp. 57–80). Retrieved from http://home.fnal.gov/~annis/digirati/otherVoices/Lyon.html

Lyon, D. (2007). Surveillance studies: an overview. Cambridge, UK; Malden, MA: Polity.

Lyon, D. (2010). Liquid Surveillance: The Contribution of Zygmunt Bauman to Surveillance Studies. International Political Sociology, 4 (4), 325–338. https://doi.org/10.1111/j.1749-5687.2010.00109.x

Lyon, D. (2015). The Snowden Stakes: Challenges for Understanding. Surveillance and Society, 13 (2), 139–152.

Maass, P. (2013). How Laura Poitras Helped Snowden Spill His Secrets. Retrieved 23 February 2016, from http://www.nytimes.com/2013/08/18/magazine/laura-poitras-snowden.html

MacAskill, E. (2013). NSA paid millions to cover Prism compliance costs for tech companies. Retrieved 11 November 2015, from http://www.theguardian.com/world/2013/aug/23/nsa-prism-costs-tech-companies-paid

MacAskill, E., Borger, J., Hopkins, N., Davies, N., & Ball, J. (2013). GCHQ taps fibre-optic cables for secret access to world’s communications. Retrieved 12 November 2015, from http://www.theguardian.com/uk/2013/jun/21/gchq-cables-secret-world-communications-nsa

Macrina, A. (2015). The Tor Browser and Intellectual Freedom in the Digital Age. Reference and User Services Quarterly, 54 (4), 17–21.

Macrina, A., & Fatemi, N. (2015). Tor exit relays in libraries: a new LFP project. Retrieved 8 November 2015, from https://libraryfreedomproject.org/torexitpilotphase1/

Mason, R. (2015). UK spy agencies need more powers, says Cameron. Retrieved 12 November 2015, from http://www.theguardian.com/uk-news/2015/jan/12/uk-spy-agencies-need-more-powers-says-cameron-paris-attacks

McGarr, S. (2015). EU Law Analysis: Do Facebook and the USA violate EU data protection law? The CJEU hearing in Schrems. Retrieved 8 November 2015, from http://eulawanalysis.blogspot.co.uk/2015/03/does-facebook-and-usa-violate-eu-data.html

McLaughlin, J. (2015). Scope of Secretive FBI National Security Letters Revealed by First Lifted Gag Order. Retrieved 2 December 2015, from https://theintercept.com/2015/11/30/scope-of-secretive-fbi-national-security-letters-revealed-by-first-lifted-gag-order/

Mervyn, K., Simon, A., & Allen, D. K. (2014). Digital inclusion and social inclusion: a tale of two cities. Information, Communication & Society, 17 (9), 1086–1104. https://doi.org/10.1080/1369118X.2013.877952

Min, S.-J. (2010). From the digital divide to the democratic divide: internet skills, political interest, and the second-level digital divide in political internet use. Journal of Information Technology & Politics, 7, 22–35. https://doi.org/10.1080/19331680903109402

Moody, G. (2016). It’s legal for GCHQ to break into computers and install spyware, tribunal rules. Retrieved 16 February 2016, from http://arstechnica.co.uk/tech-policy/2016/02/its-legal-for-gchq-to-break-into-computers-and-install-spyware-tribunal-rules/

Morris, D. S., & Morris, J. S. (2013). Digital inequality and participation in the political process: Real or imagined? Social Science Computer Review, 31 (5), 589–600. https://doi.org/10.1177/0894439313489259

Nakashima, E., & Peterson, A. (2016). The British want to come to America — with wiretap orders and search warrants. Retrieved 16 February 2016, from https://www.washingtonpost.com/world/national-security/the-british-want-to-come-to-america--with-wiretap-orders-and-search-warrants/2016/02/04/b351ce9e-ca86-11e5-a7b2-5a2f824b02c9_story.html

Norcie, G., Blythe, J., Caine, K., & Camp, L. J. (2014). Why Johnny Can’t Blow the Whistle: Identifying and Reducing Usability Issues in Anonymity Systems. Proceedings 2014 Workshop on Usable Security. https://doi.org/10.14722/usec.2014.23022

O’Neill, P. H. (2016). New Hampshire bill allows public libraries to run Tor in the face of federal challenges. Retrieved 24 February 2016, from http://www.dailydot.com/politics/new-hampshire-tor-library-legislation/

Ofcom. (2015). Adults’ media use and attitudes report. Retrieved from http://stakeholders.ofcom.org.uk/market-data-research/media-literacy/media-lit-research/adults-2013/

Office for National Statistics. (2015). Internet Access – Households and Individuals 2015. Retrieved from http://www.ons.gov.uk/ons/rel/rdit2/internet-access---households-and-individuals/2015/stb-ia-2015.html

Olsen, M., Schneier, B., Zittrain, J., Gasser, U., Olsen, M. G., Gertner, N., O’Brien, D. R. (2016). Don’t Panic. Making Progress on the “Going Dark” Debate. The Berkman Center for Internet & Society at Harvard University. https://cyber.law.harvard.edu/pubrelease/dont-panic/Dont_Panic_Making_Progress_on_Going_Dark_Debate.pdf

Park, Y. J. (2013). Offline Status, Online Status: Reproduction of Social Categories in Personal Information Skill and Knowledge. Social Science Computer Review, 31 (6), 680–702. https://doi.org/10.1177/0894439313485202

Park, Y. J. (2014). My whole world’s in my palm! The second-level divide of teenagers' mobile use and skill. New Media & Society, 17 (6), 977–995. https://doi.org/10.1177/1461444813520302

Peers, S. (2015). American Mass Surveillance of EU citizens: Is the End Nigh? Retrieved 8 November 2015, from http://eulawanalysis.blogspot.be/2015/09/american-mass-surveillance-of-eu.html

Pew Research Center. (2014). Global Opinions of U.S. Surveillance: United Kingdom. Retrieved 16 February 2016, from http://www.pewglobal.org/2014/07/14/nsa-opinion/country/united-kingdom/

President’s Commission on Law Enforcement and Administration of Justice. (1967). The Challenge of Crime in a Free Society, (February), 1–342. Retrieved from https://www.ncjrs.gov/App/Publications/abstract.aspx?ID=42

Price, D. (2013). A Social History of Wiretaps. Retrieved 27 November 2015, from http://www.counterpunch.org/2013/08/09/a-social-history-of-wiretaps-2/

Price, R. (2015). Android phones are cheaper than ever because of “growing income inequality” — and that’s a good thing. Retrieved 8 November 2015, from http://uk.businessinsider.com/android-iphone-price-disparity-increase-2015-2

Reiman, P. (1996). Cryptography and the First Amendment: The Right to be Unheard. John Marshall Journal of Computer & Information Law, 14 (2), 1–29. http://repository.jmls.edu/cgi/viewcontent.cgi?article=1313&context=jitpl

Renaud, K., Volkamer, M., & Renkema-Padmos, A. (2014). Why doesn’t Jane protect her privacy? Lecture Notes in Computer Science (including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8555 LNCS, 244–262. https://doi.org/10.1007/978-3-319-08506-7_13

Richards, N. M. (2008). Intellectual Privacy. Texas Law Review, 87, 387. https://doi.org/10.2139/ssrn.1108268

Richards, N. M. (2013). The dangers of surveillance. Harvard Law Review, 126 (7), 1934–1965. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2239412

Rogaway, P. (2015). The Moral Character of Cryptographic Work. Retrieved from http://web.cs.ucdavis.edu/~rogaway/papers/moral-fn.pdf

Ruoti, S., Andersen, J., Zappala, D., & Seamons, K. (2015). Why Johnny Still, Still Can’t Encrypt: Evaluating the Usability of a Modern PGP Client. ArXiv E-Prints. Retrieved from http://arxiv.org/abs/1510.08555

Rushe, D. (2014). Yahoo $250,000 daily fine over NSA data refusal was set to double “every week.” Retrieved 8 November 2015, from http://www.theguardian.com/world/2014/sep/11/yahoo-nsa-lawsuit-documents-fine-user-data-refusal

Schell, J. (2013). America’s Surveillance Net. Retrieved 8 November 2015, from http://www.thenation.com/article/americas-surveillance-net/

Schriner, J. (2015). Radical Librarian-Technologists. Journal of Radical Librarianship. Retrieved from https://journal.radicallibrarianship.org/index.php/journal/article/view/6/14

Shalal, A. (2016). Former Google CEO Schmidt to head new Pentagon innovation board. Retrieved 6 March 2016, from http://www.reuters.com/article/us-usa-military-innovation-idUSKCN0W421V

Shema, M. (2011). Web Security: Why You Should Always Use HTTPS. Retrieved 16 February 2016, from http://mashable.com/2011/05/31/https-web-security/

Simonite, T. (2015). Is Google’s Lackluster Support for Encryption a Human Rights Issue? Retrieved 11 November 2015, from http://www.technologyreview.com/news/543161/why-google-trailing-apple-on-encryption-support-is-a-human-rights-issue/

Sinclair Brody, S. (2016). Protecting Data Privacy With User-Friendly Software – Council on Foreign Relations. Retrieved 23 February 2016, from http://www.cfr.org/privacy/protecting-data-privacy-user-friendly-software/p37551

Smith, D., & Chamberlain, P. (2015). Blacklisted: the secret war between big business and union activists. Oxford: New Internationalist Publications Ltd.

Spacey, R. E. (2003). An Evaluation of the New Opportunities Fund ICT Training Programme for Public Library Staff, UK. In World Library and Information Congress : 69th IFLA General Conference and Council (pp. 1–21). Retrieved from http://archive.ifla.org/IV/Ifla69/papers/004e-Spacey.pdf

Sparks, C. (2013). What is the “digital divide” and why is it important? Javnost, 20 (2), 27–46. https://doi.org/10.1080/13183222.2013.11009113

St Vincent, S. (2016). Did the European Court of Human Rights Just Outlaw “Massive Monitoring of Communications” in Europe? Retrieved 21 January 2016, from https://cdt.org/blog/did-the-european-court-of-human-rights-just-outlaw-massive-monitoring-of-communications-in-europe/

Telegram. (2014). $300,000 for Cracking Telegram Encryption. Retrieved 24 November 2015, from https://telegram.org/blog/cryptocontest

Temperton, J. (2015a). AVG can sell your browsing and search history to advertisers. Retrieved 8 November 2015, from http://www.wired.co.uk/news/archive/2015-09/17/avg-privacy-policy-browser-search-data

Temperton, J. (2015b). Lords attempt to sneak through snoopers’ charter again. Retrieved 11 November 2015, from http://www.wired.co.uk/news/archive/2015-02/02/snoopers-charter-again

Temperton, J. (2015c). No U-turn: David Cameron still wants to break encryption. Retrieved 11 November 2015, from http://www.wired.co.uk/news/archive/2015-07/15/cameron-ban-encryption-u-turn

The Investigatory Powers Tribunal. Liberty v GCHQ & Othrs (2015). Retrieved from http://www.ipt-uk.com/docs/Liberty-Order6Feb15.pdf

The Investigatory Powers Tribunal. Lucas & Othrs v Security Service & Othrs (2015). Retrieved from http://www.intelligencecommissioner.com/docs/Caroline_Lucas_JUDGMENT.pdf

The Investigatory Powers Tribunal. Privacy International & Othrs v GCHQ & Othrs (2016). Retrieved from http://www.ipt-uk.com/docs/Privacy_Greennet_and_Sec_of_State.pdf

Tor Metrics. (2015). Direct users by country. Retrieved 2 December 2015, from https://metrics.torproject.org/userstats-relay-country.html

Travis, A. (2016). Snooper’s charter: cafes and libraries face having to store Wi-Fi users' data. Retrieved 18 February 2016, from http://www.theguardian.com/world/2016/jan/13/snoopers-charter-theresa-may-cafes-wifi-network-store-customers-data

Vagle, J. L. (2015). Furtive Encryption: Power, Trust, and the Constitutional Cost of Collective Surveillance. Indiana Law Journal, 90 (101). https://doi.org/10.1525/sp.2007.54.1.23.

Vickery, J. R. (2014). 'I don't have anything to hide, but … ': the challenges and negotiations of social and mobile media privacy for non-dominant youth. Information, Communication & Society, 18 (3), 281–294. https://doi.org/10.1080/1369118X.2014.989251

Whitten, A., & Tygar, J. D. (1999). Why Johnny can’t encrypt: A usability evaluation of PGP 5.0. Proceedings of the 8th USENIX Security Symposium, 169–184. Retrieved from https://www.usenix.org/legacy/events/sec99/full_papers/whitten/whitten_html/index.html

Wolf, N. (2012). The new totalitarianism of surveillance technology. Retrieved 8 November 2015, from http://www.theguardian.com/commentisfree/2012/aug/15/new-totalitarianism-surveillance-technology

YouGov. (2015). YouGov / Sunday Times Survey Results. Retrieved from https://d25d2506sfb94s.cloudfront.net/cumulus_uploads/document/wt26kxdn72/YG-Archive-Pol-Sunday-Times-results-160115.pdf

Zdziarski, J. (2014). Identifying back doors, attack points, and surveillance mechanisms in iOS devices. Digital Investigation, 11 (1), 3–19. https://doi.org/10.1016/j.diin.2014.01.001


Downloads

Downloads per month over past year

Actions (login required)

View Item View Item