The digital divide in the post-Snowden era
Keywords:mass surveillance, digital divide, intellectual privacy, democracy, libraries
AbstractEdward Snowden's disclosure of mass surveillance of the internet has necessitated a re-examining of our relationship with the internet. Rather than a tool that broadens democratic engagement, the internet is increasingly used as a tool to manage and direct citizens, particularly via the mass collection of personal data by both the state and large multi-national corporations. Although online tools are available to protect intellectual privacy and ensure individuals can fully engage in the democratic process, they are subject to the same limitations as other aspects of the digital divide in terms of social, economic and cultural capital. Regarding online intellectual privacy, the evidence suggests there are more efforts by the library profession to protect the rights of the individual in the United States, the home of the NSA, than in the United Kingdom. This paper seeks to investigate the state of this aspect of the digital divide and what is being done to address it.
Ahmad, M. S., Musa, N. E., Nadarajah, R., Hassan, R., & Othman, N. E. (2013). Comparison between android and iOS Operating System in terms of security. 2013 8th International Conference on Information Technology in Asia – Smart Devices Trend: Technologising Future Lifestyle, Proceedings of CITA 2013, 2–5. https://doi.org/10.1109/CITA.2013.6637558
ALA Office for Intellectual Freedom. (2015). ALA’s Office for Intellectual Freedom announces sponsorship of Let’s Encrypt initiative. Retrieved 8 November 2015, from http://www.oif.ala.org/oif/?p=5536
American Library Association. (1996). Library Bill of Rights. Retrieved 27 November 2015, from http://www.ala.org/advocacy/intfreedom/librarybill
American Library Association. (2002). Privacy: An Interpretation of the Library Bill of Rights. Retrieved 27 November 2015, from http://www.ala.org/Template.cfm?Section=interpretations&Template=/ContentManagement/ContentDisplay.cfm&ContentID=88625
American Library Association. (2015). Key Issue: Library Funding, 8410. Retrieved from http://www.ala.org/offices/sites/ala.org.offices/files/content/ogr/FINAL LIBRARY FUNDING One-Pager SJM 06-17-15.pdf
arma. (2014). Tor security advisory: “relay early” traffic confirmation attack. Retrieved 2 December 2015, from https://blog.torproject.org/blog/tor-security-advisory-relay-early-traffic-confirmation-attack
Barclays. (2015). Barclays Digital Eagles. Retrieved 15 November 2015, from http://www.barclays.co.uk/DigitalEagles/P1242671738729
Barron, S. (2016). 11 open-source alternatives. Retrieved 23 February 2016, from https://undaimonia.wordpress.com/2016/01/07/open-source-listicle/
Bauman, Z. (2001). The individualized society. Cambridge UK: Polity Press.
BBC Learning. (2014). BBC Basic Online Skills. Retrieved from http://downloads.bbc.co.uk/aboutthebbc/insidethebbc/whatwedo/learning/audienceresearch/basic-online-skills-nov-2014.pdf
Bentham, J. (1995). The Panopticon Writings. (M. Bozovic, Ed.). London: Verso.
Bernal, P. (2015). The Surveillance Elephant in the Room…. Retrieved 27 November 2015, from https://paulbernal.wordpress.com/2015/10/07/the-surveillance-elephant-in-the-room/
Bernal, P. (2016). You can’t deny message encryption to some individuals without denying it to all. Retrieved from http://blogs.lse.ac.uk/businessreview/2016/03/08/you-cant-deny-encryption-to-some-individuals-without-denying-it-to-all
Big Lottery Fund. (2004). The People’s Network: evaluation summary. Retrieved from http://www.biglotteryfund.org.uk/er_eval_peoples_network_evaluation_summary_uk.pdf
Birdwell, J., Cadywould, C., & Reynolds, L. (2015). Tune In, Turn Out. Demos. Retrieved from http://www.demos.co.uk/files/Tune_in_-_web.pdf?1419813387
Bloom, D. (2014). SXSW: Edward Snowden Panel Says Don’t Count On Ad-Based Online Companies To Safeguard Your Data. Retrieved 8 November 2015, from http://deadline.com/2014/03/edward-snowden-sxsw-panel-internet-privacy-696465/
Brass Horn Communications. (2015). About us. Retrieved 7 December 2015, from https://brasshorncommunications.uk/about/
Brennan, J. O., Hamre, J. J., & Lynn III, W. J. “Bill.” (2015). Center for Strategic and International Studies Global Security Forum 2015: Opening Session. Retrieved from https://csis.org/files/attachments/151116_GSF_OpeningSession.pdf
Brown, I. (2011). Communications data retention in an evolving internet. International Journal of Law and Information Technology, 19(2), 95–109. https://doi.org/10.1093/ijlit/eaq016
Brown, I. (2014). The feasibility of transatlantic privacy-protective standards for surveillance. International Journal of Law and Information Technology, 0, 1–18. https://doi.org/10.1093/ijlit/eau007
Brown, I., & Korff, D. (2009). Terrorism and the Proportionality of Internet Surveillance. European Journal of Criminology, 6 (2), 119–134. https://doi.org/10.1177/1477370808100541
Burns, D. (2015). Interview with Alison Macrina. Retrieved 8 November 2015, from http://hacklibraryschool.com/2015/05/27/interview-with-alison-macrina-flexlibris/
Cannataci, J. A. (2016). Report of the Special Rapporteur on the right to privacy. Retrieved from http://www.ohchr.org/Documents/Issues/Privacy/A-HRC-31-64.doc
Carmon, I. (2013). How we broke the NSA story. Retrieved 11 November 2015, from http://www.salon.com/2013/06/10/qa_with_laura_poitras_the_woman_behind_the_nsa_scoops/
Carpenter, Z. (2015). Librarians Versus the NSA. Retrieved 8 November 2015, from http://www.thenation.com/article/librarians-versus-nsa/
Casciani, D. (2003). Spy pictures of suffragettes revealed. Retrieved 8 November 2015, from http://news.bbc.co.uk/1/hi/magazine/3153024.stm
Castells, M. (2004). The network society : a cross-cultural perspective. Northampton, Mass.: Edward Elgar Publishing.
Charteris, S. (2009). A local Inquiry into the Public Library Service Provided by Wirral Metropolitan Borough Council. Department for Culture, Media and Sport. Retrieved from https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/77448/wirral_local_inquiry.doc
Cilip. (2005). Statement on intellectual freedom, access to information and censorship. Retrieved 8 November 2015, from http://www.cilip.org.uk/cilip/archived-policy-statements/statement-intellectual-freedom-access-information-and-censorship
Cilip. (2012). Ethical Principles for Library and Information Professionals, 2004. Retrieved from http://www.cilip.org.uk/sites/default/files/documents/Ethical%20principles%20for%20library%20and%20information%20professionals%20October%202012.pdf
Cilip. (2013). Short Briefing on the Public Libraries and Museums Act 1964, (January), 2013. Retrieved from http://www.cilip.org.uk/sites/default/files/documents/Briefing on Public Libraries and Museums Act 1964.pdf
Clark, I. (2012). To what extent do community libraries address the concerns of the digital divide ? University of Aberystwyth.
Clark, I. (2016). Barclays and the library marketing opportunity. Retrieved 3 February 2016, from http://infoism.co.uk/2016/01/barclays-and-the-library-marketing-opportunity/
Cohen, J. E. (2013). What Privacy Is For. Harvard Law Review, 126 (7), 1904–1933. Retrieved from http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2175406
Council of Europe. (2000). New information technologies: public access and freedom of expression in cultural institutions. Retrieved from http://www.coe.int/t/dg4/cultureheritage/culture/Resources/DECS_CULT_NTI_libex(2000)2_EN.pdf
Council of Europe. (2002). Guidelines on human rights and the fight against terrorism. Retrieved from http://www.coe.int/t/dlapil/cahdi/Source/Docs2002/H_2002_4E.pdf
Cox, J. (2015). Encryption App Telegram Probably Isn’t as Secure for Terrorists as ISIS Thinks. Retrieved 20 November 2015, from http://motherboard.vice.com/read/encryption-app-telegram-probably-isnt-as-secure-for-terrorists-as-isis-thinks
Cox, J. (2016). Pssst, Your PGP Is Leaking. Retrieved 2 February 2016, from http://motherboard.vice.com/read/pssst-your-pgp-is-leaking
Crocker, A. (2015). EFF Asks Court on Behalf of Libraries and Booksellers to Recognize Readers’ Right to Be Free of NSA’s Online Surveillance. Retrieved 8 November 2015, from https://www.eff.org/deeplinks/2015/09/eff-asks-court-behalf-libraries-and-booksellers-recognize-readers-right-be-free
Crocker, A., Rumold, M., Greene, D., & Berlage, J. I. Wikimedia Foundation, et al. v. National Security Agency, et al., Case 1:15-cv-00662-TSE (2015). Retrieved from https://www.eff.org/files/2015/09/03/wikimedia_amicus_brief_filed.pdf
Cunningham, A. (2015). Android 6.0 re-implements mandatory storage encryption for new devices. Retrieved 24 February 2016, from http://arstechnica.com/gadgets/2015/10/android-6-0-re-implements-mandatory-device-encryption-for-new-devices/
De Marco, S., Robles, J. M., & Antino, M. (2014). Digital skills as a conditioning factor for digital political participation. Communications, 39 (1), 43–65. https://doi.org/10.1515/commun-2014-0004
Deloitte Insight. (2014). Data Nation 2014 Putting customers first. Retrieved from http://www2.deloitte.com/uk/en/pages/deloitte-analytics/articles/data-nation-2014-putting-customers-first.html
DiMaggio, P., & Hargittai, E. (2001). From the ’ Digital Divide ’ to ’ Digital Inequality ': Studying Internet Use as Penetration Increases. Princeton Center for Arts and Cultural Policy Studies, Working Paper, 15(15). Retrieved from http://webuse.umd.edu/webshop/resources/Dimaggio_Digital_Divide.pdf
Dobija, J. (2014). The First Amendment Needs New Clothes. American Libraries, 38 (8), 50–53.
Doyle-Burr, N. (2015). Despite Law Enforcement Concerns, Lebanon Board Will Reactivate Privacy Network Tor at Kilton Library. Retrieved 8 November 2015, from http://www.vnews.com/home/18620952-95/library-joins-privacy-network
Dredge, S. (2014). Worried about leaky chats? Messaging apps are responding with security features. Retrieved 17 January 2016, from http://www.theguardian.com/technology/2014/dec/11/messenger-private-chats
Dreyfuss, E. (2015). Sanity and Privacy Win Out in the Library-Tor Kerfuffle. Retrieved 8 November 2015, from http://www.wired.com/2015/09/sanity-privacy-win-library-tor-kerfuffle/
Eubanks, V. (2011). Digital dead end fighting for social justice in the information age. Cambridge, Mass.: MIT Press.
European Court of Human Rights. Osman v. The United Kingdom (1998). Retrieved from http://hudoc.echr.coe.int/eng?i=001-58257
European Court of Human Rights. (2000). Case of Amann v. Switzerland, (September 2000). Retrieved from http://hudoc.echr.coe.int/eng?i=001-58497
European Court of Human Rights. (2008). S. and Marper v. The United Kingdom. Retrieved from http://hudoc.echr.coe.int/eng?i=001-90051
European Court of Human Rights. Roman Zakharov v. Russia (2015). Retrieved from http://hudoc.echr.coe.int/fre?i=001-159324
European Court of Justice. (2015). Maximillian Schrems v. Data Protection Commissioner. Retrieved 8 November 2015, from http://curia.europa.eu/juris/document/document.jsf?text=&docid=168421&pageIndex=0&doclang=en&mode=lst&dir=&occ=first&part=1&cid=326249
Evans, M. (2005). The data-informed marketing model and its social responsibility. In S. Lace (Ed.), The glass consumer life in a surveillance society. Bristol: Policy.
Evans, R., & Lewis, P. (2013). Undercover : the true story of Britain’s secret police. London: Faber and Faber.
Farivar, C. (2012). Private: some search engines make money by not tracking users. Retrieved 16 February 2016, from http://arstechnica.com/business/2012/05/private-the-search-engines-that-make-money-by-not-tracking-users/
Flashpoint Partners. (2014). Measuring the Impact of the Snowden Leaks on the Use of Encryption by Online Jihadists. Retrieved from https://fpjintel.com/portal/assets/File/Flashpoint_Jihadi_Encryption_Software_Sept2014.pdf
Foucault, M. (1977). Discipline and punish : the birth of the prison. New York: Pantheon Books.
Fuchs, C. (2010). Internet and society: social theory in the information age. London: Routledge.
Gallagher, R. (2015). From Radio to Porn, British Spies Track Web Users’ Online Identities. Retrieved 8 November 2015, from https://theintercept.com/2015/09/25/gchq-radio-porn-spies-track-web-users-online-identities/
Gangadharan, S. P. (2012). Digital inclusion and data profiling. First Monday. Retrieved from http://firstmonday.org/ojs/index.php/fm/article/view/3821/3199
Gibbs, S. (2015a). Facebook accused of spying on Belgian citizens like the NSA. Retrieved 8 November 2015, from http://www.theguardian.com/technology/2015/sep/21/facebook-spying-belgian-citizens-nsa-data-regulator-lawsuit
Gibbs, S. (2015b). Google can unlock some Android devices remotely, district attorney says. Retrieved 6 December 2015, from http://www.theguardian.com/technology/2015/nov/24/google-can-unlock-android-devices-remotely-if-phone-unencrypted
Giroux, H. A. (2015). Totalitarian Paranoia in the Post-Orwellian Surveillance State. Cultural Studies, 29 (2), 108–140. https://doi.org/10.1080/09502386.2014.917118
Google. (2015). Ads in Gmail. Retrieved 8 November 2015, from https://support.google.com/mail/answer/6603
Greenwald, G., MacAskill, E., Poitras, L., Ackerman, S., & Rushe, D. (2013). Microsoft handed the NSA access to encrypted messages. Retrieved 8 November 2015, from http://www.theguardian.com/world/2013/jul/11/microsoft-nsa-collaboration-user-data
grugq. (2015a). Operational Telegram. Retrieved 20 November 2015, from http://grugq.tumblr.com/post/133453305233/operational-telegram
grugq. (2015b). Signals, Intelligence. Retrieved 20 November 2015, from https://medium.com/@thegrugq/signal-intelligence-free-for-all-5993c2f72f90#.kcrudz6bm
Hargittai, E. (2002). Differences in people’s online skills. First Monday. Ghosh, Rishab Aiyer. Retrieved from http://firstmonday.org/ojs/index.php/fm/article/view/942/864
Harris, J. (2009). Wirral library closures: Centralisation is undone by people power. Retrieved 28 January 2016, from http://www.theguardian.com/commentisfree/2009/apr/06/libraries-andyburnham
Home Office. (2012). Draft Communications Data Bill. Retrieved from http://www.official-documents.gov.uk/document/cm83/8359/8359.pdf
Home Office. (2015). Draft Investigatory Powers Bill. Retrieved from https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/473770/Draft_Investigatory_Powers_Bill.pdf
Home Office. (2016a). Investigatory Powers Bill : Government Response to Pre-Legislative Scrutiny. Retrieved from https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/504174/54575_Cm_9219_WEB.PDF
Home Office. (2016b). Investigatory Powers Bill: overarching documents – Publications – GOV.UK. Retrieved from https://www.gov.uk/government/publications/investigatory-powers-bill-overarching-documents
Humphreys, L. (2011). Who’s Watching Whom? A Study of Interactive Technology and Surveillance. Journal of Communication, 61 (4), 575–595. https://doi.org/10.1111/j.1460-2466.2011.01570.x
Ifla. (2015). IFLA Publishes a Statement on Privacy in the Library Environment. Retrieved 8 November 2015, from http://www.ifla.org/node/9803
Ipsos MORI. (2015). Basic Digital Skills. Retrieved from https://goon-uk-prod.s3-eu-west-1.amazonaws.com/uploads/Basic Digital Skills_UK Report 2015_131015_FINAL.pdf
Jordan, T. (2015). Information politics: liberation and exploitation in the digital society. Pluto Press.
Kaye, D. (2015). Report of the Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression. Retrieved from http://www.ohchr.org/EN/Issues/FreedomOpinion/Pages/CallForSubmission.aspx
King, S., McMenemy, D., & Poulter, A. (2006). Effectiveness of ICT training for public library staff in the UK: staff views. The Electronic Library, 24 (2), 265–276. https://doi.org/10.1108/02640470610649281
Lee, M. (2015a). Chatting in Secret While We’re All Being Watched. Retrieved 5 March 2016, from https://theintercept.com/2015/07/14/communicating-secret-watched/
Lee, M. (2015b). Edward Snowden Explains How To Reclaim Your Privacy. Retrieved 16 February 2016, from https://theintercept.com/2015/11/12/edward-snowden-explains-how-to-reclaim-your-privacy/
Leopold, J. (2014). Exclusive: Emails reveal close Google relationship with NSA. Retrieved 8 November 2015, from http://america.aljazeera.com/articles/2014/5/6/nsa-chief-google.html
Lichtblau, E. (2005). F.B.I., Using Patriot Act, Demands Library’s Records. Retrieved 24 February 2016, from http://www.nytimes.com/2005/08/26/politics/fbi-using-patriot-act-demands-librarys-records.html
Lynch, M. P. (2015). The philosophy of privacy: why surveillance reduces us to objects. Retrieved 23 February 2016, from http://www.theguardian.com/technology/2015/may/07/surveillance-privacy-philosophy-data-internet-things
Lyon, D. (1994). From Big Brother to Electronic Panopticon. In The Electronic Eye: The Rise of Surveillance Society (pp. 57–80). Retrieved from http://home.fnal.gov/~annis/digirati/otherVoices/Lyon.html
Lyon, D. (2007). Surveillance studies: an overview. Cambridge, UK; Malden, MA: Polity.
Lyon, D. (2010). Liquid Surveillance: The Contribution of Zygmunt Bauman to Surveillance Studies. International Political Sociology, 4 (4), 325–338. https://doi.org/10.1111/j.1749-5687.2010.00109.x
Lyon, D. (2015). The Snowden Stakes: Challenges for Understanding. Surveillance and Society, 13 (2), 139–152.
Maass, P. (2013). How Laura Poitras Helped Snowden Spill His Secrets. Retrieved 23 February 2016, from http://www.nytimes.com/2013/08/18/magazine/laura-poitras-snowden.html
MacAskill, E. (2013). NSA paid millions to cover Prism compliance costs for tech companies. Retrieved 11 November 2015, from http://www.theguardian.com/world/2013/aug/23/nsa-prism-costs-tech-companies-paid
MacAskill, E., Borger, J., Hopkins, N., Davies, N., & Ball, J. (2013). GCHQ taps fibre-optic cables for secret access to world’s communications. Retrieved 12 November 2015, from http://www.theguardian.com/uk/2013/jun/21/gchq-cables-secret-world-communications-nsa
Macrina, A. (2015). The Tor Browser and Intellectual Freedom in the Digital Age. Reference and User Services Quarterly, 54 (4), 17–21.
Macrina, A., & Fatemi, N. (2015). Tor exit relays in libraries: a new LFP project. Retrieved 8 November 2015, from https://libraryfreedomproject.org/torexitpilotphase1/
Mason, R. (2015). UK spy agencies need more powers, says Cameron. Retrieved 12 November 2015, from http://www.theguardian.com/uk-news/2015/jan/12/uk-spy-agencies-need-more-powers-says-cameron-paris-attacks
McGarr, S. (2015). EU Law Analysis: Do Facebook and the USA violate EU data protection law? The CJEU hearing in Schrems. Retrieved 8 November 2015, from http://eulawanalysis.blogspot.co.uk/2015/03/does-facebook-and-usa-violate-eu-data.html
McLaughlin, J. (2015). Scope of Secretive FBI National Security Letters Revealed by First Lifted Gag Order. Retrieved 2 December 2015, from https://theintercept.com/2015/11/30/scope-of-secretive-fbi-national-security-letters-revealed-by-first-lifted-gag-order/
Mervyn, K., Simon, A., & Allen, D. K. (2014). Digital inclusion and social inclusion: a tale of two cities. Information, Communication & Society, 17 (9), 1086–1104. https://doi.org/10.1080/1369118X.2013.877952
Min, S.-J. (2010). From the digital divide to the democratic divide: internet skills, political interest, and the second-level digital divide in political internet use. Journal of Information Technology & Politics, 7, 22–35. https://doi.org/10.1080/19331680903109402
Moody, G. (2016). It’s legal for GCHQ to break into computers and install spyware, tribunal rules. Retrieved 16 February 2016, from http://arstechnica.co.uk/tech-policy/2016/02/its-legal-for-gchq-to-break-into-computers-and-install-spyware-tribunal-rules/
Morris, D. S., & Morris, J. S. (2013). Digital inequality and participation in the political process: Real or imagined? Social Science Computer Review, 31 (5), 589–600. https://doi.org/10.1177/0894439313489259
Nakashima, E., & Peterson, A. (2016). The British want to come to America — with wiretap orders and search warrants. Retrieved 16 February 2016, from https://www.washingtonpost.com/world/national-security/the-british-want-to-come-to-america--with-wiretap-orders-and-search-warrants/2016/02/04/b351ce9e-ca86-11e5-a7b2-5a2f824b02c9_story.html
Norcie, G., Blythe, J., Caine, K., & Camp, L. J. (2014). Why Johnny Can’t Blow the Whistle: Identifying and Reducing Usability Issues in Anonymity Systems. Proceedings 2014 Workshop on Usable Security. https://doi.org/10.14722/usec.2014.23022
O’Neill, P. H. (2016). New Hampshire bill allows public libraries to run Tor in the face of federal challenges. Retrieved 24 February 2016, from http://www.dailydot.com/politics/new-hampshire-tor-library-legislation/
Ofcom. (2015). Adults’ media use and attitudes report. Retrieved from http://stakeholders.ofcom.org.uk/market-data-research/media-literacy/media-lit-research/adults-2013/
Office for National Statistics. (2015). Internet Access – Households and Individuals 2015. Retrieved from http://www.ons.gov.uk/ons/rel/rdit2/internet-access---households-and-individuals/2015/stb-ia-2015.html
Olsen, M., Schneier, B., Zittrain, J., Gasser, U., Olsen, M. G., Gertner, N., O’Brien, D. R. (2016). Don’t Panic. Making Progress on the “Going Dark” Debate. The Berkman Center for Internet & Society at Harvard University. https://cyber.law.harvard.edu/pubrelease/dont-panic/Dont_Panic_Making_Progress_on_Going_Dark_Debate.pdf
Park, Y. J. (2013). Offline Status, Online Status: Reproduction of Social Categories in Personal Information Skill and Knowledge. Social Science Computer Review, 31 (6), 680–702. https://doi.org/10.1177/0894439313485202
Park, Y. J. (2014). My whole world’s in my palm! The second-level divide of teenagers' mobile use and skill. New Media & Society, 17 (6), 977–995. https://doi.org/10.1177/1461444813520302
Peers, S. (2015). American Mass Surveillance of EU citizens: Is the End Nigh? Retrieved 8 November 2015, from http://eulawanalysis.blogspot.be/2015/09/american-mass-surveillance-of-eu.html
Pew Research Center. (2014). Global Opinions of U.S. Surveillance: United Kingdom. Retrieved 16 February 2016, from http://www.pewglobal.org/2014/07/14/nsa-opinion/country/united-kingdom/
President’s Commission on Law Enforcement and Administration of Justice. (1967). The Challenge of Crime in a Free Society, (February), 1–342. Retrieved from https://www.ncjrs.gov/App/Publications/abstract.aspx?ID=42
Price, D. (2013). A Social History of Wiretaps. Retrieved 27 November 2015, from http://www.counterpunch.org/2013/08/09/a-social-history-of-wiretaps-2/
Price, R. (2015). Android phones are cheaper than ever because of “growing income inequality” — and that’s a good thing. Retrieved 8 November 2015, from http://uk.businessinsider.com/android-iphone-price-disparity-increase-2015-2
Reiman, P. (1996). Cryptography and the First Amendment: The Right to be Unheard. John Marshall Journal of Computer & Information Law, 14 (2), 1–29. http://repository.jmls.edu/cgi/viewcontent.cgi?article=1313&context=jitpl
Renaud, K., Volkamer, M., & Renkema-Padmos, A. (2014). Why doesn’t Jane protect her privacy? Lecture Notes in Computer Science (including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8555 LNCS, 244–262. https://doi.org/10.1007/978-3-319-08506-7_13
Richards, N. M. (2008). Intellectual Privacy. Texas Law Review, 87, 387. https://doi.org/10.2139/ssrn.1108268
Richards, N. M. (2013). The dangers of surveillance. Harvard Law Review, 126 (7), 1934–1965. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2239412
Rogaway, P. (2015). The Moral Character of Cryptographic Work. Retrieved from http://web.cs.ucdavis.edu/~rogaway/papers/moral-fn.pdf
Ruoti, S., Andersen, J., Zappala, D., & Seamons, K. (2015). Why Johnny Still, Still Can’t Encrypt: Evaluating the Usability of a Modern PGP Client. ArXiv E-Prints. Retrieved from http://arxiv.org/abs/1510.08555
Rushe, D. (2014). Yahoo $250,000 daily fine over NSA data refusal was set to double “every week.” Retrieved 8 November 2015, from http://www.theguardian.com/world/2014/sep/11/yahoo-nsa-lawsuit-documents-fine-user-data-refusal
Schell, J. (2013). America’s Surveillance Net. Retrieved 8 November 2015, from http://www.thenation.com/article/americas-surveillance-net/
Schriner, J. (2015). Radical Librarian-Technologists. Journal of Radical Librarianship. Retrieved from https://journal.radicallibrarianship.org/index.php/journal/article/view/6/14
Shalal, A. (2016). Former Google CEO Schmidt to head new Pentagon innovation board. Retrieved 6 March 2016, from http://www.reuters.com/article/us-usa-military-innovation-idUSKCN0W421V
Shema, M. (2011). Web Security: Why You Should Always Use HTTPS. Retrieved 16 February 2016, from http://mashable.com/2011/05/31/https-web-security/
Simonite, T. (2015). Is Google’s Lackluster Support for Encryption a Human Rights Issue? Retrieved 11 November 2015, from http://www.technologyreview.com/news/543161/why-google-trailing-apple-on-encryption-support-is-a-human-rights-issue/
Sinclair Brody, S. (2016). Protecting Data Privacy With User-Friendly Software – Council on Foreign Relations. Retrieved 23 February 2016, from http://www.cfr.org/privacy/protecting-data-privacy-user-friendly-software/p37551
Smith, D., & Chamberlain, P. (2015). Blacklisted: the secret war between big business and union activists. Oxford: New Internationalist Publications Ltd.
Spacey, R. E. (2003). An Evaluation of the New Opportunities Fund ICT Training Programme for Public Library Staff, UK. In World Library and Information Congress : 69th IFLA General Conference and Council (pp. 1–21). Retrieved from http://archive.ifla.org/IV/Ifla69/papers/004e-Spacey.pdf
Sparks, C. (2013). What is the “digital divide” and why is it important? Javnost, 20 (2), 27–46. https://doi.org/10.1080/13183222.2013.11009113
St Vincent, S. (2016). Did the European Court of Human Rights Just Outlaw “Massive Monitoring of Communications” in Europe? Retrieved 21 January 2016, from https://cdt.org/blog/did-the-european-court-of-human-rights-just-outlaw-massive-monitoring-of-communications-in-europe/
Telegram. (2014). $300,000 for Cracking Telegram Encryption. Retrieved 24 November 2015, from https://telegram.org/blog/cryptocontest
Temperton, J. (2015a). AVG can sell your browsing and search history to advertisers. Retrieved 8 November 2015, from http://www.wired.co.uk/news/archive/2015-09/17/avg-privacy-policy-browser-search-data
Temperton, J. (2015b). Lords attempt to sneak through snoopers’ charter again. Retrieved 11 November 2015, from http://www.wired.co.uk/news/archive/2015-02/02/snoopers-charter-again
Temperton, J. (2015c). No U-turn: David Cameron still wants to break encryption. Retrieved 11 November 2015, from http://www.wired.co.uk/news/archive/2015-07/15/cameron-ban-encryption-u-turn
The Investigatory Powers Tribunal. Liberty v GCHQ & Othrs (2015). Retrieved from http://www.ipt-uk.com/docs/Liberty-Order6Feb15.pdf
The Investigatory Powers Tribunal. Lucas & Othrs v Security Service & Othrs (2015). Retrieved from http://www.intelligencecommissioner.com/docs/Caroline_Lucas_JUDGMENT.pdf
The Investigatory Powers Tribunal. Privacy International & Othrs v GCHQ & Othrs (2016). Retrieved from http://www.ipt-uk.com/docs/Privacy_Greennet_and_Sec_of_State.pdf
Tor Metrics. (2015). Direct users by country. Retrieved 2 December 2015, from https://metrics.torproject.org/userstats-relay-country.html
Travis, A. (2016). Snooper’s charter: cafes and libraries face having to store Wi-Fi users' data. Retrieved 18 February 2016, from http://www.theguardian.com/world/2016/jan/13/snoopers-charter-theresa-may-cafes-wifi-network-store-customers-data
Vagle, J. L. (2015). Furtive Encryption: Power, Trust, and the Constitutional Cost of Collective Surveillance. Indiana Law Journal, 90 (101). https://doi.org/10.1525/sp.2007.54.1.23.
Vickery, J. R. (2014). 'I don't have anything to hide, but … ': the challenges and negotiations of social and mobile media privacy for non-dominant youth. Information, Communication & Society, 18 (3), 281–294. https://doi.org/10.1080/1369118X.2014.989251
Whitten, A., & Tygar, J. D. (1999). Why Johnny can’t encrypt: A usability evaluation of PGP 5.0. Proceedings of the 8th USENIX Security Symposium, 169–184. Retrieved from https://www.usenix.org/legacy/events/sec99/full_papers/whitten/whitten_html/index.html
Wolf, N. (2012). The new totalitarianism of surveillance technology. Retrieved 8 November 2015, from http://www.theguardian.com/commentisfree/2012/aug/15/new-totalitarianism-surveillance-technology
YouGov. (2015). YouGov / Sunday Times Survey Results. Retrieved from https://d25d2506sfb94s.cloudfront.net/cumulus_uploads/document/wt26kxdn72/YG-Archive-Pol-Sunday-Times-results-160115.pdf
Zdziarski, J. (2014). Identifying back doors, attack points, and surveillance mechanisms in iOS devices. Digital Investigation, 11 (1), 3–19. https://doi.org/10.1016/j.diin.2014.01.001
Authors who publish with this journal agree to the following terms:
Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution license that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g. post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
Authors are permitted and encouraged to post their work online (e.g. in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
The points concerning acknowledgment in clauses 1 and 2 are waived if an author chooses to publish work under a Creative Commons CC0 Public Domain license. This waiver in no way affects standard academic conventions for the need to cite prior work.
If you have any queries about the choice of license, or which to discuss other options, please contact us at email@example.com