Jump to content

Indiscriminate monitoring: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
m Reverted edits by IntheHeartofTexas (talk) (HG) (3.4.9)
No edit summary
Line 1: Line 1:
[[Category:Espionage techniques]]
{{Multiple issues|
[[Category:Mass surveillance]]
{{Globalize|1=article|2=United States|date=November 2020}}
[[Category:Privacy]]
{{POV|date=November 2020}}
{{Original research|date=November 2020}}
}}
'''Indiscriminate monitoring''' is a form of monitoring, such as [[email privacy|email monitoring]] or [[telephone tapping]], that may interfere with an individual or group of individuals right to privacy. Organizations that conduct indiscriminate monitoring may use [[surveillance technologies]] to collect large amounts of data that could violate privacy laws or regulations. These practices could impact individuals emotionally, mentally, and globally.<ref>{{Cite journal|last=Stahl|first=Titus|date=2016-03-01|title=Indiscriminate mass surveillance and the public sphere|url=https://doi.org/10.1007/s10676-016-9392-2|journal=Ethics and Information Technology|language=en|volume=18|issue=1|pages=33–39|doi=10.1007/s10676-016-9392-2|issn=1572-8439}}</ref>


== Surveillance methods ==
Indiscriminate monitoring could occur through email monitoring, social networking, targeted advertising, and physical monitoring. Email monitoring involves the employer monitoring employee emails. In most jurisdictions employers are permitted to use email monitoring to protect the company's assets, increase productivity, or protect themselves from liability.<ref name=":0">{{Cite journal|last=Smith|first=William P.|last2=Tabak|first2=Filiz|date=2009|title=Monitoring Employee E-mails: Is There Any Room for Privacy?|url=https://www.jstor.org/stable/27747541|journal=Academy of Management Perspectives|volume=23|issue=4|pages=33–48|issn=1558-9080}}</ref>


Indiscriminate monitoring is the mass monitoring of individuals or groups without the careful judgement of wrong-doing.<ref>{{Cite journal|last=Kim|first=Bohyun|title=Cybersecurity and digital surveillance versus usability and privacy1: Why libraries need to advocate for online privacy {{!}} Kim {{!}} College & Research Libraries News|url=https://crln.acrl.org/index.php/crlnews/article/view/9553|language=en-US|doi=10.5860/crln.77.9.9553}}</ref> This form of monitoring could be done by government agencies, employers, and retailers. Indiscriminate monitoring uses tools such as [[Email privacy|email monitoring]] or [[telephone tapping]], geo-locations, health monitoring to monitor private lives. Organizations that conduct indiscriminate monitoring may also use [[surveillance technologies]] to collect large amounts of data that could violate privacy laws or regulations. These practices could impact individuals emotionally, mentally, and globally.<ref>{{Cite journal|last=Smith|first=William P.|last2=Tabak|first2=Filiz|date=2009|title=Monitoring Employee E-mails: Is There Any Room for Privacy?|url=https://www.jstor.org/stable/27747541|journal=Academy of Management Perspectives|volume=23|issue=4|pages=33–48|issn=1558-9080}}</ref>The government has also issued various protections to protect against Indiscriminate monitoring. <ref name=":2" />
Monitoring of social media activity can capture the data individuals share via these networks. Social networks may allow third-parties to obtain the personal information of individuals through terms-of-agreements.<ref name=":1">{{Citation|last=Kleinig|first=John|title=Surveillance Technologies and Economies|date=2011|url=https://www.jstor.org/stable/j.ctt24h8h5.12|work=Security and Privacy|pages=129–150|series=Global Standards for Ethical Identity Management in Contemporary Liberal Democratic States|publisher=ANU Press|isbn=978-1-921862-57-1|access-date=2020-11-01|last2=Mameli|first2=Peter|last3=Miller|first3=Seumas|last4=Salane|first4=Douglas|last5=Schwartz|first5=Adina|last6=Selgelid|first6=Michael J.}}</ref>


=== Surveillance methods ===
Targeted advertising is a method used by companies to monitor customer tastes and preferences in order to create personalized advertising. Companies conduct mass surveillance by monitoring user activity and IP activity.<ref name=":1" />
Indiscriminate monitoring could occur through electronic employee monitoring, social networking, targeted advertising, and geological health monitoring. All of these tools are used to monitor individuals without the direct knowledge of the individual.


Physical monitoring can be conducted through smart toys, home surveillance systems, fitness watches or applications.<ref>{{Cite book|last=DENARDIS|first=LAURA|url=https://www.jstor.org/stable/j.ctvt1sgc0|title=The Internet in Everything: Freedom and Security in a World with No Off Switch|date=2020|publisher=Yale University Press|isbn=978-0-300-23307-0}}</ref>


'''Electronic [[Employee monitoring]]''' is the use of electronic devices to collect data to monitor an employee's performance or general being. <ref>{{Cite journal|last=Holt|first=Matthew|last2=Lang|first2=Bradley|last3=Sutton|first3=Steve G.|date=2017-06-01|title=Potential Employees' Ethical Perceptions of Active Monitoring: The Dark Side of Data Analytics|url=https://meridian.allenpress.com/jis/article/31/2/107/75861/Potential-Employees-Ethical-Perceptions-of-Active|journal=Journal of Information Systems|language=en|volume=31|issue=2|pages=107–124|doi=10.2308/isys-51580|issn=0888-7985}}</ref> The indiscriminate justification for monitoring includes, but is not limited to:
== The effects of indiscriminate monitoring ==
There may be emotional and mental considerations in regards to indiscriminate monitoring. When individuals know they are monitored, it could produce stress, frustration, and a negative attitude. Individuals could feel degraded if their privacy is infringed on. For example, in the workplace employee monitoring if employees know that their emails and such were being monitored, this could stir up distrust within the workplace and increase job dissatisfaction.<ref name=":0" />


# The productivity of the employees.
== Government protections ==
# Legal liability of the company.
In 2007, the Bush Administration announced that the would issue warrants for the NSA conducting surveillance of citizens without warrants. This announcement provided further protection against Indiscriminate monitoring because it prevented individuals from being monitored without just cause.<ref name=":2">{{Cite journal|last=Posner|first=Richard A.|date=2008|title=Privacy, Surveillance, and Law|url=https://www.jstor.org/stable/20141907|journal=The University of Chicago Law Review|volume=75|issue=1|pages=245–260|issn=0041-9494}}</ref>
# Prevention of company confidentiality.
# Prevention of company data breaches.
# Prevention of workplace policy deviance. <ref>{{Cite journal|last=Eivazi|first=Kathy|date=2011-09-01|title=Computer use monitoring and privacy at work|url=http://www.sciencedirect.com/science/article/pii/S0267364911001154|journal=Computer Law & Security Review|language=en|volume=27|issue=5|pages=516–523|doi=10.1016/j.clsr.2011.07.003|issn=0267-3649}}</ref>

Electronic Employee monitoring uses many tools to monitor employees. One of the most common tools of Electronic Employee monitoring is the use of monitoring technology<ref>{{Cite journal|last=Smith|first=William P.|date=2017-01-01|title=“Can we borrow your phone? Employee privacy in the BYOD era”|url=https://doi.org/10.1108/JICES-09-2015-0027|journal=Journal of Information, Communication and Ethics in Society|volume=15|issue=4|pages=397–411|doi=10.1108/JICES-09-2015-0027|issn=1477-996X}}</ref> Email monitoring involves the employers using [[employee monitoring software]] to collect data on every single time an employee comes in contact with technology in the workplace. <ref>{{Cite book|last=Jessie|first=Daniels|url=https://books.google.com/books?hl=en&lr=&id=NElrDQAAQBAJ&oi=fnd&pg=PA181&dq=employee+monitoring+software&ots=4gWWb5vtEh&sig=_otQ80l5Tpp5wM6c0wC9MA0bE8M#v=onepage&q=employee%20monitoring%20software&f=false|title=Digital Sociologies|last2=Karen|first2=Gregory|date=2016-11-16|publisher=Policy Press|isbn=978-1-4473-2903-9|language=en}}</ref>The software will also monitor all passwords, websites, social media, email, screenshoots, and other computer actions. <ref>{{Cite journal|last=Spitzmüller|first=Christiane|last2=Stanton|first2=Jeffrey M.|date=2006|title=Examining employee compliance with organizational surveillance and monitoring|url=https://bpspsychub.onlinelibrary.wiley.com/doi/abs/10.1348/096317905X52607|journal=Journal of Occupational and Organizational Psychology|language=en|volume=79|issue=2|pages=245–272|doi=10.1348/096317905X52607|issn=2044-8325}}</ref> In most jurisdictions employers are permitted to use monitoring to protect the company's assets, increase productivity, or protect themselves from liability.<ref>{{Cite journal|last=Mishra|first=Jitendra M.|last2=Crampton|first2=Suzanne M.|date=1998-06-22|title=Employee Monitoring: Privacy in the Workplace?|url=https://www.questia.com/library/journal/1G1-21160636/employee-monitoring-privacy-in-the-workplace|journal=SAM Advanced Management Journal|volume=63|issue=3|pages=4|issn=0036-0805}}</ref> However, the impact on privacy could affect employee contentment and well being at the company.<ref>{{Cite journal|last=Stanton|first=J. M|last2=Weiss|first2=E. M|date=2000-07-01|title=Electronic monitoring in their own words: an exploratory study of employees' experiences with new types of surveillance|url=http://www.sciencedirect.com/science/article/pii/S0747563200000182|journal=Computers in Human Behavior|language=en|volume=16|issue=4|pages=423–440|doi=10.1016/S0747-5632(00)00018-2|issn=0747-5632}}</ref>


'''Social Media Monitoring''' is the use of [[social media measurement]] and other technologies to capture the data individuals share via these networks.<ref>{{Cite book|url=https://www.worldcat.org/oclc/972609048|title=2013 European Intelligence and Security Informatics Conference.|date=2013|publisher=IEEE|isbn=978-1-4799-0775-5|location=[Place of publication not identified]|oclc=972609048}}</ref> Social networks may allow third-parties to obtain the personal information of individuals through terms-of-agreements.<ref name=":1" /> In addition to social media networks collecting information for analytics, government agencies also use social media monitoring for public issues and other manners. The government uses the often public data of social media to conduct data collection on individuals or groups of people. <ref>{{Cite journal|last=Loukis|first=Euripidis|last2=Charalabidis|first2=Yannis|last3=Androutsopoulou|first3=Aggeliki|date=2015|editor-last=Tambouris|editor-first=Efthimios|editor2-last=Janssen|editor2-first=Marijn|editor3-last=Scholl|editor3-first=Hans Jochen|editor4-last=Wimmer|editor4-first=Maria A.|editor5-last=Tarabanis|editor5-first=Konstantinos|editor6-last=Gascó|editor6-first=Mila|editor7-last=Klievink|editor7-first=Bram|editor8-last=Lindgren|editor8-first=Ida|editor9-last=Parycek|editor9-first=Peter|title=Evaluating a Passive Social Media Citizensourcing Innovation|url=https://link.springer.com/chapter/10.1007/978-3-319-22479-4_23|journal=Electronic Government|series=Lecture Notes in Computer Science|language=en|location=Cham|publisher=Springer International Publishing|pages=305–320|doi=10.1007/978-3-319-22479-4_23|isbn=978-3-319-22479-4}}</ref>

'''Targeted advertising''' is a method used by companies to monitor customer tastes and preferences in order to create personalized advertising.<ref>{{Cite journal|last=Toubiana|first=Vincent|last2=Narayanan|first2=Arvind|last3=Boneh|first3=Dan|last4=Nissenbaum|first4=Helen|last5=Barocas|first5=Solon|date=2010|title=Adnostic: Privacy Preserving Targeted Advertising|url=https://papers.ssrn.com/abstract=2567076|language=en|location=Rochester, NY}}</ref> Companies conduct mass surveillance by monitoring user activity and IP activity.<ref name=":1" /> Many companies justify targeted advertising by the social and economic implications. However, the indiscriminate privacy violations of producing targeted advertisements, cause consumers to have great concerns. <ref>{{Cite journal|last=Juels|first=Ari|date=2001|editor-last=Naccache|editor-first=David|title=Targeted Advertising ... and Privacy Too|url=https://link.springer.com/chapter/10.1007/3-540-45353-9_30|journal=Topics in Cryptology — CT-RSA 2001|series=Lecture Notes in Computer Science|language=en|location=Berlin, Heidelberg|publisher=Springer|pages=408–424|doi=10.1007/3-540-45353-9_30|isbn=978-3-540-45353-6}}</ref>

'''Geological health monitoring''' is the monitoring of an individuals's location and/or health through tools to collect personal information. Geological health monitoring can be conducted through smart toys, home surveillance systems, fitness watches or applications.<ref name=":4" /> Technological devices such as, fitness watches could serve as a great tool. However, they do have privacy implications that could risk health data exposure. <ref>{{Cite journal|last=Maple|first=Carsten|date=2017-05-04|title=Security and privacy in the internet of things|url=https://doi.org/10.1080/23738871.2017.1366536|journal=Journal of Cyber Policy|volume=2|issue=2|pages=155–184|doi=10.1080/23738871.2017.1366536|issn=2373-8871}}</ref>

=== Privacy in the U.S. Constitution ===
The right to privacy in the constitution is most explicitly mentioned in [[First Amendment to the United States Constitution|Amendment I]], [[Third Amendment to the United States Constitution|Amendment III]], and [[Fourth Amendment to the United States Constitution|Amendment IV]] of the U.S. Constitution. The privacy of belief, privacy of home, and privacy of the person and possessions is included in the U.S. Constitution. <ref>{{Citation|last=Anna Jonsson|first=Cornell|title=Right to Privacy|date=2016-09|url=http://dx.doi.org/10.1093/law:mpeccol/e156.013.156|work=Max Planck Encyclopedia of Comparative Constitutional Law|publisher=Oxford University Press|access-date=2020-12-06}}</ref>

=== Government protections ===
In 2007, the Bush Administration announced that the would issue warrants for the NSA conducting surveillance of citizens without warrants. This announcement provided further protection against Indiscriminate monitoring because it prevented individuals from being monitored without just cause.<ref name=":2" />


[[Foreign Intelligence Surveillance Act|FISA]] amendments were passed to promote national security and privacy. These amendments require the [[National Security Agency|NSA]] to complete certification annually. Furthermore, these amendments state that the use of mass surveillance information for any reason other than national security is prohibited.<ref name=":2" />
[[Foreign Intelligence Surveillance Act|FISA]] amendments were passed to promote national security and privacy. These amendments require the [[National Security Agency|NSA]] to complete certification annually. Furthermore, these amendments state that the use of mass surveillance information for any reason other than national security is prohibited.<ref name=":2" />


In 2020, [[2020 California Proposition 14|Proposition 24]], the Privacy Rights and Enforcement Act Initiative, appeared as a California ballot proposition. This act states that consumers can prevent companies from sharing their personal information. Also, this act can prevent companies from withholding the personal information of individuals through data collection for a long period of time. <ref>{{Cite journal|last=Gerhart|first=Thomas|last2=Steinberg|first2=Ari|date=2020-10-01|title=Proposition 24: Protecting California Consumers by Expanding Protections, Ensuring Governmental Oversight, and Safeguarding the Law from Special Interests|url=https://scholarlycommons.pacific.edu/california-initiative-review/vol2020/iss1/12|journal=California Initiative Review (CIR)|volume=2020|issue=1}}</ref>
==References==
<references />


=== The Controversies of Indiscriminate Monitoring ===
There may be emotional and mental considerations in regards to indiscriminate monitoring. When individuals know they are monitored, it could produce stress, frustration, and a negative attitude. Individuals could feel degraded if their privacy is infringed on. For example, in the workplace employee monitoring if employees know that their emails and such were being monitored, this could stir up distrust within the workplace and increase job dissatisfaction.<ref name=":0" />


=== Research ===
Recently, researchers have been discussing the implications of indiscriminate monitoring, the public space, and the government's role. One argument states that the indiscriminate monitoring of the government inflicts on the [[right to privacy]] and results in harm to citizens.<ref name=":3" /><ref>{{Cite journal|last=Kasm|first=Saeb|date=2018|title=Redefining Publics: Mosireen, State Crime and the Rise of a Digital Public Sphere|url=https://www.jstor.org/stable/10.13169/statecrime.7.1.0100|journal=State Crime Journal|volume=7|issue=1|pages=100–140|doi=10.13169/statecrime.7.1.0100|issn=2046-6056}}</ref>



[[Category:Espionage techniques]]
=== Recent Cases of Indiscriminate Monitoring ===
[[Category:Mass surveillance]]
(In progress...)
[[Category:Privacy]]

<references />

Revision as of 06:14, 6 December 2020


Indiscriminate monitoring is the mass monitoring of individuals or groups without the careful judgement of wrong-doing.[1] This form of monitoring could be done by government agencies, employers, and retailers. Indiscriminate monitoring uses tools such as email monitoring or telephone tapping, geo-locations, health monitoring to monitor private lives. Organizations that conduct indiscriminate monitoring may also use surveillance technologies to collect large amounts of data that could violate privacy laws or regulations. These practices could impact individuals emotionally, mentally, and globally.[2]The government has also issued various protections to protect against Indiscriminate monitoring. [3]

Surveillance methods

Indiscriminate monitoring could occur through electronic employee monitoring, social networking, targeted advertising, and geological health monitoring. All of these tools are used to monitor individuals without the direct knowledge of the individual.


Electronic Employee monitoring is the use of electronic devices to collect data to monitor an employee's performance or general being. [4] The indiscriminate justification for monitoring includes, but is not limited to:

  1. The productivity of the employees.
  2. Legal liability of the company.
  3. Prevention of company confidentiality.
  4. Prevention of company data breaches.
  5. Prevention of workplace policy deviance. [5]

Electronic Employee monitoring uses many tools to monitor employees. One of the most common tools of Electronic Employee monitoring is the use of monitoring technology[6] Email monitoring involves the employers using employee monitoring software to collect data on every single time an employee comes in contact with technology in the workplace. [7]The software will also monitor all passwords, websites, social media, email, screenshoots, and other computer actions. [8] In most jurisdictions employers are permitted to use monitoring to protect the company's assets, increase productivity, or protect themselves from liability.[9] However, the impact on privacy could affect employee contentment and well being at the company.[10]


Social Media Monitoring is the use of social media measurement and other technologies to capture the data individuals share via these networks.[11] Social networks may allow third-parties to obtain the personal information of individuals through terms-of-agreements.[12] In addition to social media networks collecting information for analytics, government agencies also use social media monitoring for public issues and other manners. The government uses the often public data of social media to conduct data collection on individuals or groups of people. [13]

Targeted advertising is a method used by companies to monitor customer tastes and preferences in order to create personalized advertising.[14] Companies conduct mass surveillance by monitoring user activity and IP activity.[12] Many companies justify targeted advertising by the social and economic implications. However, the indiscriminate privacy violations of producing targeted advertisements, cause consumers to have great concerns. [15]

Geological health monitoring is the monitoring of an individuals's location and/or health through tools to collect personal information. Geological health monitoring can be conducted through smart toys, home surveillance systems, fitness watches or applications.[16] Technological devices such as, fitness watches could serve as a great tool. However, they do have privacy implications that could risk health data exposure. [17]

Privacy in the U.S. Constitution

The right to privacy in the constitution is most explicitly mentioned in Amendment I, Amendment III, and Amendment IV of the U.S. Constitution. The privacy of belief, privacy of home, and privacy of the person and possessions is included in the U.S. Constitution. [18]

Government protections

In 2007, the Bush Administration announced that the would issue warrants for the NSA conducting surveillance of citizens without warrants. This announcement provided further protection against Indiscriminate monitoring because it prevented individuals from being monitored without just cause.[3]

FISA amendments were passed to promote national security and privacy. These amendments require the NSA to complete certification annually. Furthermore, these amendments state that the use of mass surveillance information for any reason other than national security is prohibited.[3]

In 2020, Proposition 24, the Privacy Rights and Enforcement Act Initiative, appeared as a California ballot proposition. This act states that consumers can prevent companies from sharing their personal information. Also, this act can prevent companies from withholding the personal information of individuals through data collection for a long period of time. [19]

The Controversies of Indiscriminate Monitoring

There may be emotional and mental considerations in regards to indiscriminate monitoring. When individuals know they are monitored, it could produce stress, frustration, and a negative attitude. Individuals could feel degraded if their privacy is infringed on. For example, in the workplace employee monitoring if employees know that their emails and such were being monitored, this could stir up distrust within the workplace and increase job dissatisfaction.[20]

Research

Recently, researchers have been discussing the implications of indiscriminate monitoring, the public space, and the government's role. One argument states that the indiscriminate monitoring of the government inflicts on the right to privacy and results in harm to citizens.[21][22]


Recent Cases of Indiscriminate Monitoring

(In progress...)

  1. ^ Kim, Bohyun. "Cybersecurity and digital surveillance versus usability and privacy1: Why libraries need to advocate for online privacy | Kim | College & Research Libraries News". doi:10.5860/crln.77.9.9553. {{cite journal}}: Cite journal requires |journal= (help)
  2. ^ Smith, William P.; Tabak, Filiz (2009). "Monitoring Employee E-mails: Is There Any Room for Privacy?". Academy of Management Perspectives. 23 (4): 33–48. ISSN 1558-9080.
  3. ^ a b c Cite error: The named reference :2 was invoked but never defined (see the help page).
  4. ^ Holt, Matthew; Lang, Bradley; Sutton, Steve G. (2017-06-01). "Potential Employees' Ethical Perceptions of Active Monitoring: The Dark Side of Data Analytics". Journal of Information Systems. 31 (2): 107–124. doi:10.2308/isys-51580. ISSN 0888-7985.
  5. ^ Eivazi, Kathy (2011-09-01). "Computer use monitoring and privacy at work". Computer Law & Security Review. 27 (5): 516–523. doi:10.1016/j.clsr.2011.07.003. ISSN 0267-3649.
  6. ^ Smith, William P. (2017-01-01). ""Can we borrow your phone? Employee privacy in the BYOD era"". Journal of Information, Communication and Ethics in Society. 15 (4): 397–411. doi:10.1108/JICES-09-2015-0027. ISSN 1477-996X.
  7. ^ Jessie, Daniels; Karen, Gregory (2016-11-16). Digital Sociologies. Policy Press. ISBN 978-1-4473-2903-9.
  8. ^ Spitzmüller, Christiane; Stanton, Jeffrey M. (2006). "Examining employee compliance with organizational surveillance and monitoring". Journal of Occupational and Organizational Psychology. 79 (2): 245–272. doi:10.1348/096317905X52607. ISSN 2044-8325.
  9. ^ Mishra, Jitendra M.; Crampton, Suzanne M. (1998-06-22). "Employee Monitoring: Privacy in the Workplace?". SAM Advanced Management Journal. 63 (3): 4. ISSN 0036-0805.
  10. ^ Stanton, J. M; Weiss, E. M (2000-07-01). "Electronic monitoring in their own words: an exploratory study of employees' experiences with new types of surveillance". Computers in Human Behavior. 16 (4): 423–440. doi:10.1016/S0747-5632(00)00018-2. ISSN 0747-5632.
  11. ^ 2013 European Intelligence and Security Informatics Conference. [Place of publication not identified]: IEEE. 2013. ISBN 978-1-4799-0775-5. OCLC 972609048.
  12. ^ a b Cite error: The named reference :1 was invoked but never defined (see the help page).
  13. ^ Loukis, Euripidis; Charalabidis, Yannis; Androutsopoulou, Aggeliki (2015). Tambouris, Efthimios; Janssen, Marijn; Scholl, Hans Jochen; Wimmer, Maria A.; Tarabanis, Konstantinos; Gascó, Mila; Klievink, Bram; Lindgren, Ida; Parycek, Peter (eds.). "Evaluating a Passive Social Media Citizensourcing Innovation". Electronic Government. Lecture Notes in Computer Science. Cham: Springer International Publishing: 305–320. doi:10.1007/978-3-319-22479-4_23. ISBN 978-3-319-22479-4.
  14. ^ Toubiana, Vincent; Narayanan, Arvind; Boneh, Dan; Nissenbaum, Helen; Barocas, Solon (2010). "Adnostic: Privacy Preserving Targeted Advertising". Rochester, NY. {{cite journal}}: Cite journal requires |journal= (help)
  15. ^ Juels, Ari (2001). Naccache, David (ed.). "Targeted Advertising ... and Privacy Too". Topics in Cryptology — CT-RSA 2001. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer: 408–424. doi:10.1007/3-540-45353-9_30. ISBN 978-3-540-45353-6.
  16. ^ Cite error: The named reference :4 was invoked but never defined (see the help page).
  17. ^ Maple, Carsten (2017-05-04). "Security and privacy in the internet of things". Journal of Cyber Policy. 2 (2): 155–184. doi:10.1080/23738871.2017.1366536. ISSN 2373-8871.
  18. ^ Anna Jonsson, Cornell (2016-09), "Right to Privacy", Max Planck Encyclopedia of Comparative Constitutional Law, Oxford University Press, retrieved 2020-12-06 {{citation}}: Check date values in: |date= (help)
  19. ^ Gerhart, Thomas; Steinberg, Ari (2020-10-01). "Proposition 24: Protecting California Consumers by Expanding Protections, Ensuring Governmental Oversight, and Safeguarding the Law from Special Interests". California Initiative Review (CIR). 2020 (1).
  20. ^ Cite error: The named reference :0 was invoked but never defined (see the help page).
  21. ^ Cite error: The named reference :3 was invoked but never defined (see the help page).
  22. ^ Kasm, Saeb (2018). "Redefining Publics: Mosireen, State Crime and the Rise of a Digital Public Sphere". State Crime Journal. 7 (1): 100–140. doi:10.13169/statecrime.7.1.0100. ISSN 2046-6056.