{"id":124,"date":"2021-11-10T19:36:43","date_gmt":"2021-11-10T19:36:43","guid":{"rendered":"https:\/\/blogs.shu.edu\/surveillancecapitalism\/?page_id=124"},"modified":"2021-11-13T00:24:40","modified_gmt":"2021-11-13T00:24:40","slug":"sources","status":"publish","type":"page","link":"https:\/\/blogs.shu.edu\/surveillancecapitalism\/sources\/","title":{"rendered":"Sources"},"content":{"rendered":"<p>Below is a list of Sources used during this project:<\/p>\n<p><a class=\"c-link\" href=\"https:\/\/www.nytimes.com\/2020\/01\/24\/opinion\/sunday\/surveillance-capitalism.html\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.nytimes.com\/2020\/01\/24\/opinion\/sunday\/surveillance-capitalism.html<\/a><\/p>\n<p><a class=\"c-link\" href=\"https:\/\/www.computerweekly.com\/feature\/Surveillance-capitalism-in-the-age-of-Covid-19\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.computerweekly.com\/feature\/Surveillance-capitalism-in-the-age-of-Covid-19<\/a><\/p>\n<p><a class=\"c-link\" href=\"https:\/\/news.harvard.edu\/gazette\/story\/2019\/03\/harvard-professor-says-surveillance-capitalism-is-undermining-democracy\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/news.harvard.edu\/gazette\/story\/2019\/03\/harvard-professor-says-surveillance-capitalism-is-undermining-democracy\/<\/a><\/p>\n<p><a class=\"c-link\" href=\"https:\/\/www.nytimes.com\/2017\/05\/10\/technology\/techs-frightful-five-theyve-got-us.html\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.nytimes.com\/2017\/05\/10\/technology\/techs-frightful-five-theyve-got-us.html<\/a><\/p>\n<p><a class=\"c-link\" href=\"https:\/\/www.netflix.com\/title\/81254224\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.netflix.com\/title\/81254224<\/a><\/p>\n<p><a class=\"c-link\" href=\"https:\/\/www.pcmag.com\/news\/how-companies-turn-your-data-into-money?amp=true\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.pcmag.com\/news\/how-companies-turn-your-data-into-money?amp=true<\/a><\/p>\n<p><a class=\"c-link\" href=\"https:\/\/www.forbes.com\/sites\/forbestechcouncil\/2020\/09\/25\/the-state-of-mass-surveillance\/?sh=367e8ef2b62d\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.forbes.com\/sites\/forbestechcouncil\/2020\/09\/25\/the-state-of-mass-surveillance\/?sh=367e8ef2b62d<\/a><\/p>\n<p><a class=\"c-link\" href=\"https:\/\/www.vox.com\/recode\/2020\/5\/13\/21257481\/wyden-freedom-patriot-act-amendment-mcconnell\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.vox.com\/recode\/2020\/5\/13\/21257481\/wyden-freedom-patriot-act-amendment-mcconnell<\/a><\/p>\n<p><a class=\"c-link\" href=\"https:\/\/harvardlawreview.org\/2018\/04\/cooperation-or-resistance-the-role-of-tech-companies-in-government-surveillance\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/harvardlawreview.org\/2018\/04\/cooperation-or-resistance-the-role-of-tech-companies-in-government-surveillance\/<\/a><\/p>\n<p><a class=\"c-link\" href=\"https:\/\/dtl315.slack.com\/files\/U02DW6VCTM2\/F02H8ADUL01\/surveillance_capitalism_sage_articles.pdf?origin_team=T04QE1EGT&amp;origin_channel=C02DXQFNCBY\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/dtl315.slack.com\/files\/U02DW6VCTM2\/F02H8ADUL01\/surveillance_capitalism_sage_articles.pdf?origin_team=T04QE1EGT&amp;origin_channel=C02DXQFNCBY<\/a><\/p>\n<p><a class=\"c-link\" href=\"https:\/\/www.lawfareblog.com\/what-are-limits-congressional-surveillance\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.lawfareblog.com\/what-are-limits-congressional-surveillance<\/a><\/p>\n<p><a class=\"c-link\" href=\"https:\/\/www.youtube.com\/watch?v=FrxDrpi1XNU\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.youtube.com\/watch?v=FrxDrpi1XNU<\/a><\/p>\n<p><a class=\"c-link\" href=\"https:\/\/www.justsecurity.org\/71837\/new-technologies-new-problems-troubling-surveillance-trends-in-america\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.justsecurity.org\/71837\/new-technologies-new-problems-troubling-surveillance-trends-in-america\/<\/a><\/p>\n<p><a class=\"c-link\" href=\"https:\/\/datasmart.ash.harvard.edu\/news\/article\/mining-social-media-data-policing-ethical-way\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/datasmart.ash.harvard.edu\/news\/article\/mining-social-media-data-policing-ethical-way<\/a><\/p>\n<p><a class=\"c-link\" href=\"https:\/\/www.nytimes.com\/2021\/01\/29\/opinion\/sunday\/facebook-surveillance-society-technology.html\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.nytimes.com\/2021\/01\/29\/opinion\/sunday\/facebook-surveillance-society-technology.html<\/a><\/p>\n<p><a class=\"c-link\" href=\"https:\/\/revistas.ucm.es\/index.php\/TEKN\/article\/download\/64984\/4564456552027\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/revistas.ucm.es\/index.php\/TEKN\/article\/download\/64984\/4564456552027<\/a><\/p>\n<p><a class=\"c-link\" href=\"https:\/\/pure.aber.ac.uk\/portal\/files\/30702597\/Book_review_Whitehead_on_Zuboff.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/pure.aber.ac.uk\/portal\/files\/30702597\/Book_review_Whitehead_on_Zuboff.pdf<\/a><\/p>\n<p><a class=\"c-link\" href=\"https:\/\/www.economist.com\/the-world-if\/2018\/07\/07\/data-workers-of-the-world-unite\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.economist.com\/the-world-if\/2018\/07\/07\/data-workers-of-the-world-unite<\/a><\/p>\n<p><a class=\"c-link\" href=\"https:\/\/uploads.fas.org\/2021\/02\/Digital-Surveillance-Future.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/uploads.fas.org\/2021\/02\/Digital-Surveillance-Future.pdf<\/a><\/p>\n<p><a class=\"c-link\" href=\"https:\/\/www.researchgate.net\/publication\/324758578_The_contradictions_of_digital_modernity\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.researchgate.net\/publication\/324758578_The_contradictions_of_digital_modernity<\/a><\/p>\n<p><a class=\"c-link\" href=\"https:\/\/www.brennancenter.org\/our-work\/policy-solutions\/fourth-amendment-digital-age\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.brennancenter.org\/our-work\/policy-solutions\/fourth-amendment-digital-age<\/a><\/p>\n<p><a class=\"c-link\" href=\"https:\/\/constitution.congress.gov\/constitution\/amendment-4\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/constitution.congress.gov\/constitution\/amendment-4\/<\/a><\/p>\n<p><a class=\"c-link\" href=\"https:\/\/www.uscourts.gov\/about-federal-courts\/educational-resources\/about-educational-outreach\/activity-resources\/what-does-0\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.uscourts.gov\/about-federal-courts\/educational-resources\/about-educational-outreach\/activity-resources\/what-does-0<\/a><\/p>\n<p><a class=\"c-link\" href=\"https:\/\/dtl315.slack.com\/files\/U02DW6VCTM2\/F02H8ADUL01\/surveillance_capitalism_sage_articles.pdf?origin_team=T04QE1EGT&amp;origin_channel=C02DXQFNCBY\" target=\"_blank\" rel=\"noopener noreferrer\">Surveillance_Capitalism_SAGE_Articles.pdf<\/a><\/p>\n<p><a href=\"https:\/\/oag.ca.gov\/privacy\/ccpa\">https:\/\/oag.ca.gov\/privacy\/ccpa<\/a><\/p>\n<p><a href=\"https:\/\/www.natlawreview.com\/article\/virginia-s-new-consumer-data-protection-act\">https:\/\/www.natlawreview.com\/article\/virginia-s-new-consumer-data-protection-act<\/a><\/p>\n<p><a href=\"https:\/\/www.spirion.com\/blog\/the-utah-cybersecurity-affirmative-defense-act\/\">https:\/\/www.spirion.com\/blog\/the-utah-cybersecurity-affirmative-defense-act\/<\/a><\/p>\n<p><a href=\"https:\/\/www.whitehouse.gov\/briefing-room\/presidential-actions\/2021\/05\/12\/executive-order-on-improving-the-nations-cybersecurity\/\">https:\/\/www.whitehouse.gov\/briefing-room\/presidential-actions\/2021\/05\/12\/executive-order-on-improving-the-nations-cybersecurity\/<\/a><\/p>\n<p><a href=\"https:\/\/www.jdsupra.com\/legalnews\/u-s-data-privacy-roundup-what-is-on-the-6247901\/\">https:\/\/www.jdsupra.com\/legalnews\/u-s-data-privacy-roundup-what-is-on-the-6247901\/<\/a><\/p>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" title=\"U.S. Watched George Floyd Protests in 15 Cities Using Aerial Surveillance\" src=\"https:\/\/www.nytimes.com\/svc\/oembed\/html\/?url=https%3A%2F%2Fwww.nytimes.com%2F2020%2F06%2F19%2Fus%2Fpolitics%2Fgeorge-floyd-protests-surveillance.html#?secret=1TZIhJm1bQ\" data-secret=\"1TZIhJm1bQ\" scrolling=\"no\" frameborder=\"0\"><\/iframe><\/p>\n<p>https:\/\/harvardlawreview.org\/2018\/04\/cooperation-or-resistance-the-role-of-tech-companies-in-government-surveillance\/<\/p>\n<p><a href=\"https:\/\/www.aclu.org\/issues\/privacy-technology\/surveillance-technologies\/face-recognition-technology\">https:\/\/www.aclu.org\/issues\/privacy-technology\/surveillance-technologies\/face-recognition-technology<\/a><\/p>\n<p><a href=\"https:\/\/www.cnn.com\/2021\/10\/22\/business\/january-6-insurrection-facebook-papers\/index.html\">https:\/\/www.cnn.com\/2021\/10\/22\/business\/january-6-insurrection-facebook-papers\/index.html<\/a><\/p>\n<p><a href=\"https:\/\/en.wikipedia.org\/wiki\/Big_Tech\">https:\/\/en.wikipedia.org\/wiki\/Big_Tech<\/a><\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"PlV7JbmfeH\"><p><a href=\"https:\/\/uproxx.com\/viral\/facebook-whistleblower-caused-jan-6-riot-misinformation\/\">An Ex-Facebook Employee Detailed How Profit Motivated The Company To Allow Misinformation To Run Wild, Perhaps Sparking The Jan 6th Riots<\/a><\/p><\/blockquote>\n<p><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;An Ex-Facebook Employee Detailed How Profit Motivated The Company To Allow Misinformation To Run Wild, Perhaps Sparking The Jan 6th Riots&#8221; &#8212; UPROXX\" src=\"https:\/\/uproxx.com\/viral\/facebook-whistleblower-caused-jan-6-riot-misinformation\/embed\/#?secret=D4dj5E0SAk#?secret=PlV7JbmfeH\" data-secret=\"PlV7JbmfeH\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p><a href=\"https:\/\/www.nytimes.com\/wirecutter\/blog\/amazons-alexa-never-stops-listening-to-you\/\">https:\/\/www.nytimes.com\/wirecutter\/blog\/amazons-alexa-never-stops-listening-to-you\/<\/a><\/p>\n<p><a href=\"https:\/\/www.osano.com\/articles\/data-privacy-laws\">https:\/\/www.osano.com\/articles\/data-privacy-laws<\/a><\/p>\n<p><a href=\"https:\/\/en.wikipedia.org\/wiki\/2021_United_States_Capitol_attack\">https:\/\/en.wikipedia.org\/wiki\/2021_United_States_Capitol_attack<\/a><\/p>\n<p><a href=\"https:\/\/www.statista.com\/statistics\/617136\/digital-population-worldwide\/\">https:\/\/www.statista.com\/statistics\/617136\/digital-population-worldwide\/<\/a><\/p>\n<p><a href=\"https:\/\/www.sas.com\/en_us\/insights\/big-data\/what-is-big-data.html\">https:\/\/www.sas.com\/en_us\/insights\/big-data\/what-is-big-data.html<\/a><\/p>\n<p><a href=\"https:\/\/thinkbigonline.org\/behavior_profile_p#:~:text=A%20Behavior%20Profile%20is%20an,the%20behavior%2C%20to%20program%20strategies.&amp;text=A%20Behavior%20Profile%20puts%20all,a%20simple%20to%20read%20table.\">https:\/\/thinkbigonline.org\/behavior_profile<\/a><\/p>\n<p><a href=\"https:\/\/www.aclu.org\/issues\/national-security\/privacy-and-surveillance\/surveillance-under-patriot-act\">https:\/\/www.aclu.org\/issues\/national-security\/privacy-and-surveillance\/surveillance-under-patriot-act<\/a><\/p>\n<p><a href=\"https:\/\/medium.com\/the-state-and-future-of-geoint-2017-report\/activity-based-intelligence-understanding-patterns-of-life-481c78b7d5ae\">https:\/\/medium.com\/the-state-and-future-of-geoint-2017-report\/activity-based-intelligence-understanding-patterns-of-life-481c78b7d5ae<\/a><\/p>\n<p><a href=\"https:\/\/www.history.com\/this-day-in-history\/edward-snowden-discloses-u-s-government-operations\">https:\/\/www.history.com\/this-day-in-history\/edward-snowden-discloses-u-s-government-operations<\/a><\/p>\n<p><a href=\"https:\/\/www.pcmag.com\/news\/how-companies-turn-your-data-into-money\">https:\/\/www.pcmag.com\/news\/how-companies-turn-your-data-into-money<\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Below is a list of Sources used during this project: https:\/\/www.nytimes.com\/2020\/01\/24\/opinion\/sunday\/surveillance-capitalism.html https:\/\/www.computerweekly.com\/feature\/Surveillance-capitalism-in-the-age-of-Covid-19 https:\/\/news.harvard.edu\/gazette\/story\/2019\/03\/harvard-professor-says-surveillance-capitalism-is-undermining-democracy\/ https:\/\/www.nytimes.com\/2017\/05\/10\/technology\/techs-frightful-five-theyve-got-us.html https:\/\/www.netflix.com\/title\/81254224 https:\/\/www.pcmag.com\/news\/how-companies-turn-your-data-into-money?amp=true https:\/\/www.forbes.com\/sites\/forbestechcouncil\/2020\/09\/25\/the-state-of-mass-surveillance\/?sh=367e8ef2b62d https:\/\/www.vox.com\/recode\/2020\/5\/13\/21257481\/wyden-freedom-patriot-act-amendment-mcconnell https:\/\/harvardlawreview.org\/2018\/04\/cooperation-or-resistance-the-role-of-tech-companies-in-government-surveillance\/ https:\/\/dtl315.slack.com\/files\/U02DW6VCTM2\/F02H8ADUL01\/surveillance_capitalism_sage_articles.pdf?origin_team=T04QE1EGT&amp;origin_channel=C02DXQFNCBY https:\/\/www.lawfareblog.com\/what-are-limits-congressional-surveillance https:\/\/www.youtube.com\/watch?v=FrxDrpi1XNU https:\/\/www.justsecurity.org\/71837\/new-technologies-new-problems-troubling-surveillance-trends-in-america\/ https:\/\/datasmart.ash.harvard.edu\/news\/article\/mining-social-media-data-policing-ethical-way https:\/\/www.nytimes.com\/2021\/01\/29\/opinion\/sunday\/facebook-surveillance-society-technology.html&#8230;<\/p>\n<div class=\"more-link-wrapper\"><a class=\"more-link\" href=\"https:\/\/blogs.shu.edu\/surveillancecapitalism\/sources\/\">Continue reading<span class=\"screen-reader-text\">Sources<\/span><\/a><\/div>\n","protected":false},"author":4937,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-124","page","type-page","status-publish","hentry","entry"],"_links":{"self":[{"href":"https:\/\/blogs.shu.edu\/surveillancecapitalism\/wp-json\/wp\/v2\/pages\/124","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.shu.edu\/surveillancecapitalism\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/blogs.shu.edu\/surveillancecapitalism\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.shu.edu\/surveillancecapitalism\/wp-json\/wp\/v2\/users\/4937"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.shu.edu\/surveillancecapitalism\/wp-json\/wp\/v2\/comments?post=124"}],"version-history":[{"count":4,"href":"https:\/\/blogs.shu.edu\/surveillancecapitalism\/wp-json\/wp\/v2\/pages\/124\/revisions"}],"predecessor-version":[{"id":209,"href":"https:\/\/blogs.shu.edu\/surveillancecapitalism\/wp-json\/wp\/v2\/pages\/124\/revisions\/209"}],"wp:attachment":[{"href":"https:\/\/blogs.shu.edu\/surveillancecapitalism\/wp-json\/wp\/v2\/media?parent=124"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}