ENG-114-104 - with La Dessa E. Cunningham Pearson | |
---|---|
The Ideal Employer | Download the PDF File |
Career Research - Employers | Download the PDF File |
Resumes and Skills | Download the PDF File |
Career Path Objectives | Download the PDF File |
Career Options Presentation -PPT - WEB | Download the PPSX File |
Research Paper - WEB | Download the PDF File |
Research Paper Presentation - PPT | Download the PPSX File |
Research Paper - Presentation Narrative | Download the PDF File |
Village Spirit Minimag | Download the PDF File |
Village Spirit Minimag - References | Download the PDF File |
PHI-240-102 (85431) Introduction to Ethics | |
---|---|
The Current Paper | Mass Surveillance Argument - PDF |
Presentation | Mass Surveillance - PPT - PPSX File |
Project Topic Preference | Download the PDF file of this document |
Project Topic Assignment | It is sometimes morally acceptable for a society to monitor the communications and activities of all of its citizens if that information could be used to prevent violence against innocent people. (Dissagree) |
Just Surveillance? Towards a Normative Theory of Surveillance Author: Macnish, Kevin Surveillance & Society12.1 (2014): 142-153 |
|
Conditions under which Surveillance may be Ethically Justifiable: Remarks on Kevin Macnish's proposed normative theory of surveillance Author: Palm, Elin Surveillance & Society12.1 (2014): 164-170 |
|
The Brave New Social Media: Contradictory Information and Communication Technologies and The State-Capitalist Surveillance Complex Author: Jernej Amon Prodnik Teorija in Praksa, 11/2014, Volume 51, Issue 6 Prodnik, Jernej Amon. Teorija in Praksa51.6 (2014): 1222-1241,1407 |
|
Electronic Communications Surveillance Author: Regan, Lauren Monthly Review66.3 (Jul/Aug 2014): 32-42 |
|
"Surveillance harms mental health" | |
Leadership, power and the use of surveillance: Implications of shared social identity for leaders' capacity to influence |
|
Electronic Work Monitoring Authors: Schleifer, Lawrence M. in Factors Intrinsic to the Job, Hurrell, Jr., Joseph J.,Levi, Lennart,Murphy, Lawrence R.,Sauter, Steven L., Editor, Encyclopedia of Occupational Health and Safety, Jeanne Mager Stellman, Editor-in-Chief. International Labor Organization, Geneva. © 2011. |
|
Effects of electronic performance monitoring on personal control, task satisfaction, and task performance Stanton, Jeffrey M.; Barnes-Farrell, Janet L. Journal of Applied Psychology, Vol 81(6), Dec 1996, 738-745. |
|
"Surveillance instills distrust of the perpetrators by the victims" | |
The New Surveillance Normal: NSA and Corporate Surveillance in the Age of Global Capitalism |
|
Panopticon Dreams: The Nightmarish Effects of Workplace Surveillance Excerpt from book: |
|
Monday, 10 February 2014 Henry A. Giroux | Totalitarian Paranoia in the Post-Orwellian Surveillance State By Henry A Giroux, Truthout | Op-Ed |
Article - Local Copy Article Source - truthout.org |
"Surveillance creates social conformity" | |
Knowing what to think by knowing who you are: Self-categorization and the nature of norm formation, conformity and group polarization Authors: Dominic Abramst Institute of Social and Applied Psychology, The University, Canterbury, Kent CT2 7L2, UK Margaret Wetherell The Open University, Milton Keynu Sandra Cochrane University of Dundee Michael A. Hogg Universit,y of Melbourne John C. Turner MacQuarie University British Journal of Social Psychology Volume 29, Issue 2, Article first published online: 6 JUN 2011 |
|
"We contrast two theoretical approaches to social influence, one stressing interpersonal dependence, conceptualized as normative and informational influence (Deutsch & Gerard, 1955), and the other stressing group membership, conceptualized as self-categorization and referent informational influence (Turner, Hogg, Oakes, Reicher & Wetherell, 1987). We argue that both social comparisons to reduce uncertainty and the existence of normative pressure to comply depend on perceiving the source of influence as belonging to one's own category..." | |
Austerity and The Poison Of Neoliberal Miseducation Author: Giroux, Henry Symploke 22.1/2 (2015): 9-21,441. |
|
"Surveillance makes the way to a grey future" | |
01.31.15 My Post Cyberpunk Indentured Servitude Article by Barrett Brown courtesy of The Daily Beast http://www.thedailybeast.com/ |
|
Friday, 06 February 2015 A Brief History of Happiness: How the US Lost Track of the Good Life - and Where to Find It Now Article By Sarah van Gelder YES! Magazine | Op-Ed - http://www.truth-out.org/ |
|
Friday, 03 October 2014 When Google Met WikiLeaks: Battle for a New Digital Age Article By NoSASSyase SpeakOut | Book Review - http://www.truth-out.org/ |
|
Tuesday, 04 November 2014 |
|
01/05/2013 FBI Surveillance Of Occupy Wall Street Detailed Author Unknown Huuf Post Politics - https://secure.huffingtonpost.com/politics/ |
|
Monday, 27 February 2012 Infiltration to Disrupt, Divide and Misdirect Is Widespread in Occupy (Part I) By Kevin Zeese and Margaret Flowers, Occupy Washington, DC | Report |
|
March 13, 2012 Part II Infiltration of Political Movements is the Norm, Not the Exception in the United States By Kevin Zeese and Margaret Flowers |
|
June 27, 2013 The Criminal N.S.A. by Jennifer Stisa Granick and Christopher Jon Sprigman The New York Times - OP-ED |
|
Free Edward Snowden Surveillance programs Background: the US Intelligence Community, NSA operations, The law behind surveillance, Foreign intelligence https://edwardsnowden.com/surveillance-programs/ |
Original Source |
The Technologies of Total Domination Maria Los Vol 2, No 1 (2004) |
|
Counter Point | |
What It Takes: In Defense of the NSA Article by Michelle Van Cleave World Affairs Journal: November/December 2013 |
|
February 18, 2015 Jeb Bush Defends NSA Mass Surveillance as 'Hugely Important' The National Journal |
|
Choosing Both: Making Technology Choices at the Intersections of Privacy and Security Joel, Alexander W. |
|
Additional Articles | |
Monday, 16 March 2015 Local Copy - Original Source |
|
WEB-115-100 (85771) Web Markup and Scripting | |
Assignment 1 - 3 of the Chapter Topics |
Download the PDF file of this document |
Assignment 2 - 3 of the Chapter Topics | Download the PDF file of this document |
Project URL | Web Page at FTCC |