ENG-114-104 - with La Dessa E. Cunningham Pearson
The Ideal Employer Download the PDF File
Career Research - Employers Download the PDF File
Resumes and Skills Download the PDF File
Career Path Objectives Download the PDF File
Career Options Presentation -PPT - WEB Download the PPSX File
Research Paper - WEB Download the PDF File
Research Paper Presentation - PPT Download the PPSX File
Research Paper - Presentation Narrative Download the PDF File
Village Spirit Minimag Download the PDF File
Village Spirit Minimag - References Download the PDF File
PHI-240-102 (85431) Introduction to Ethics
The Current Paper Mass Surveillance Argument - PDF
Presentation Mass Surveillance - PPT - PPSX File
Project Topic Preference Download the PDF file of this document
Project Topic Assignment It is sometimes morally acceptable for a society to monitor the communications and activities of all of its citizens if that information could be used to prevent violence against innocent people. (Dissagree)
Just Surveillance? Towards a Normative Theory of Surveillance

Author: Macnish, Kevin

Surveillance & Society12.1 (2014): 142-153
Conditions under which Surveillance may be Ethically Justifiable: Remarks on Kevin Macnish's proposed normative theory of surveillance

Author: Palm, Elin

Surveillance & Society12.1 (2014): 164-170
The Brave New Social Media: Contradictory Information and Communication Technologies and The State-Capitalist Surveillance Complex

Author: Jernej Amon Prodnik

Teorija in Praksa, 11/2014, Volume 51, Issue 6

Prodnik, Jernej Amon. Teorija in Praksa51.6 (2014): 1222-1241,1407
Electronic Communications Surveillance

Author: Regan, Lauren

Monthly Review66.3 (Jul/Aug 2014): 32-42
"Surveillance harms mental health"

Leadership, power and the use of surveillance: Implications of shared social identity for leaders' capacity to influence

Subašić, Emina; Reynolds, Katherine J.; Turner, John C.; Veenstra, Kristine E.; Haslam, S. Alexander

The Leadership Quarterly (Impact Factor: 2.7). 02/2011; 22(1):170-181. DOI: 10.1016/j.leaqua.2010.12.014

Electronic Work Monitoring

Authors: Schleifer, Lawrence M.

in Factors Intrinsic to the Job, Hurrell, Jr., Joseph J.,Levi, Lennart,Murphy, Lawrence R.,Sauter, Steven L., Editor, Encyclopedia of Occupational Health and Safety, Jeanne Mager Stellman, Editor-in-Chief. International Labor Organization, Geneva. © 2011.
Effects of electronic performance monitoring on personal control, task satisfaction, and task performance

Stanton, Jeffrey M.; Barnes-Farrell, Janet L.

Journal of Applied Psychology, Vol 81(6), Dec 1996, 738-745.
"Surveillance instills distrust of the perpetrators by the victims"

The New Surveillance Normal: NSA and Corporate Surveillance in the Age of Global Capitalism

Author: Price, David H.

Monthly Review 66.3 (Jul/Aug 2014): 43-53.

Panopticon Dreams: The Nightmarish Effects of Workplace Surveillance

Author: Brittany Meier

Copyright © 2007, Ethica Publishing. All Rights Reserved.

Excerpt from book:
At the Edge of Information: Changing Ethical Dilemmas

Authors: The 2007 Leeds School of Business Information Ethics Class

Leeds School of Business, UCB 419, Boulder, CO 80309

Monday, 10 February 2014
Henry A. Giroux | Totalitarian Paranoia in the Post-Orwellian Surveillance State

By Henry A Giroux, Truthout | Op-Ed
"Surveillance creates social conformity"
Knowing what to think by knowing who you are: Self-categorization and the nature of norm formation, conformity and group polarization

Dominic Abramst
Institute of Social and Applied Psychology, The University, Canterbury, Kent CT2 7L2, UK
Margaret Wetherell
The Open University, Milton Keynu
Sandra Cochrane
University of Dundee
Michael A. Hogg
Universit,y of Melbourne
John C. Turner
MacQuarie University

British Journal of Social Psychology
Volume 29, Issue 2, Article first published online:
6 JUN 2011
"We contrast two theoretical approaches to social influence, one stressing interpersonal dependence, conceptualized as normative and informational influence (Deutsch & Gerard, 1955), and the other stressing group membership, conceptualized as self-categorization and referent informational influence (Turner, Hogg, Oakes, Reicher & Wetherell, 1987). We argue that both social comparisons to reduce uncertainty and the existence of normative pressure to comply depend on perceiving the source of influence as belonging to one's own category..."
Austerity and The Poison Of Neoliberal Miseducation

Author: Giroux, Henry

Symploke 22.1/2 (2015): 9-21,441.
"Surveillance makes the way to a grey future"
My Post Cyberpunk Indentured Servitude
Article by Barrett Brown
courtesy of The Daily Beast
Friday, 06 February 2015
A Brief History of Happiness: How the US Lost Track of the Good Life - and Where to Find It Now
Article By Sarah van Gelder
YES! Magazine | Op-Ed - http://www.truth-out.org/
Friday, 03 October 2014
When Google Met WikiLeaks: Battle for a New Digital Age
Article By NoSASSyase
SpeakOut | Book Review - http://www.truth-out.org/

Tuesday, 04 November 2014
The Pressure to Escalate
By Tom Engelhardt
TomDispatch | Op-Ed

FBI Surveillance Of Occupy Wall Street Detailed
Author Unknown
Huuf Post Politics - https://secure.huffingtonpost.com/politics/
Monday, 27 February 2012
Infiltration to Disrupt, Divide and Misdirect Is Widespread in Occupy
(Part I)
By Kevin Zeese and Margaret Flowers, Occupy Washington, DC | Report
March 13, 2012
Part II Infiltration of Political Movements is the Norm, Not the Exception in the United States
By Kevin Zeese and Margaret Flowers
June 27, 2013
The Criminal N.S.A.
by Jennifer Stisa Granick and Christopher Jon Sprigman
The New York Times - OP-ED
Free Edward Snowden
Surveillance programs
Background: the US Intelligence Community, NSA operations, The law behind surveillance, Foreign intelligence

The Technologies of Total Domination
Maria Los
Vol 2, No 1 (2004)
Counter Point
What It Takes: In Defense of the NSA
Article by Michelle Van Cleave

World Affairs Journal: November/December 2013
February 18, 2015
Jeb Bush Defends NSA Mass Surveillance as 'Hugely Important'
The National Journal

Choosing Both: Making Technology Choices at the Intersections of Privacy and Security

Joel, Alexander W.
(Jun 2010), Texas Law Review88.7: 1751-1765

Additional Articles

Monday, 16 March 2015
Data and Goliath: Bruce Schneier on the Hidden Battles to Collect
Your Data and Control Your World
By Amy Goodman and Juan González, Democracy Now! | Video Interview

Local Copy - Original Source

WEB-115-100 (85771) Web Markup and Scripting

Assignment 1 - 3 of the Chapter Topics

Download the PDF file of this document
Assignment 2 - 3 of the Chapter Topics
Project URL