Annotated Bibliography
1) Cauley, Leslie. "NSA Has Massive Database of Americans' Phone Calls." USA Today. USA TODAY, 11 May 2006. Web. 22 Oct. 2014.
|
An article in USA today depicting a view that government has overstepped their boundaries by allegedly keeping a database of American's calls.
|
2) Clasen-Kelly, Fred. "Charlotte, N.C., Police Investigators Secretly Track Cellphones." Charlotte, N.C., Police Investigators Secretly Track Cellphones. E.Republic, Inc., 20 Oct. 2014. Web. 22 Oct. 2014.
|
An article that depicts one of the many ways technology could potentially be used to invade privacy. Many people are against such technology while others feel that if you have nothing to hide you shouldn't care.
|
3) Cornish, Paul. "Technology, Strategy and Counterterrorism." International Affairs 86.4 (2010): 875-88. Web.
|
A scholarly article that touched on the effects of technology on counter-terrorism efforts
|
4) Cosgrove-Mather, Bootie. "Anti-Terrorism Technology." CBS News. CBS News, 12 June 2002. Web. 22 Oct. 2014.
|
A CBS news article detailing some of the more recent technology used to ward off terrorist attacks
|
5) Dunleavy, Patrick. Digital Era Governance IT Corporations, the State, and E-government. Oxford: Oxford UP, 2006. Print.
|
This book touches more on the business impacts of technology in government, specifically technology's role in lowering taxes due to eficiency
|
6) Elmer-DeWitt, Philip. "Apple’s Security Bug: Five NSA Conspiracy theories." Fortune. Time Inc., 23 Feb. 2014. Web. 22 Oct. 2014.
|
Used to help portray an example of conspiracy theories, this article details the allegations that Apple had purposely bugged their software to allow the NSA to leach information
|
7) Margetts, Helen. Information Technology in Government Britain and America. London: Routledge, 1999. Print.
|
Yet another book about E-governance, as it is so called. This book helps outline more situations in which technology has been used to benefit the citizens of a country.
|
8) Roy, Jeffrey. "Introduction: E-Government." Social Science Computer Review 21.1 (2003): 3-5. Web.
|
This scholarly article suggests that in the future the government will become more efficient and will be able to serve its citizens due to increasing prevalence of technology.
|
9) Sargent, Greg. "We Need More Transparency and Debate around NSA Phone Records Program."The Washington Post. The Washington Post, 6 June 2013. Web. 22 Oct. 2014.
|
This article heavily criticizes the NSA for their use of technology to allegedly spy on citizens. The article follows the view that the government needs to be much more transparent with its use of technology going forward.
|
10) Snyder, Michael. "32 Privacy Destroying Technologies That Are Systematically Transforming America Into A Giant Prison." The Truth. The Truth, 27 Nov. 2013. Web. 22 Oct. 2014.
|
This article comes from a source that is known to publish articles that go along with conspiracy theorist views.
|
11) Stockwell, Mel. "3 Views on NSA Reform." The Christian Science Monitor. The Christian Science Monitor, 20 Oct. 2014. Web. 22 Oct. 2014.
|
This article details certain actions done by the NSA that were recently brought to light. A key point from this article is that the NSA doesn't even need a court order in most situations to collect information.
|
12) Stockwell, Mel. "The Future of Government Technology and the Role of the IT Department -- Washington Technology." Washington Technology. Media, Inc., 20 Oct. 2014. Web. 22 Oct. 2014.
|
This article suggests that increasing the prevalence of technology provides cheaper costs to the government and therefore the citizens as well. This follows the view that the technology is used to benefit citizens.
|