You are previewing Ethical Issues and Citizen Rights in the Era of Digital Government Surveillance.
O'Reilly logo
Ethical Issues and Citizen Rights in the Era of Digital Government Surveillance

Book Description

Questions surrounding the concept of freedom versus security have intensified in recent years due to the rise of new technologies. The increased governmental use of technology for data collection now poses a threat to citizens’ privacy and is drawing new ethical concerns. Ethical Issues and Citizen Rights in the Era of Digital Government Surveillance focuses on the risks presented by the usage of surveillance technology in the virtual public sphere and how such practices have called for a re-examination of what limits should be imposed. Highlighting international perspectives and theoretical frameworks relating to privacy concerns, this book is a pivotal reference source for researchers, professionals, and upper-level students within the e-governance realm.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Book Series
    1. Mission
    2. Coverage
  5. Preface
  6. Acknowledgment
  7. Section 1: Theoretical Perspectives on Electronic Surveillance
    1. Chapter 1: The Borders of Corruption
      1. ABSTRACT
      2. REFERENCES
    2. Chapter 2: The Mode of Information – Due Process of Law and Student Loans
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND: THE BUSINESS OF STUDENT LOANS
      4. BACKGROUND: BILLS OF ATTAINDER
      5. REVIEW OF THE LITERATURE
      6. STUDENT LOANS IN BANKRUPTCY
      7. CONCLUSION
      8. REFERENCES
    3. Chapter 3: Using Duality Theory to Reframe E-Government Challenges
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. CURRENT STATE OF E-GOVERNMENT
      5. E-GOVERNMENT CHALLENGES AND CONTROVERSIES
      6. DUALITY THEORY
      7. IMPROVING GOVERNMENT BY DESIGNING DUALITY INTO E-GOVERNMENT
      8. DISCUSSION
      9. CONCLUSION
      10. REFERENCES
    4. Chapter 4: Who “Screens” Security?
      1. ABSTRACT
      2. INTRODUCTION
      3. PART 1 – UNREAL PLACES/REAL FEARS: SCIENCE FICTION DYSTOPIAS AND SURVEILLANCE
      4. PART II – “BIG BROTHER WATCHING”: PARANOID POLITICS IN A REAL SURVEILLANCE CULTURE
      5. CODA – “I LIKE TO WATCH”: SURVEILLANCE IN A CULTURE OF VIEWERS
      6. REFERENCES
      7. ENDNOTES
  8. Section 2: Ethical Issues, Privacy, and Electronic Surveillance
    1. Chapter 5: Reconciling the Needs for National Security and Citizen Privacy in an Age of Surveillance
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. HISTORICAL OVERVIEW OF SURVEILLANCE IN THE U.S.
      5. THE SURVEILLANCE SOCIETY AND DIGITAL COMMUNICATION
      6. FRAMEWORKS FOR INTERPRETATION
      7. CONCLUSION
      8. REFERENCES
    2. Chapter 6: The Right to Privacy Is Dying
      1. ABSTRACT
      2. INTRODUCTION
      3. I. THE PROBLEM OF DEFINING PRIVACY
      4. II. THE IMPORTANCE OF PRIVACY
      5. III. PRIVACY FROM CRADLE TO DEATHBED
      6. CONCLUSION
      7. ACKNOWLEDGMENT
      8. REFERENCES
      9. KEY TERMS AND DEFINITIONS
    3. Chapter 7: Big Collusion
      1. ABSTRACT
      2. INTRODUCTION
      3. BIG COLLUSION
      4. DIGITAL SURVEILLANCE STATE
      5. CORPORATIONS
      6. CONSUMERS
      7. BREAKING THE CYCLE
      8. CONCLUSION
      9. REFERENCES
    4. Chapter 8: Privacy Concerns with Digital Forensics
      1. ABSTRACT
      2. INTRODUCTION
      3. THE TECHNIQUES OF DIGITAL FORENSICS
      4. FORENSIC TARGETS
      5. PRIVACY CONCERNS IN DIGITAL FORENSICS
      6. LEGAL PROTECTIONS AGAINST DIGITAL FORENSICS
      7. TECHNICAL PROTECTION METHODS AGAINST DIGITAL FORENSICS
      8. FUTURE DIRECTIONS
      9. CONCLUSION
      10. ACKNOWLEDGMENT
      11. REFERENCES
      12. KEY TERMS AND DEFINITIONS
    5. Chapter 9: Achieving Balance between Corporate Dataveillance and Employee Privacy Concerns
      1. ABSTRACT
      2. INTRODUCTION
      3. LITERATURE REVIEW
      4. PROPOSED GOVERNANCE FOR DATAVEILLANCE ACTIVITIES
      5. CONCLUSION
      6. REFERENCES
      7. KEY TERMS AND DEFINITIONS
    6. Chapter 10: Cyber Espionage
      1. ABSTRACT
      2. INTRODUCTION
      3. THE INTERNET AS THE MEDIUM OF INFORMATION STORAGE AND TRANSFER
      4. METHODS OF COLLECTING INFORMATION FROM THE INTERNET
      5. CONCLUSION
      6. REFERENCES
      7. KEY TERMS AND DEFINITIONS
      8. ENDNOTES
    7. Chapter 11: The E-Government Surveillance in the United States
      1. ABSTRACT
      2. INTRODUCTION
      3. EVOLUTION OF WIRETAPPING LEGISLATION IN THE UNITED STATES
      4. PUBLIC OPINION OF U.S. GOVERNMENT SURVEILLANCE
      5. RIGHT WING AUTHORITARIANISM
      6. PERSONAL INFORMATION PRIVACY
      7. EMPIRICAL MODEL: DATA AND METHODS
      8. FINDINGS AND DISCUSSION
      9. SOLUTIONS AND RECOMMENDATIONS
      10. FUTURE RESEARCH DIRECTIONS
      11. CONCLUSION
      12. REFERENCES
      13. KEY TERMS AND DEFINITIONS
  9. Section 3: Case Studies of E-Surveillance
    1. Chapter 12: Public Administrators, School Safety, and Forms of Surveillance
      1. ABSTRACT
      2. INTRODUCTION
      3. LEGISLATION SHAPING SURVEILLANCE
      4. BACKGROUND
      5. METHODS
      6. THE ORGANIZATIONAL CONTEXT
      7. EMERGING THEMES
      8. ANALYSIS AND RESULTS
      9. FUTURE RESEARCH
      10. CONCLUSION
      11. REFERENCES
    2. Chapter 13: E-Government, E-Surveillance, and Ethical Issues from Malaysian Perspective
      1. ABSTRACT
      2. INTRODUCTION
      3. CONCEPT OF SURVEILLANCE
      4. E-GOVERNMENT AND E-SURVEILLANCE IN MALAYSIA
      5. ETHICAL ISSUES RELATED TO E-SURVEILLANCE
      6. MALAYSIAN LAWS AND POLICIES THAT GOVERN E-GOVERNMENT AND DIGITAL PRIVACY
      7. A CONCEPTUAL FRAMEWORK
      8. CONCLUSION
      9. REFERENCES
      10. KEY TERMS AND DEFINITIONS
  10. Compilation of References
  11. About the Contributors