Annotated Bibliography of Surveillance & …

Dear all,

please post your annotated bibliographies here in form of a comment by October 1, 2018. Your Bibliography must include at least 7 texts. Provide a concise summary of the text, especially noting how it addresses your chosen topic. Citation style: MLA.

  1. Citation
  2. Summary: What is the main argument? What are the strengths and weaknesses of the source? What is the relevance to your topic? (max. 200 words)

20 thoughts on “Annotated Bibliography of Surveillance & …

  1. Annotated Bibliography

    Greenwald, Glenn, and Ewen MacAskill. “NSA Prism program taps into user data of Apple, Google and others.” The Guardian 7.6 (2013): 1-43.

    Summary: This article is by The Guardian and delves into the top-secret NSA program called PRISM which came in the aftermath of 9/11. In this operation, the government had direct access to firms such as; Google, Apple, and Facebook where they could monitor millions of American’s online transactions. The U.S. has denied such allegations. This article will be used as an unpartisan review of the actual surveillance program used by the NSA and how it worked.

    Bauman, Zygmunt, et al. “After Snowden: Rethinking the impact of surveillance.” International political sociology 8.2 (2014): 121-144.

    Summary: Following the information gained by a couple journalists after whistleblower Edward Snowden illegally stole top-secret information, the public wanted answers and reform. This article shows the negative externalities of mass-surveillance and why public discourse is needed in order to correct any injustices. Mainly regarding human rights and the legality of these programs are at the heart of this article.

    Risen, James, and Eric Lichtblau. “Bush lets US spy on callers without courts.” New York Times 16 (2005): A1.

    Summary: This article by the New York Times, gives a pretext to the start of the PRISM program and the NSA’s mass-surveillance of telecommunications of not only citizens in other countries but citizens of the U.S. Although it may seem like an over-reach of power by the federal government, Americans were not only saddened by 9/11 but felt a strong sense of patriotism that brought everyone together and gave us a sense of purpose in finding and stopping anyone who is a threat to the U.S. At the time, many believed that mass surveillance was the right thing to do and while some may disagree, the ethical and legal ramifications are up for debate.

    Müller-Maguhn, Andy, et al. “Treasure Map: The NSA Breach of Telekom and Other German Firms.” Spiegel Online (2014).

    Summary: This article is regarding the NSA’s illegal surveillance of Telekom and other German firms. Surveillance was done under an operation called “Treasure Map”, this operation comprised of forming an interactive map of the global web in real time. This program focused on the observation of communication companies. It also was used for internet warfare, in that, malicious bugs were sent into networks to slow down or steal information or online programs destroyed.

    Kerr, Orin S. “Updating the Foreign Intelligence Surveillance Act.” The University of Chicago Law Review 75.1 (2008): 225-243.

    Summary: This article goes in depth to the semantics of how a surveillance operation gains legal authority. Something called a FISA warrant or Foreign Intelligence Surveillance Act is what gives governmental bodies the judicial authority to spy on a person or entity. These cases are presided over by a secret judge whom after being presented all the evidence, makes the legal determination if surveillance can be authorized.

    Jaeger, Paul T., John Carlo Bertot, and Charles R. McClure. “The impact of the USA Patriot Act on collection and analysis of personal information under the Foreign Intelligence Surveillance Act.”

    Summary: This article focuses on the Patriot Act, a congressional act signed into law after 9/11 to give governmental agencies the tools they need to fight and obstruct terrorism. Under the umbrella term of Patriot Act, the FISA warrant is used to gain legal surveillance of a U.S. citizen. As the government tries to ever increase its reach and capabilities, this article asks the important questions regarding whether its needed, legal, and the possible positive and negative effects of such a proposal.

    Michelle Cayford, Wolter Pieters, Constant Hijzen. (2018) Plots, murders, and money: oversight bodies evaluating the effectiveness of surveillance technology. Intelligence and National Security 0:0, pages 1-23.

    Summary: In this article, the author confronts the criticism that there is no need for such mass surveillance programs if we aren’t gaining any valuable information out of it. The opinions and data in this article are given by actual intelligence officers who speak to the efficacy f such programs. Most if not all believe that the governments surveillance programs have helped arrest those under suspicion and pre-empt attacks.

  2. 7 Secondary Sources- Reference List

    Gregory, Anthony, and Oakland, Calif.) Independent Institute. 2016. American Surveillance : Intelligence, Privacy, and the Fourth Amendment. Madison, Wisconsin: University of Wisconsin Press. search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=1296424&site=eds-live&scope=site.
    This source goes into a general overarching theme of what is the NSA and American surveillance as a whole, it discusses the fourth amendment and how it is used by the united states government. I will use this as a way to gain background knowledge about surveillance in the 21st century as a whole and gain insights to surveillance in spaces that is not german.

    Fear by Stephen Zweig

    eds.b.ebscohost.com/eds/detail/detail?vid=9&sid=5a5a771a-fdca-44e3-8b35-61525b1fbaa4%40pdc-v-sessmgr01&bdata=JnNpdGU9ZWRzLWxpdmUmc2NvcGU9c2l0ZQ%3d%3d#AN=131219675&db=bth
    Greenberg, Joshua, and Sean P. Hier. Surveillance : Power, Problems, and Politics. UBC Press, 2009. EBSCOhost, nuncio.cofc.edu/login?/search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=383162&site=eds-live&scope=site.
    This source goes more into the issues and problems of surveillance in terms of control over a government’s people from it along with issues of privacy. I am going to use this as a way to gain more background knowledge on my subject on privacy and power issues when it comes to surveillance, especially within power struggles and the politics of surveillance as a whole.

    search.ebscohost.com/login.aspx?direct=true&db=rzh&AN=127750176&site=eds-live&scope=site Shensa, Ariel, et al. “Social Media Use and Depression and Anxiety Symptoms: A Cluster Analysis.” American Journal of Health Behavior, vol. 42, no. 2, Mar. 2018, pp. 116–128. EBSCOhost, doi:10.5993/AJHB.42.2.11.
    This paper goes into the effects of social media use and depression and anxiety with how by young adults and preteens being on social media and constantly connected how this affects their mental health. Social media causes feelings of isolation and adverse mental health effects which can only be heightened if social media is being used as surveillance as well. With social media being used as surveillance tools for significant others they may become obsessed with it.

    search.ebscohost.com/login.aspx?direct=true&db=bth&AN=131785097&site=eds-live&scope=site Worsley, Joanne D., et al. “Attachment Anxiety and Problematic Social Media Use: The Mediating Role of Well-Being.” CyberPsychology, Behavior & Social Networking, vol. 21, no. 9, Sept. 2018, pp. 563–568. EBSCOhost, doi:10.1089/cyber.2017.0555.
    This article as well goes into problematic social media use in terms of stalking and isolation from social media outlets. With social media being used to keep constantly connected with others, those feel adverse effects if not constantly speaking and connected to a Significant other, they become obsessive as well and use this tool as a way to track others much like surveillance does as well.

    search.ebscohost.com/login.aspx?direct=true&db=psyh&AN=2018-24910-024&site=eds-live&scope=site Sutcliffe, Alistair G., et al. “Activity in Social Media and Intimacy in Social Relationships.” Computers in Human Behavior, vol. 85, Aug. 2018, pp. 227–235. EBSCOhost, doi:10.1016/j.chb.2018.03.050.
    This article is more overarching on social media effect within activities on it and how it affects the both emotional and physical intimacy of relationships. This can play in to surveillance affecting intimacy as well for these relationships with creating issues for those within it with this constant attachment.

    nuncio.cofc.edu/login?search.ebscohost.com/login.aspx?direct=true&db=psyh&AN=2018-01487-016&site=eds-live&scope=site
    Ortiz, Jaime, et al. “Information Privacy, Consumer Alienation, and Lurking Behavior in Social Networking Sites.” Computers in Human Behavior, vol. 80, Mar. 2018, pp. 143–157. EBSCOhost, doi:10.1016/j.chb.2017.11.005.
    This article goes into the “lurking behavior” of social media disturbing what social media stalking is as a whole and more into how information on social media is not protected or private at all for one who is knowledgeable about technology. How those whom seek information can gain huge insights on relationships and so forth though the use of social media.

  3. Bibliography
    Bell, David. “Surveillance Is Sexy.” Surveillance & Society, vol. 6, no. 3, 2009, pp. 203–212., aaaaaa doi:10.24908/ss.v6i3.3281.
    This article explores different forms of sexualized surveillance and addresses how these modes are a form of resistance. By locating “sexy surveillance” this article will confront the logics head on, with discussions of counter-surveillance and on ways that voyeurism and exhibitionism are mobilized. This article argues that sexualization is one possible response for the surveillance-savvy subject to utilize. This article can aid in references to the gaze and how new ways of being surveilled and how one is surveilled are created.
    Freud, Sigmund. “The Uncanny (1919). Part I. Linguistic Approach to the Uncanny.” aaaaaaPsycEXTRA Dataset, 1971, doi:10.1037/e417472005-415.
    Freud’s essay provides psychoanalytic criticism that focus on themes in literature that make the reader uneasy. Specifically, Hoffmann’s “The Sandman” is discussed and Nathaniel’s fear is analyzed. The essay explains that what is uncanny in literature could be experienced differently than what is uncanny in real life. Freud explains that what we accept the literary world is separate than our real world, with different rules governing what can and cannot take place. This essay can help regarding analyzing the psychology of fear and one’s sub conscious being expressed through symbolism.
    Geistfeld, Danielle. “What Is Real: The Subjectivity of Reality in E.T.A. Hoffmann’s ‘Der aaaaaaSandmann.’” Journal of Undergraduate Research at Minnesota State University, aaaaaMankato, vol. 15, no. 2, 2015, cornerstone.lib.mnsu.edu/jur/vol15/iss1/2/.
    This article explores the concepts of reality and fantasy through the expression of romanticism and enlightenment during the era the story takes place. The article discusses the surrounding environment in which The Sandman was written and the influences of the story in which explains how romanticism and enlightenment engaged at the time. This article can lead to a better understanding of romanticism and enlightenment era through the depictions of each character while exploring how each era is represented in the literary world.
    Harper, David. “The Politics of Paranoia: Paranoid Positioning and Conspiratorial Narratives in aaaaaathe Surveillance Society.” Surveillance & Society, vol. 5, no. 1, Jan. 2002, aaaaaadoi:10.24908/ss.v5i1.3437.
    This article argues that paranoia in surveillance is dualistic; solely individual/intra-psychic level, or alternatively solely at a societal level. The article will break down the notion of discursive positioning by analyzing the cultural discourses that produce paranoia and explore effects of the positioning. Then the article will discuss the discursive positions in which people may place themselves as paranoid and explain the effects of this positioning. This article resource will aid in the understanding and explanation of paranoia as well as how paranoia works in surveillance/being surveilled.
    Mckay, Carolyn Louise. “Covert: the Artist as Voyeur.” Surveillance & Society, vol. 11, no. 3,
    2013, pp. 334–353., doi:10.24908/ss.v11i3.4504.
    Mckay addresses the artists in their aesthetics, rhetoric, and methodologies of surveillance in which they can critique, subvert, or play with emergent technologies. The paper explores the artistic methodologies that uses surveillance and the ethical tensions of appropriating lives of strangers for recreative pursuits. The role of an artist, nature of the gaze, and privacy versus expression will be discussed through the concept of surveillance as a platform and the tensions between objectivity and subjectivity by using a mechanical device as a form of obtaining information. This article can be used to address what is ethical when it comes to artistic expression and surveillance of an individual’s life.
    Negishi, Kaima. “From Surveillant Text to Surveilling Device: The Face in Urban Transit aaaaaaSpaces.” Surveillance & Society, vol. 11, no. 3, Jan. 2013, pp. 324–333., aaaaaadoi:10.24908/ss.v11i3.4495.
    This article discusses the power, significance, and operation of the human face as it transitions from being object for defining dispositions to an agency of control in contemporary transit spaces. The face is a critical object of measuring truthfulness which led to the creation of facial recognition devices to be deployed to transit spaces like airports and train stations, as they are used to identify risky situations, and intervene before they transpire to hazardous events. This article will discuss these control from a distance device, how the face is key to circulating a specific range of affects to modulate individuals and maintain security in transit places. This paper examines Japan and how they implemented the “smile scan technology” to modulate, make receptive, and turn into an agent of social control in urban transit spaces. The paper can assist in discussing the importance of the face, as well as how individuals may alter themselves when they are surveilled in public places.
    Rooney, Tonya. “Trusting Children: How Do Surveillance Technologies Alter a Childs aaaaaaExperience of Trust, Risk and Responsibility?” Surveillance & Society, vol. 7, no. 3/4, aaaaaaJune 2010, pp. 344–355., doi:10.24908/ss.v7i3/4.4160.
    This article discusses how surveillance technologies used to observe children throughout their development can change how a child experiences childhood. This paper addresses how a child may interact with peers and understand the world around them while under surveillance technology. By investigating the changes this paper provides an inside investigate a child’s experience and trust by showing that an increase presence across everyday activities may deny children opportunities to build trust and be trusted. The use of this article may aid in understanding the trust building within a child and how surveillance can interfere with this development which may alter their future perspectives.
    Smith, Gavin J.d. “Exploring Relations between Watchers and Watched in Control(Led) aaaaaaSystems: Strategies and Tactics.” Surveillance & Society, vol. 4, no. 4, Jan. 2002, aaaaaadoi:10.24908/ss.v4i4.3442.
    This paper investigates the ethnographic observation in the Closed Circuit Television (CCTV) control rooms by documenting meaningful types of technologically mediated interaction between CCTV and those being watched. They examine the operators’ interpretations of incidents, individuals, and social realities. Social-phenomenological processes take place in the forms of the information and existence of disembodied relationships of watchers and watched in the CCTV surveillance networks. The operator gaze incorporating care, control and creativity, and the existence of hermeneutical narrative constructions among the operators. This paper argues that informal tactics, employed to both entertain and relieve pressure, are the unintended outcome of systemic strategies of control to induce conformity. The watched of CCTV employ methods to maneuver themselves around the cameras. The practices of watchers and watched can be argued more generally that CCTV technology is a social medium, the people, places and objects watched functioning not as passive ‘objects of information’, but as active ‘subjects of communication’. This article can further explain how surveillance is socially and psychologically experienced by those under the gaze.

  4. Hoffmann, E. T. A. Sandman. Penguin Books, 2016.
    In E.T.A Hoffman’s “The Sandman,” women are surveilled, first by their beauty, then by their individuality and ability to make important analysis of situations. The two main women, Clara and Olympia, are both initially introduced based on their appearance. Clara’s appearance is described as “if the architects lauded the perfect proportions of her figure, if the painters found her neck, shoulders and breasts almost too chastely formed, all were enamored of her wonderful Magdalen hair and babbled about her complexion,” noting absolutely nothing about her as an actual individual (101-102). Similarly, when the reader first meets Olympia, she is described as “a woman, tall, very slim, perfectly proportioned and gorgeously dressed” once again leaving all of her wit to the imagination (98-99). I want to use Hoffmann’s story, in relation to other articles, to show how the surveillance of woman is one sided: focused on overall appearance and not much else.

    Saher Selod (2018): Gendered racialization: Muslim American men and women’s encounters with racialized surveillance, Ethnic and Racial Studies, DOI: 10.1080/01419870.2018.1445870
    In her article “Gendered Racialization: Muslim American men and women’s encounters with racialized surveillance,” Saher Selod provides evidence to the different ways Muslim American men and women are treated in comparison to those who don’t share the same religion. She takes it a step further and even uncovers the differences of surveillance between men and women. She claims that “private citizens also participate in surveilling Muslim Americans, which is also guided by gender” (7). By stating that surveillance is guided by gender, Selod has set the stage for her argument, “Muslim women’s surveillance did differ from that of men because they were also targeted for transgressing cultural norms in American society” (13). In relation to Hoffmann’s “The Sandman,” the women from this story are also “targeted for transgressing cultural norms.” Whether it be Clara, targeted for being beautiful but not capable of “so judicious and schoolmasterly analysis” (Hoffmann 98), or Olympia, also beautiful but “weak-minded” (Hoffmann 99), the women in this story are seen for their outward appearance foremost, then, if time permits, seen for their actual mindfulness, education and wit. Just as with Clara and Olympia, the women in Selod’s article are seen for their outward appearance, as seen when she writes, “Some of the Muslim woman I interviewed were told that they are losing their beauty by wearing the hijab” (13). Women being judged by their appearance above all else is timeless; despite culture, religion or education.

    Quinan, Christine. “Gender (in)Securities: Surveillance and Transgender Bodies in a Post-9/11
    Era of Neoliberalism.” Security/Mobility: Politics of Movement, edited by MATTHIAS LEESE and STEF WITTENDORP, Manchester University Press, Manchester, 2017, pp. 153–169. JSTOR, http://www.jstor.org/stable/j.ctt1wn0s9r.14.
    Christine Quinan claims that, “Bodily norms- informed by race, gender, and sexuality (i.e., whiteness, normative masculinity/femininity, and heterosexuality)- are encoded in tools of surveillance, including body scanners, identity documents, and facial recognition software” (153-154). Quinan discusses the “justification for expanding surveillance practices” while also confirms that these technologies are not always fair to all people (154). The idea of normative femininity in relation to surveillance is something I want to discuss in relation to “The Sandman.” Woman who are being surveilled in terms of their “normative femininity” rather than being surveilled as intelligent human beings are evident in Hoffmann’s “The Sandman.” Just as Quinan concludes that these surveillance advances are not fair to all people, I suggest that the surveillance of the woman in “The Sandman” are not fair either.

    WILKINS, AMY C., and CRISTEN DALESSANDRO. “MONOGAMY LITE: Cheating, College, and
    Women.” Gender and Society, vol. 27, no. 5, 2013, pp. 728–751. JSTOR, JSTOR, http://www.jstor.org/stable/43669825.
    In the article “Monogamy Lite: Cheating, College, and Women,” Wilkin’s dives into the infidelity of college age women within their relationships. She claims, “Women’s infidelity disrupts gendered expectations about sexual behavior,” while simultaneously suggesting that “men’s infidelity extends normative expectations” (729). I want to expose the problems behind men’s abnormal behavior being considered “normative expectations” while also showing how surveillance of women coincides with these claims. Wilkin also claims that “gendered scripts accord men control over beginning and ending dating relationships” giving them the power (730). I would like to take it a step further and extend this claim to surveillance as it is often noted that men were the ones watching women rather than equal surveillance. Although this article is about relationships and infidelity, I want to argue that these same gender constructs go hand in hand with surveillance.

    Avila, Renata. Women, Whistleblowing, WikiLeaks. OR Books, 2017.
    Renata Avila, Sarah Harrison and Angela Richter, through their book “Women, Whistleblowing, Wikileaks,” work to “bring together a trio of women from different backgrounds and parts of the world for a conversation about an area of activity that is widely perceived as heavily male dominated: whistleblowing and digital dissidence” (2). While this is their focus, I would like to focus particularly on their idea that there is an “unwillingness of mainstream media to appreciate and fairly report the role of women” (3). In many pieces of literature, women are unfairly portrayed or belittled into beautiful bodies with little else to offer. In reality, these same women have actually influenced many of their male counterpart’s decisions and actions. In Hoffmann’s “The Sandman,” Clara is seen as a woman incapable of making meaningful interpretations, but a beautiful woman nonetheless. Nathaniel says of Clara, “One would not have believed that the mind which so often shines out through such bright smiling eyes like a dear sweet dream could have been capable of so judicious and schoolmasterly an analysis (Hoffman 98). I do feel the “unwillingness” to “appreciate and fairly report the role of women” from this exert. With these aspects in mind, I want to use these women’s book as a base for uncovering the women’s roles in “The Sandman.”

    Tesch-Römer, Clemens, et al. “Gender Differences in Subjective Well-Being: Comparing
    Societies with Respect to Gender Equality.” Social Indicators Research, vol. 85, no. 2, 2008, pp. 329–349. JSTOR, JSTOR, http://www.jstor.org/stable/27734585.
    Tesch-Römer’s “Gender Differences in Subjective Well-Being: Comparing Societies with Respect to Gender Equality” dives into the relationship between gender inequality and well-being. One claim that is made, in relation to our class, is that “gender differences have also been reported consistently in literature” (330). This claim pertains to my research because I am arguing that he depiction of women through surveillance and the difference in surveillance towards men and women is more than evident in our class literary works. For instance, our views of women are through the point of view of a man in “The Sandman.”

    Smith, Harold L. “Journal of Contemporary History.” Journal of Contemporary History, vol. 44,
    no. 4, 2009, pp. 773–775. JSTOR, JSTOR, http://www.jstor.org/stable/40542990.
    Harold Smith reviews a book titled “Women Police: Gender, Welfare and Surveillance in the Twentieth Century,” written by Louise A. Jackson. In his review, Smith mentions the “contradiction women police faced between feminine loyalties and the masculine culture of law enforcement, and concluded that they were forced to adopt ‘existing practice’ in order to survive” (774). This is interesting because I think that women often have to make themselves more “acceptable” to the norms surrounding them in order to survive. Women are constantly having to be more beautiful, less original, more conforming, less outgoing in order to be accepted in society. I would like to investigate this more to see how it stands true in the works we have studied in class.

  5. Annotated Bibliography

    Lichter, Andreas, et al. “The Long-Term Costs of Government Surveillance: Insights from Stasi Spying in East Germany.” SOEPpapers on Multidisciplinary Panel Data Research, no. 865, 2016, papers.ssrn.com/sol3/papers.cfm?abstract_id=2839761##.

    This study explores the effects of intensive government surveillance activities on the general population in post reunification Germany. It was concluded that areas where surveillance was greater, there was less trust, lower self-employment, and higher unemployment among other things.

    Neuendorf, Ulrike. “Surveillance and Control: An Ethnographic Study of the Legacy of the Stasi and Its Impact on Wellbeing.” University College London, 2017.

    The focus of this thesis was to examine the perceptions people living in the former GDR have on state surveillance. It was found that state surveillance has an overall negative effect on those being surveilled.

    Staples, William G. Encyclopedia of Privacy. Vol. 1-2, Greenwood Press, 2007.

    This book contains a lot of privacy related terms, page long descriptions of them.

    Trojanow, Ilija, et al. “Attack on Freedom: The Surveillance State, Security Obsession, and the Dismantling of Civil Rights.” German Studies Review, vol. 38, no. 2, May 2015, pp. 271–284., doi:10.1353/gsr.2015.0065.

    This article is about recent (within 25 years) changes in surveillance and their effects.

    Winger, Anna. Deutschland 83, Season 1, episodes 1-8, RTL Television.

    This TV show follows a spy in the Stasi, East Germany’s state surveillance agency, operating in West Germany in 1983. It covers many aspects of surveillance such as: technology, subterfuge, methods, and politics.

  6. “The Panopticon’s Changing Geography” Jerome E. Dobson, Peter F. Fisher
    This article covers the evolving Panopticon through the centuries. It explores how it evolved from the panopticon to something Big Brother like, and now a human-tracking service. This article also explains how each vary in costs, how effective each one is, and how many people it can cover. Also, points are brought up like how the surveillance technology now is more beneficial than any other, so the opposition of the people is low. This leads to many different relationships to power and many different ways to investigate.

    “The Myopic Panopticon: The Social Consequences of Policing Through the Lens” Stephane Leman-Langlois
    This article talks about surveillance technology “from a symbolic perspective.” It also talks about how today the surveillance’s effectiveness has almost no influence on the development because of the way society is changing. It talks about how the crimes seen by surveillance technology are “myopic” because policing is being turned into a reactive activity instead of a proactive one.

    “Panopticon.com: Online Surveillance and the Commodification of Privacy” John Edward Campbell and Matt Carlson
    This article researches internet ads and marketing models to try to understand how the public reacts to online surveillance. This work uses the panopticon as a metaphor for online surveillance the power relationships the internet possesses. Overall, the willingness of the people on the internet to give their date to companies comes from the “commodification of privacy.”

    Privacy Issues in Public Discourse: the Case of ‘Smart’ CCTV in Germany” Norma Moellers
    The largest debate in surveillance technology is privacy. This article writes about Germany’s discourse about smart TV’s (CCTV) and analyzes privacy to understand why there is such a discourse. This article reviewed many documents available and found privacy to be the only form of criticism in the fight to define smart CCTV. This article concludes that this relationship between privacy and surveillance technology might be “paradoxical, yet constitutive.”

    “Nano-technology and Privacy: On Continuous Surveillance Outside the Panopticon” Jeroen Van den Hoven and Pieter E. Vermaas
    This article argues that new nano-technology such as RFID’s and invisible tags might give way to privacy issues that are much different than those of these last decades. They argue that unlike the panopticon, this surveillance is constant and not one centralized power exists. Also, privacy may not just be a concern of information but also that of the way materials are designed such as tags and chips.

    “Panopticon Revisited” Jan Kietzmann and Ian Angell
    This article discusses the usefulness of the panopticon in the 21st century in surveillance technology. This article also analyzes CCTV and the collection of personal data by businesses. Also, they explore how surveillance is used to catch criminal acts and the outsourcing of the police functions to people.

    “Who’s Watching Whom? A study of interactive Technology and Surveillance” Lee Humphreys
    This article talks about how new media allows for the collection of mass personal data and the issues it has with privacy. They take on what the public thinks about how what their privacy is like on social media. They talk about one study that found that the public was not too concerned about surveillance on social media because they controlled what they shared. Also, the articles presents three kinds of surveillance: voluntary panopticon, lateral surveillance, and self-surveillance.

  7. Bibliography
    Couch, Danielle, et al. “Online Daters and the Use of Technology for Surveillance and Risk Management.” International Journal of Emerging Technologies & Society, vol. 9, no. 2, Dec. 2011, pp. 116-134. Academic Search Complete, nuncio.cofc.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=a9h&AN=78325266&site=eds-live&scope=site.

    In this scholarly piece, the author, Danielle Couch, jumps straight into the risks and problems of online dating. Within the past few years, online dating has become more and more popular from ages ranging in the mid-teens to late 60s early 70s. There are many risks when it comes to online dating because there are potentials of hook-ups, which could lead to STIs or STDs. Sexual harassment could happen when finally meeting up with the person or there could potentially be abductions that happen to these people. These online daters can archive into in your past and present through many different social media platforms or through different search engines. There is also the privacy invasion of hackers being able to get into your phones or computers and are able to watch you through the cameras. Overall, there are many risks of online dating and many different forms of invasion of your privacy.

    Darling, Mike, and Eric Spitznagel. “Sex Love & Data.” Men’s Health, no. 7, 2016. Academic OneFile, nuncio.cofc.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=edsgao&AN=adsgcl.468525035&site=eds-live&scope=site.

    This scholarly article found explains the effects of being a part of online dating. Aaron Csepregi, a man that is from Chicago and has an account on match.com, explains that there is nothing special about himself and that he is an average man with the except that he goes on tons of dates with females and he gets stopped on the sidewalks of Chicago because people know him from Match.com. “’Our culture has tended to think of dating as more like work for women and more like recreation for men,’ says Moira Weigel, a Ph.D. candidate at Yale and the author of Labor of Love, which explores the history of dating in America. But online dating, she says, may have leveled the playing field. Men are required to participate in ‘the same sort of self-presentation,’ she says.” Researchers have discovered that online dating has become more of a competition of who is the best looking and how people portray themselves on their profiles. The article also explains the meet up that could potentially threaten if the two did not chat or did their research about the other person.

    KOELLNER, SARAH. “Data, Love, and Bodies: The Value of Privacy in Juli Zeh’s Corpus Delict.” Seminar – A Journal of Germanic Studies, vol. 52 no. 4, Nov. 2016, pp.407-425. MLA International Bibliography, nuncio.cofc.edu/login?url=http://search.edscohost.com/login.aspx?direct=true&db=a9h&AN=125035174&site=eds-live&scope=site.

    This piece highlights the factors od surveillance and love together and the way apps are now being used for love. Privacy is not protected through anything. People can find out information through information and private agencies, which completely destroys the idea of privacy. The government is one of the biggest invaders because they have the tools and are capable of looking at anything they need. Everything that is happening leads to the form of self-surveillance. Mia Holl’s ideas of love come from the messages and texts from the other party, while Methode’s is the idea of what love is and it’s existence. Beate Rössler’s idea of privacy is portrayed through the other people’s ideas within this article.

  8. Ma, Alexandra. “China Is Building a Vast Civilian Surveillance Network – Here Are 10 Ways It Could Be Feeding Its Creepy ‘Social Credit System’.” Business Insider, Business Insider, 29 Apr. 2018, http://www.businessinsider.com/how-china-is-watching-its-citizens-in-a-modern-surveillance-state-2018-4.
    Summary: China is now setting up a monitoring system to monitor every single of its 1.4 billion citizens. This is going to pose a huge threat to privacy, especially because many countries, including the USA have increased digital surveillance.
    Mineo, Liz. “When It Comes to Internet Privacy, Be Very Afraid, Analyst Suggests.” Harvard Gazette, Harvard Gazette, 30 Aug. 2018, news.harvard.edu/gazette/story/2017/08/when-it-comes-to-internet-privacy-be-very-afraid-analyst-suggests/.
    Summary: Today, surveillance is the business model of the internet. Everyone is under constant surveillance by many companies, ranging from social networks like Facebook to cellphone providers. This data is collected, compiled, analyzed, and used to try to sell us stuff. Personalized advertising is how these companies make money, and is why so much of the internet is free to users. We’re the product, not the customer. This relates exceptionally well to my topic because my research paper is “How is the access and upgrades to technology increasing civilian surveillance negatively?” and this is all about how the government regularly regulates and accesses civilian data to look for different things.
    Ferguson, Andrew Guthrie. “The Threat of Big Data Surveillance.” The Harvard Law Record, 11 Oct. 2017, hlrecord.org/2017/10/the-threat-of-big-data-surveillance/.
    Summary: Every citizen is now being tracked by the digital clues you leave behind. On campus, every computer-log in, tweet, or electronic ID card potentially identifies your location. Outside school, depending on where you live, your car is tagged by automatic license plate readers, your face by surveillance cameras, and your social media posts captured by those wishing to monitor your activities. If you carry a smartphone, computer, or tablet, your digital life is being revealed to third party companies and the government entities that lawfully request that private information. These digital trails will only increase as the Internet of Things begins turning ordinary objects into data-rich sources of surveillance. In short, citizens (especially young, digitally savvy citizens) are creating a web of self-surveillance that offers convenience and social control in equal measure. This relates exceptionally well to my topic because my research paper is “How is the access and upgrades to technology increasing civilian surveillance negatively?” and this is all about how much of a threat the increasing technology has posed a threat to regular citizens in all aspects of life.

    “CIA-Backed Firm Touted Social Media Surveillance of Students to Sell Services to Police.” MintPress News, 11 Sept. 2018, http://www.mintpressnews.com/geofeedia-student-surveillance/249107/.
    Summary: Emails reveal that Geofeedia, an online surveillance company, touted social media surveillance of middle and high school students by its suburban Chicago police customers in an effort to sell their services to Evanston police. In April 2018, a Freedom of Information Act (FOIA) request by Lucy Parsons Labs led to the release of a January 2014 contract between Evanston and Geofeedia. At a town hall meeting later that month, Evanston police representatives were asked about their use of social media surveillance. They claimed Evanston no longer used the technology, which allows police to monitor social media activity by geographical location. This is a clear instance, where technology has allowed society to be easily surveilled. This relates exceptionally well to my topic because my research paper is “How is the access and upgrades to technology increasing civilian surveillance negatively?” and this is all about how government bodies pay other companies to spy on citizens in their community to find out more about them.

    “40 Government Departments Are Using a Social Media Surveillance Tool – Scroll.in.” MediaNama, 5 Sept. 2018, http://www.medianama.com/2018/09/223-40-government-departments-are-using-a-social-media-surveillance-tool-scroll-in/.

    Summary: In more than 40 countries, the idea of creating a Social Media Communication Hub, through which it wanted to monitor the social media accounts of citizens, after the Supreme Court called the plan an attempt at creating a surveillance state. But even before this plan of the government could come under public scrutiny, several of its agencies had been using a “strategic” tool that conducts mass surveillance of citizens’ social media activities, another way that technology is making it easier to watch over the public.

  9. The Nature of Surveillance in the DDR and the BRD

    Byford, Jeffrey M. “The Spies Dilemma: A Cold War Case Study on East German Espionage.” Social Studies, vol. 104, no. 4, July 2013, p. 139.

    Summary: This text is about a case study of the East German Ministry for State Security (MfS) and the Stasi. Students gained access to secret documents used by the East German government during the Cold War for surveillance purposes. These documents give students an understanding of how domestic and foreign espionage played an important role in the conflict between communism and democracy. I will use this source to better understand how East German intelligence functioned and who it collected information on.

    Conway, John S. “The `Stasi’ and the Churches: Between Coercion and Compromise in East German Protestantism, 1949..” Journal of Church & State, vol. 36, no. 4, Sept. 1994, p. 725.

    Summary: This text examines the relationships that formed between East German intelligence services and churches in East Germany. Despite the Protestant churches’ official opposition to communism, many church officials were recruited by the Stasi. I will use this source to support my claim that the East German government sought to influence society and monitor its critics by gaining control of all aspects of life including religion.

    Flaherty, David H. “Governmental Surveillance and Bureaucratic Accountability: Data Protection Agencies in Western Societies.” Science, Technology & Human Values, vol. 11, no. 1, Jan. 1986, p. 7.

    Summary: This text is about how governments in the West (America, Sweden, West Germany, etc.) have implemented various laws to protect data. Some of these governments formed data protection agencies. The goals of these measures are to promote bureaucratic accountability and limit surveillance. I will use this source to gain a better understanding of how the more democratic governments in Western countries (especially West Germany) treated surveillance compared to those of dictatorial nations such as East Germany or the Soviet Union.

    Schmidt-Eenboom’, Erich. “The Bundesnachrichtendienst, the Bundeswehr and Sigint in the Cold War and After.” Intelligence & National Security, vol. 16, no. 1, Spring 2001, p. 129.

    Summary: This text is about the history of the Bundesnachrichtendienst (West German intelligence agency), the Bundeswehr (military), and signals intelligence and the role that they played in the Cold War. I will use this source to gain an understanding of the activities of West German intelligence agencies during the Cold War so that I may use it as a comparison with the activities of East German intelligence agencies.

    Koehler, John O. “East Germany: The Stasi and De-Stasification.” Demokratizatsiya, vol. 12, no. 3, Summer 2004, pp. 369–395.

    Summary: This text is about the Stasi, its history and the various roles that is assumed during the Cold War. The text also talks about the history of DDR and the crucial role that surveillance played in its history. I plan to use this source extensively because it has a great deal of knowledge about the DDR and the surveillance state that formed as a result of its political system.

    Sperling, Stefan. “The Politics of Transparency and Surveillance in Post-Reunification Germany.” Surveillance & Society, vol. 8, no. 4, July 2011, pp. 396–412.

    Summary: This text is about the importance of transparency in German politics after re-unification. It also focuses on the lessons that Germany learned from the years of mass surveillance and a lack of transparency in government during the existence Nazi Germany, and later the DDR. I plan to use this source to talk about how the history of authoritarian governments has shaped the German political landscape to be more transparent and democratic. This provides me with a further understanding of how Germans have come to view surveillance over the years.

    Trojanow, Ilija & Zeh, Juli & Alvizu, Josh & Petersdorff, Marc. “Attack on Freedom: The Surveillance State, Security Obsession, and the Dismantling of Civil Rights.” German Studies Review, vol. 38 no. 2, 2015, pp. 271-284.

    Summary: This text is about how terrorism and all perceived threats to national security have been used to implement authoritarian measures and increased surveillance in Germany. It briefs mentions the Cold War era in Germany, but mainly focuses the effects of increased surveillance in Germany today. I plan to use this to discuss how the legacy of heightened surveillance during the Cold War has continued to affect Germany even today.

  10. Annotated Bibliography

    The Surveillance Studies Reader
    Data mining is used in order to gather useful information from patterns that are found on a database. Through this data, researchers can find groups of people and predict their behaviors. The Surveillance Studies Reader describes the process of  data mining as “strategic intelligence”. Customer Relationship Management, also known as CRM, is used to market to the most reliable customers, rather than the most amount of people. After 9/11, there were thoughts to possibly use this type of data mining to also catch criminal behavior in order to prevent terrorist activity. Online Preference marketing can use a persons browsing activity in order to identify behaviors and interests. The Pentagon set a plan to speed up the creation of technology that could be used in “the war against terrorism”(152).  

    Hier, Sean Patrick. The Surveillance Studies Reader. Open Univ. Press, 2007.

    Did the Patriot Act Change U.S. Attitudes on Surveillance?
    After September 11, 2001, there was need for a new law, which is why the Patriot Act was created. This law described by NBC “ expanded the government’s ability to gather surveillance, broadened the definition of terrorism, and sought to strengthen border security”(NBC). Some people believe this act has caused more problems than solved issues. There is a debate about whether the law protects the privacy of innocent citizens. The Act gives the government access to telephone records and searches made on the internet. Others say that although the government has access to theses records, it does not mean they are going to use them. The law was created in order to facilitate in the search of finding terrorists and criminals, not to spy on any average citizen. In 2015, the USA Freedom Act was created in order to ease the debate by eliminating a controversial section of the Patriot Act.

    Samee Ali , Safia, and Halimah Abdullah . “Did the Patriot Act Change U.S. Attitudes on Surveillance?” NBCNews.com, NBCUniversal News Group, http://www.nbcnews.com/storyline/9-11-anniversary/did-patriot-act-change-us-attitudes-surveillance-n641586.

    Through Thick and Thin: Surveillance after 9/11
    The author describes surveillance as being either thick or thin. Thick surveillance is described as being physically preventative, such as jail and military camps. Examples of thin surveillance include access to business transactions and  telephone records. Torpey believes that the increase in surveillance after 9/11 has been mostly categorized as thin. He states that the issue is not increasing surveillance, but finding a better way to identify and prevent terrorists through the technology we  currently have. David Lyon, author of Surveillance after September 11, believes that the changes in surveillance are not new, but have always existed.
    Torpey , John. “Through Thick and Thin:Surveillance After 9/11 .” CUNY Graduate Center .

    I will use this source to define terrorism and to talk about how terrorists use the power of fear to harm others. Schmid defines terror as “a state of intense fear induced by the systematic threat of imprisonment, mutilation, or death.(pg. 3)” He believes that because terrorist attacks are so random, people will always feel threatened and vulnerable, making them even worse than other horrible occurrences.

    Schmid , Alex. “The Routledge Handbook of Terrorism Research .”Routledge.com, Routledge, Feb. 2011, http://www.routledge.com/The-Routledge-Handbook-of-Terrorism-Research/Schmid/p/book/9780415411578.

    This journal references one of the first German books to  mention the reaction to 9/11. Bryant park by Ulrich Peltzer is a fictional story that is interrupted by the real events of September 11. When 9/11 is brought into this story, Ulrich becomes a narrator, but is portrayed as a fictional character although somewhat relating to the authors actual life. The weakness of this source is that it does not completely relate to my topic and I will have to view the full text of Bryant Park by Ulrich Peltzer in order to get a better understanding of what it is about and how I can relate it to my research paper.

    Wasihun, Betiel. “Surveillance Narratives: Kafka, Orwell, and Ulrich Peltzer’s Post-9/11 Novel Teil Der Lösung.” Seminar — A Journal of Germanic Studies, vol. 52, no. 4, Nov. 2016, pp. 382–406.EBSCOhost, nuncio.cofc.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=a9h&AN=125035173&site=eds-live&scope=site.

    Attack on Freedom

    One of the many things this article focuses on is the effect of terrorism. It states that it is not only the act itself, but what happens after the attack that worries people. The article states that “The attack on the World Trade Center was not only the mass murder of nearly 3,000 people, but also a metaphor meant to stand for the destruction of the United States or even of the entire “Western World”.” This article points out even more threats that terrorism poses to a country. The authors believe that the threat terrorist attacks create are physical and mental compared to other catastrophic events like a plane crash or deadly flu epidemics.  

    Trojanow, Ilija, et al. “Attack on Freedom: The Surveillance State, Security Obsession, and the Dismantling of Civil Rights.” Oxford University Press, 18 May 2015, muse.jhu.edu/article/582107.

    The Encyclopedia of Privacy

    This encyclopedia includes many terms that will be important parts of my research paper. Some of the important ones I saw already include Data Mining and the Computer Fraud and Abuse Act of 1996. Under the data mining section it lists objectives that include security and customer relations management. Through data mining, data is able to be collected in order to identify whether a person will pose a threat to the safety of others around them. This definition is similar to what was talked about in the Surveillance Studies Reader.

    Staples, WIlliam G. Encyclopedia of Privacy [2 Volumes] . Greenwood Press, 30 Nov. 2006.

  11. These are my last two:

    Mailonline, Phoebe Weston For. “Massive Facebook Hack ALSO Left People’s Tinder, Spotify and Instagram Accounts Exposed.” Daily Mail Online, Associated Newspapers, 2 Oct. 2018, http://www.dailymail.co.uk/sciencetech/article-6230327/Massive-Facebook-hack-left-peoples-Tinder-Spotify-Instagram-accounts-exposed.html.

    Summary: Another big concern with upgraded use and accessibility to technology is hackers. The social media giant Facebook got hacked and 50 million users are at risk, along with their private information and messages, while also having those same users other social media platforms hacked as well.

    Dettmer, Jamie. “Social Media Skills a Gift and Curse for Spying.” VOA, VOA, 28 July 2018, http://www.voanews.com/a/russian-spy-social-media-butina/4498176.html.

    Summary: This is one of the areas surveillance helps in catching thief or spies. The USA alleges this 29 year-old Russian student is a spy for the Kremlin and they have technology advances that allow the government to look into her private life and private messages/calls, which lead them to find this alleged spy.

  12. Surveillance 1925
    Zweig, Stefan, and Anthea Bell. Fear. Pushkin Press, 2010.
    The written work, Fear, by Zweig is about a woman who has an affair and all the whilst she is being watched by her lover’s woman. The main character is being watched with her every move and can’t escape the surveillance over her. This reading will help me because it shows how during this time period the surveillance was carried out, with letters, stalking, etc.
    Surveillance 1950
    White, April. “A Brief History of Surveillance in America.” Smithsonian.com, Smithsonian Institution, 1 Apr. 2018, http://www.smithsonianmag.com/history/brief-history-surveillance-america-180968399/.
    This article discusses the technological changes over time periods. It gives an insight on the different techniques and methods of surveillance. This will help my research paper because it will show the changes in surveillance.
    Surveillance 1970
    Bodbyl, Colin. “History of Surveillance: The 1970s.” IFSEC Global | Security and Fire News and Resources, IFSEC Global | Security and Fire News and Resources, 15 Feb. 2016, http://www.ifsecglobal.com/the-history-of-surveillance-in-pictures/.
    This article shows differences in technology of surveillance. You are even shown pictures of the different machines and gadgets that were used. This has a focus on surveillance in the 1970s which will help to show how they have changed over the years.
    Surveillance 1980
    Bodbyl, Colin. “The History of Surveillance: The 1980s.” IFSEC Global | Security and Fire News and Resources, IFSEC Global | Security and Fire News and Resources, 15 Feb. 2016, http://www.ifsecglobal.com/history-surveillance-1980s/.
    This article focuses on the time period of the 1980s, showing different pictures of machines and tools used for the purpose of surveillance. There are descriptions and information showing the purpose and how they have changed over time and how it has shown an improvement to surveillance. Surveillance 1990
    Bodbyl, Colin. “History of Surveillance: 1990-2000s.” IFSEC Global | Security and Fire News and Resources, IFSEC Global | Security and Fire News and Resources, 15 Feb. 2016, http://www.ifsecglobal.com/history-surveillance-1990-2000s/.
    There have been many changes since the earlier years with the abundance of technological changes and techniques for surveillance. This article focuses on all of the technology during the time period of the 1990s.
    Surveillance post 9/11
    “Privacy and Surveillance Post 9/11.” Sex Trafficking and HIV/AIDS: A Deadly Junction for Women and Girls | Section of Civil Rights and Social Justice, http://www.americanbar.org/publications/human_rights_magazine_home/human_rights_vol38_2011/human_rights_winter2011/privacy_and_surveillance_post_9-11.html.
    This article focuses on the time period after 9/11 which was a very life changing moment in which new methods for privacy and surveillance were sought after for protection. This article shows the different codes and technology implemented in the new era of surveillance. This will give a lot of information to how everything has changed in society with relation to surveillance.
    Surveillance Post 9/11
    Kelley, Michael B. “How Post-9/11 Surveillance Has Drastically Changed America [INFOGRAPHIC].” Business Insider, Business Insider, 21 Aug. 2012, http://www.businessinsider.com/heres-how-surveillance-in-america-drastically-changed-after-911-2012-8.
    This is another article that gives more information than the last on the technology introduced to society to improve safety and privacy through surveillance. This also still gives the inside information on how this completely changed the atmosphere and concept of surveillance.

  13. Classen, Christoph. “The Celluloid Curtain.” Medien Und Stereotype | Bpb, 9 Sept. 2011, http://www.bpb.de/gesellschaft/bildung/filmbildung/63199/the-cold-war-in-the-cinema.
    My rough thesis involves cinematography to explain the struggles of individuals in the GDR during the Cold War. The article focuses on the ideas of Cold War in the cinema, it’s helpful because it’s along the same general lines.
    Colborne, Femke. “From God to the Stasi, How We Respond to Being Watched | DW | 16.02.2017.” DW.COM, 16 Feb. 2017, http://www.dw.com/en/from-god-to-the-stasi-how-we-respond-to-being-watched/a-37544460.
    Likewise, with a focus on individuals who were under surveillance and the effect it had on them, the article takes it and analyzes how individuals respond to surveillance in general. With that it’s incredibly helpful for an overall view of how individuals handle the bigger picture of it.
    Coombes, Thomas. “Lessons from the Stasi – A Cautionary Tale on Mass Surveillance.” Amnesty International , 31 Mar. 2015, http://www.amnesty.org/en/latest/news/2015/03/lessons-from-the-stasi/
    This articles uses a historical context from the issues with the Stasi to bring to life what people can learn from the surveillance chaos of the time. Like another article it brings in modern context to help explain and use it as a warning as our technology hits the same level.
    Everets, Sarah. “Over the Wall: Six Stories from East Germany.” Science History Institute, 26 Sept. 2018, http://www.sciencehistory.org/distillations/magazine/over-the-wall-six-stories-from-east-germany.
    This one’s specifically what my thesis focuses on. It’s a very individualistic and focusing on the stories of these people. It’s a insight of what these individuals experienced.
    SPIEGEL ONLINE. “Cinematic Confrontation with East Germany’s Stasi: ‘I Remember an Atmosphere of Great Fear’ – SPIEGEL ONLINE – International.” SPIEGEL ONLINE, SPIEGEL ONLINE, 12 May 2006, http://www.spiegel.de/international/cinematic-confrontation-with-east-germany-s-stasi-i-remember-an-atmosphere-of-great-fear-a-415625.html.
    An interview involving German surveillance film, The Lives of Others, the article is a discussion on Stasi surveillance in the GDR. As this is one of the films I’m focusing on, and I know others have mentioned, it’s a helpful piece.
    Wensierski, Peter. “Web of Surveillance: East German Snitching Went Far Beyond the Stasi – SPIEGEL ONLINE – International.” SPIEGEL ONLINE, SPIEGEL ONLINE, 10 July 2015, http://www.spiegel.de/international/germany/east-german-domestic-surveillance-went-far-beyond-the-stasi-a-1042883.html.
    A piece that focuses on the matters of how other individuals would read into and focus on the concept of who is spying on who. It’s an important question for the era and helpful in figuring out if the Stasi were the main thing to be worried about with spying.

  14. Feminist Surveillance Studies by Caron E. Gentry

    Gentry, Caron E. “Feminist Surveillance Studies.” Signs: Journal of Women in Culture & Society, vol. 43, no. 1, Sept. 2017, pp. 223–225.

    Feminist Surveillance Studies, published in June 2015 provides the reader with a modern outlook on surveillance practices in the North American region of the world. It grapples with the idea that the level of surveillance that one is subjected to can be directly related to the class, race, sexuality, and gender that they identify with. This work answers a number of questions regarding surveillance and discrimination, including why certain subgroups experience heightened surveillance and at what cost. This is achieved through the comparison of men versus women, the rich versus the poor, and the white population versus the non-white population.
    This peer-reviewed text has been very positively received by scholars for its unique understanding on how surveillance is unfairly conducted in order to give only specific individuals dominating power over others. Although there are discussions on the impact of class, race, and sexuality on surveillance, I will be focusing only on the content which relates to gender.

    2. Expanding the Gaze: Gender and the Politics of Surveillance by Ciara Bracken-Roche

    Bracken-Roche, Ciara. “Expanding the Gaze: Gender and the Politics of Surveillance.” Surveillance & Society, vol. 15, no. 1, Jan. 2017, pp. 179–180.

    Expanding the Gaze: Gender and the Politics of Surveillance is a collection of recently published essays which offer an analysis into how society has focused its gaze on the female subject and the impact this has on daily life. This analysis is provided through the examination the various means which are used in the inspection of women, including cell-phone cameras and social media accounts. Throughout the text, the reader develops a greater understanding of the oppressive nature of surveillance in today’s society.
    This peer-reviewed work provides an updated outlook on both how the world sees women and how women see the world. The theories which are discussed originate from the works of numerous notable scholars, including Foucault, Haggerty, and Ericson. The combined insight of these theorists creates a diverse range of perspectives. Each topic that these essays focus on will be useful in providing my own essay an all-encompassing outlook on gendered surveillance. As a result, Expanding the Gaze: Gender and the Politics of Surveillance will serve as a useful tool for my research on women’s daily struggles with surveillance. There are claims that it includes controversial topics, but I believe that these ideas will be beneficial for my overall understanding of the role that surveillance plays on society.

    3. Criticising Surveillance and Surveillance Critique: Why Privacy and Humanism are Necessary but Insufficient by Sun-Ha Hong
    Sun-ha Hong. “Criticising Surveillance and Surveillance Critique: Why Privacy and Humanism Are Necessary but Insufficient.” Surveillance & Society, vol. 15, no. 2, Apr. 2017, pp. 187–202.
    Criticising Surveillance and Surveillance Critique: Why Privacy and Humanism are Necessary but Insufficient is an article which discusses the current debates on the use of surveillance in today’s society. It examines surveillance through both positive and negative critiques. It explores common issues such as privacy, safety, and human rights and the roles that these issues play on the surveilling of the population. This article not only provides a historical analysis of surveillance, but also ways in which it can be reformed to better suit today’s world.
    This peer-reviewed article will be useful in the construction of my essay because it provides a baseline understanding of the use of surveillance. I will use this understanding to create a strong argument as to how and why women are watched. The inclusion of two opposing perspectives will further enhance my essay because of the unbiased report of the subject matter that they have formed. n the surveillance of women, it is necessary to fully understand how it impacts all people.
    4. Surveillance and control: an ethnographic study of the legacy of the Stasi and its impact on wellbeing by Ulrike L. Neuendorf
    Neuendorf, Ulrike L. “Surveillance and Control: an Ethnographic Study of the Legacy of the Stasi and Its Impact on Wellbeing.” The Impact of Writing: Ancient and Modern Views on the Role of Early Writing Systems within Society and as a Part of ‘Civilisation’, UCL (University College London), 28 Dec. 2017, discovery.ucl.ac.uk/10040339/.
    This Ethnographic study was conducted on East Germans living under the German Democratic Republic. The goal of this study was to determine what the long-term effects that dictatorial power has on the individual and society are. It focuses on betrayal, distrust, trauma, resilience, and ideology. It uses the accounts of numerous individuals who experienced the GDR’s obsessive surveillance firsthand to conclude that these techniques still have negative impacts today. This study, with its accounts from real people living in East Germany during such an oppressive time, will provide my essay with a unique insight. The GDR had one of the worst cases of secret policing and surveillance. For this reason, it is often used as an example of how surveillance can be misused and abused.
    5. Picture this: Women’s self-sexualization in photos on social media by Laura R. Ramsey
    Ramsey, Laura R., and Amber L. Horan. “Picture This: Women’s Self-Sexualization in Photos on Social Media.” Personality and Individual Differences, vol. 133, Oct. 2018, pp. 85–90.
    Picture this: Women’s Self-Sexualization in Photos on Social Media reports on a study that was conducted October 2016 involving 61 undergraduate women. The purpose of this study was to determine whether or not posting sexually suggestive photos on social media sites garnered more likes and followers. Ten of the women’s most recently posted photographs were reviewed for sexual content. They found that women put more revealing photos on Instagram for the purpose of receiving attention. In my essay, I explore a number of means of surveillance. One modern way that women are surveilled is through social media. This peer-reviewed study provides greater insight into ways in which women use social media and how they are seen by other users.
    6. Video Surveillance : Power and Privacy in Everyday Life by Bilge Yesil
    Yesil, Bilge. Video Surveillance : Power and Privacy in Everyday Life. LFB Scholarly Publishing LLC, 2010.
    Published by LFB Scholarly Publishing, Video Surveillance : Power and Privacy in Everyday Life by Bilge Yesil discusses decades of video surveillance use within the United States. The author uses law enforcement reports and security industry statements to establish the relationship between surveillance and power. Yesil also draws on interviews with police officers, school administrators, students and private citizens to gain insight into the daily experiences with surveillance, privacy, and autonomous control. This work is necessary in my research because it expands upon what I already know about video camera surveillance in America. It also presents the topic of surveillance from a number of different viewpoints, including people with little power to people with extraordinary levels of power. The author’s M.A. in Media and Cultural studies adds legitimacy to her work. I am also interested by her work being written from the female perspective because my essay focuses on women’s experiences.

    7. The Trials of Nina McCall: Sex, Surveillance, and the Decades-Long Government Plan to Imprison “Promiscuous” Women by Scott W. Stern
    “THE TRIALS OF NINA MCCALL Sex, Surveillance, and the Decades-Long Government Plan to Imprison ‘Promiscuous’ Women.” Kirkus Reviews, vol. 86, no. 7, Apr. 2018, p. 23.
    This book explains the injustices of a not well known government program titled the “American Plan.” Enacted from 1910-1950, this program incarcerated thousands of girls and women for claims of promiscuity or prostitution. This program targeted women from specific backgrounds and used their illegally obtained medical records to charge them simply for the fact that they tested positive for one or multiple STIs. This is a vital text because of its connection to women’s rights and the power of the state. It also provides proof of surveillance being harmfully against women in particular.

  15. Annotated Bibliography

    “Berlin Television Tower.” VisitBerlin.de, http://www.visitberlin.de/en/berlin-television-tower.

    Summary: This article, though primarily a travel guide to the Fernsehturm Berlin, offers historical information and details about one of the DDR’s most famous, and infamous, landmarks.

    “Discipline & Punish – Panopticism.” Michel Foucault, Info., Michel Foucault, Info., foucault.info/documents/foucault.disciplineAndPunish.panOpticism/.

    Summary: This article is written by renowned French philosopher Michel Foucault, and deals exclusively with themes of punishment, discipline, and panopticism.

    Hertzberg, Max. “Stasi Tactics – Zersetzung | Max Hertzberg.” Stealing the Future, 16 July 2018, http://www.maxhertzberg.co.uk/background/politics/stasi-tactics/.

    Summary: This piece details tactics utilized by the Stasi in their ceaseless observation and intimidation of the citizens of East Germany.

    Hignett, Kelly. “’Everything about Everyone’: the Depth of Stasi Surveillance in the GDR.” The View East, 11 July 2013, thevieweast.wordpress.com/2013/07/11/everything-about-everyone-the-depth-of-stasi-surveillance-in-the-gdr/.

    Summary: This article explores the depth of surveillance used by the Stasi as well as common tactics, and described the range of the Stasi’s ability to observe people.

    “Home.” Circa Design, http://www.circadesign.net/architects/brutalism/.

    Summary: This article describes Brutalist architecture and its main themes, influences, and those that promoted it, such as French architect Le Corbusier

    Mason, Moya K. “Foucault and His Panopticon.” Manganese – Metabolism, Mineral, Bones, Osteoporosis, Diabetes, Cellular Energy, http://www.moyak.com/papers/michel-foucault-power.html.

    Summary: This article further expands on Foucault’s arguments about panopticism and discipline, although this time from a third party interpreting Foucault’s work.

    “Stasi Prison.” Stiftung HSH, http://www.stiftung-hsh.de/history/stasi-prison/.

    Summary: This article serves as a historical focal point describing the conditions of life in the Stasi prison at Berlin-Hohenschönhausen.

    Thomas, Emily. “Cold War Architecture: A Comparison between the Architectural Styles of East and West Berlin in the 1950’s, Focusing on Interbau (West) and Stalinallee (East) | UA Library.” The Undergraduate Awards Library, 2013, http://www.undergraduatelibrary.org/2013/history/cold-war-architecture-comparison-between-architectural-styles-east-and-west-berlin-1950

    Summary: This article describes differences in common architectural styles between the DDR and the BRD during the Cold War and before reunification.

  16. Annotated Bib

    1. How far are We really form AI, Matt Turuck, https://hackernoon.com/frontier-ai-how-far-are-we-from-artificial-general-intelligence-really-5b13b1ebcd4e
    a. Summary: Here we are now going to take a look at the timing of when we can start to expect an attack, and it might be sooner than you may think. It is written by someone that I had interviewed for my work in the past so I know it is credible.
    2. AI cyber attacks will almost be impossible for humans to stop, Mike Lynch, https://www.wired.co.uk/article/ai-cyberattack-mike-lynch
    a. Summary: Here were looking at just how powerful these attacks might be able to becoe. They focus on the worst case scenario and it is really frightening to take a look at.
    3. Machiene Learning, Elie Bursztein, https://elie.net/blog/ai/attacks-against-machine-learning-an-overview
    a. Summary: To get a good idea of what AI really is you also need to be introduced on what ML is as well. They have many overlapping parts and trust me it is better to know it than to not know it.
    4. Can AI Stop future attacks, Gabriel Duarte, https://medium.com/secjuice/how-can-artificial-intelligence-be-used-for-attacks-570a2237546
    a. Summary: Can AI block AI is another fascinating topic that the author does a good job at describing. It shows how computers will use other computers to make themselves smarter, the need for human interacting to diminish. This was an article that my boss had sent to me a long time ago so I know that I really can trust where this came from
    5. Why is the US backing Killer Robots, David Hambling, https://www.popularmechanics.com/military/research/a23133118/us-ai-robots-warfare/
    a. Summary: It is hard to see where the future of robots are if you don’t first take a look at the military, they are the ones who are at the foreground with things such as spy planes and man less aircraft is good because it shows what the future of war will now look like.
    6. The difference between ML and AI, Bernard Marr, https://www.forbes.com/forbes/welcome/?toURL=https://www.forbes.com/sites/bernardmarr/2016/12/06/what-is-the-difference-between-artificial-intelligence-and-machine-learning/&refURL=https://www.google.com/&referrer=https://www.google.com/
    a. Summary: this is a highly ranked news publication and what I want to take from this article is at 2 key differences that help better understand some of the key differences that ML and AI have
    7. AI vs ML, Skymind , https://skymind.ai/wiki/ai-vs-machine-learning-vs-deep-learning
    a. Summary: Good like number six but also it goes a little deeper than the previous one and is meant for people of a better knowledge of the of the subject.

  17. 1. Anxiety and physical illness. (2012, July). Harvard Health Publications. Retrieved from http://www.health.harvard.edu/newsletters/Harvard_Womens_Health_Watch/2008/July/Anxiety_and_physical_illness
    This article is relevant to my topic because it gives me background of anxiety and mental health. This is useful because I need to grasp the concept of what disease and side effects can be caused by surveillance. It goes into a well detailed description of mental illness and paranoia.
    2. Lyon, David. The Culture of Surveillance : Watching as a Way of Life. Cambridge : Polity Press, 2018., 2018. EBSCOhost, nuncio.cofc.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=cat00993a&AN=ccl.b3171778&site=eds-live&scope=site.
    This article is about the culture of surveillance. This important book explores the imaginaries and practices of everyday surveillance. Its main focus is not high-tech, organized surveillance operations but our varied, mundane experiences of surveillance that range from the casual and careless to the focused and intentional. This is a key point in my paper and is an excellent reference.
    3.Rothfeld, Becca. “Christa Wolf’s Life Under Surveillance.” The Nation, 20 Feb. 2018, http://www.thenation.com/article/christa-wolfs-life-under-surveillance/.
    This article is background on Wolf and her life under surveillance. It talks a little about her childhood and her growing up. Also talks about her writing and her political status. Key article to my paper because im using her novella “what remains” as reference and its helpful when giving information about Wolf and her lifestyle.
    4. Marsden, A.J, and william Nesbitt. “I Spy With My Little Eye.” Psychology Today, Sussex Publishers,
    http://www.psychologytoday.com/us/blog/myth-the-mind/201711/i-spy-my-little-eye.
    This article is about contemporary surveillance in today’s world, it refers to movie, shows, and music as examples of surveillance. Also gives insight on how smartphones and the internet allowed surveillance to go much deeper. This article can help me compare surveillance in the GDR and in society today.
    5. Petelin, B. V., and E. S. Dobrovolskiy. “Stasi Namely: Surveillance and Repression in the GDR.” VOPROSY ISTORII, no. 12, 2015, pp. 161–163. EBSCOhost,
    nuncio.cofc.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=edswah&AN=000367967600013&site=eds-live&scope=site.
    This article is about the GDR in regard to surveillance and how they watched people. It talks about the stasi and the politics at the time. This information is very helpful for my paper because I’m going to compare GDR and contemporary times. Also, it gives a little background on the GDR which is discussed in what remains.
    6. Hewitt, Steve. Snitch! : A History of the Modern Intelligence Informer. Continuum, 2010. EBSCOhost, nuncio.cofc.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=344195&site=eds-live&scope=site.
    This book is about authors who were informants for the stasis, and one mentioned is Wolf who is the writer of the literature in my paper. Gives important facts such as, 12 of the 19 members of the GDR’s Writers’ Association, 49 out of 123 members of the executive of the Writers’ Union, and famous authors such as Christa ‘Mararete’ Wolf (active for the Stasi between 1959 and 1961 and then the subject of surveillance by the same agency).
    7. Neuendorf, Ulrike. “Surveillance and Control:An Entographic Study of the Legacy of the Stasi and Its Impact on Wellbeing.” University college London, 2016.
    This is the thesis paper you sent me and its very helpful. This field study examines east Germans experiences and perceptions of the state surveillance in the former German Democratic republic. Through accounts and in-depth life histories, this study illustrates the long term effects of state control has had on the wellbeing individuals and society as a whole. Several key terms emerge such as, betrayal, distrust, and trauma and resilience.

  18. Annotated Bib

    1. How far are We really form AI, Matt Turuck, https://hackernoon.com/frontier-ai-how-far-are-we-from-artificial-general-intelligence-really-5b13b1ebcd4e
    a. Summary: Here we are now going to take a look at the timing of when we can start to expect an attack, and it might be sooner than you may think. It is written by someone that I had interviewed for my work in the past so I know it is credible.
    2. AI cyber attacks will almost be impossible for humans to stop, Mike Lynch, https://www.wired.co.uk/article/ai-cyberattack-mike-lynch
    a. Summary: Here were looking at just how powerful these attacks might be able to becoe. They focus on the worst case scenario and it is really frightening to take a look at.
    3. Machiene Learning, Elie Bursztein, https://elie.net/blog/ai/attacks-against-machine-learning-an-overview
    a. Summary: To get a good idea of what AI really is you also need to be introduced on what ML is as well. They have many overlapping parts and trust me it is better to know it than to not know it.
    4. Can AI Stop future attacks, Gabriel Duarte, https://medium.com/secjuice/how-can-artificial-intelligence-be-used-for-attacks-570a2237546
    a. Summary: Can AI block AI is another fascinating topic that the author does a good job at describing. It shows how computers will use other computers to make themselves smarter, the need for human interacting to diminish. This was an article that my boss had sent to me a long time ago so I know that I really can trust where this came from
    5. Why is the US backing Killer Robots, David Hambling, https://www.popularmechanics.com/military/research/a23133118/us-ai-robots-warfare/
    a. Summary: It is hard to see where the future of robots are if you don’t first take a look at the military, they are the ones who are at the foreground with things such as spy planes and man less aircraft is good because it shows what the future of war will now look like.
    6. The difference between ML and AI, Bernard Marr, https://www.forbes.com/forbes/welcome/?toURL=https://www.forbes.com/sites/bernardmarr/2016/12/06/what-is-the-difference-between-artificial-intelligence-and-machine-learning/&refURL=https://www.google.com/&referrer=https://www.google.com/
    a. Summary: this is a highly ranked news publication and what I want to take from this article is at 2 key differences that help better understand some of the key differences that ML and AI have
    7. AI vs ML, Skymind, https://skymind.ai/wiki/ai-vs-machine-learning-vs-deep-learning
    a. Summary: Good like number six but also it goes a little deeper than the previous one and is meant for people of a better knowledge of the of the subject.

  19. Teicher, Jordan G. “Gazing Back at the Surveillance Cameras That Watch Us.” The New York Times, The New York Times, 13 Aug. 2018, http://www.nytimes.com/2018/08/13/lens/surveillance-camera-photography.html?rref=collection%2Ftimestopic%2FSurveillance%2Bof%2BCitizens%2Bby%2BGovernment&action=click&contentCollection=timestopics®ion=stream&module=stream_unit&version=latest&contentPlacement=9&pgtype=collection
    In this article, the author discusses the presence of surveillance in London, the city most active in surveillance. After that, he goes into discussing how effective the surveillance is, as well as other examples of surveillance that may be too intrusive. This is helpful for my research paper because it gives real life examples of the negatives of surveillance and how far it goes.

    “What’s Wrong With Public Video Surveillance?” American Civil Liberties Union, American Civil Liberties Union, http://www.aclu.org/other/whats-wrong-public-video-surveillance.
    In this article, the author presents four reasons as to why CCTV is ineffective in its purpose, and the issues that they cause. This article is useful to my paper because he discusses that statistical side of why CCTV is ineffective.

    Smith, Toby, et al. “They Are Watching You-and Everything Else on the Planet.” A Guide to Kentucky’s Mammoth Cave National Park, 26 Jan. 2018, http://www.nationalgeographic.com/magazine/2018/02/surveillance-watching-you/.
    In this article, it talks a little about an effective use of surveillance by a man who sits outside of a nightclub looking for drug deals. This article is useful because it sheds light on the positive side of CCTV and how it can help.

    Geiger, Abigail. “How Americans Have Viewed Surveillance and Privacy since Snowden Leaks.” Pew Research Center, Pew Research Center, 4 June 2018, http://www.pewresearch.org/fact-tank/2018/06/04/how-americans-have-viewed-government-surveillance-and-privacy-since-snowden-leaks/.
    In this article, it discusses the impact that the Snowden leaks has on the US people, and the thoughts of the people through surveys. This is a useful article because it gives first hand responses to what the population believes.
    “NSA Spying.” Electronic Frontier Foundation, http://www.eff.org/nsa-spying.
    This source is from the NSA and it gives a background and history of the type of spying that goes on that can be released. This source is helpful because it gives the population facts on what type of spying goes on.

    Guariglia, Matthew. “Too Much Surveillance Makes Us Less Free. It Also Makes Us Less Safe.” The Washington Post, WP Company, 18 July 2017, http://www.washingtonpost.com/news/made-by-history/wp/2017/07/18/too-much-surveillance-makes-us-less-free-it-also-makes-us-less-safe/?noredirect=on&utm_term=.91a530a7bf5a.
    This article goes into why too much surveillance is a bad thing, and the effects it has on our society. It is useful for my paper because it discusses how the society as a whole is affected by surveillance and the aftermath of it.

    “Government Surveillance of Citizens Raises Civil Liberty Concerns.” PBS, Public Broadcasting Service, http://www.pbs.org/newshour/extra/2013/06/government-surveillance-of-citizens-raises-civil-liberty-concerns/.
    This article talks about the civil right concerns that surveillance imposes on citizens and discusses if this is a bad thing and why it is as well. This is useful for my paper because it goes into the human rights side of why surveillance is an issue for the society.

  20. Nisar, Tahir, Guru Prabhakar, and Mariateresa Torchia. “Whistleblowing: When do employees act to ‘blow the whistle’?” Organizational Dynamics, January 2018.

    This article is from a scholarly journal, Organizational Dynamics, who focuses their articles on primarily organizational behavior, development, and management. The article written by Tahir M. Nisar, Guru Prabhakar, and Mariateresa Torchia is written to inform the reader about today’s whistleblowers. They define what a whistleblower really is and where it originated from. The phrase whistleblowing has been around for many years, first dating back to when police officers would blow their whistles to gain attention to a criminal that was violating the law (Nisar, Prabhakar, & Torchia). Nisar, Prabhakar and, Torchia argue that since then, the term has coined conflicting opinions; where some still relate it to someone who acts as a betrayer and others who suggest they are courageous and accountable for their actions. Today, the most shared definition of a whistleblower is “when an employee announces either publicly or privately if the organization is involved in any corrupt, illegal, or immoral activities that might affect the company as a whole” (Nisar et al.). During the research conducted by Nisar, Prabhakar, and Torchia, tendencies shown that whistleblowing took place in areas that involved health issues whereas they were less likely to report it if the situation involved any fraud or illegal activities. With whistleblowing being a relatively new term, particularly in much smaller countries, there is a great need for further research. The claims in this article will be used to educate and provide insight to the reader from the background through the modern-day whistleblower. The facts provided by Nisar, Prabhakar, and Torchia will help guide my argument and provide the necessary details about whistleblowing that will be needed to get all points across to the reader.

    Moretti, Anthony. “Whistleblower or Traitor: Edward Snowden, Daniel Ellsberg and the Power of Media Celebrity.” Global Media Journal: American Edition, June 2014.

    This article is from a scholarly journal, Global Media Journal, with a view to publish the most trending and innovative researches that explore media, society, and culture in the wake of globalization. The article written by Anthony Moretti argues that Edward Snowden and Daniel Ellsberg paved a new way for whistleblowers to evolve within our technological advanced society. In addition, the “corporatization” of the media has been a hot topic of discussion relating to exactly how the media landscape has played a significant role in sharing information on a massive scale (Moretti). In some cases, however, this information was private and confidential. The growth of online whistleblowing, championed by WikiLeaks, has proven to be an effective and widely recognized effort. As technology moves all information toward this model of unregulated accessibility, the consequences for secret information could be devastating. The digitally connected society that now surrounds us has influenced the way whistleblowing and information leakage have evolved. In addition, as technology moves all information toward a model of unregulated accessibility, the consequences for secret information could be potentially devastating. Ultimately, the act of whistleblowing will continue to remain controversial regardless if an individual does it the right way or not. The claims in this article will be used to discuss how technology has enabled Whistleblowers to not only be anonymous but also get away without any consequences if it is used in a negative way. The facts provided by Anthony Moretti will assist my research and help inform readers on the technology evolution involved with sharing information.

    Goel, Rajeev K., and Michael A. Nelson. “Whistleblower Laws and Exposed Corruption in the United States.” Applied Economics, vol. 46, no. 20, July 2014, pp. 2331–2341.

    This article is from a scholarly journal Applied Economics with publications in economic analysis to specific problems in both public and private sectors, quantitative studies and contributions in research. The article written by Rajeev Goel and Michael Nelson argues that exposed corruption can be brought to light and there are laws to protect the individuals who reveal such acts. The United States is one of the first countries to initiate a federal law to protect whistleblowers and is a major influencer on both international agencies and domestic law. The False Claims Act of 1863 was designed to combat fraud by the United States government suppliers during the Civil War (Goel & Nelson). Later, the Whistleblower Act of 1989 and Sarbanes-Oxley Act (SOX) of 2002 provided legal protection for those activities. While federal laws hold a strong presence, each state has also legislated their own whistleblower laws to focus on protections for both public employees and private sector employees that the federal government may not cover (Goel & Nelson). Exposing corruption and spreading the world to policy makers in other nations is of high importance because the effect of whistleblowing of employees can in fact play a major role in the deterrence of corruption in both government and corporate organizations. The claims in this article will be used to provide the reader with knowledge of laws that protect people who come forth with information that can uncover potential illegal or unethical acts. The facts will guide research towards how the United States reacts to Whistleblowers and techniques that encourage this action.

    Cheng, Xintong, Khondkar E. Khondkar, & Karen J. Lin. “A cross-cultural comparison of
    whistleblowing perceptions.” International Journal of Management and Decision Making, vol. 14, no. 1, February 2015, pp. 15-31.

    This article is from a scholarly journal, International Journal of Management and Decision Making, that focuses on developing understanding of organizational decision making and the technology used to support the decision process. The characteristics of a Whistleblower can encompass many different attributes depending on who they are and why they are exposing information for public record. Also, a major factor about how whistleblowers are perceived is due to cultural influences (Cheng, Karim, & Lin). When done right, the result of whistleblowing has strengthened democracy, protected the environment, and helped save on major financial setbacks for taxpayers (Cheng et al.). Despite the benefits, the acceptance of whistleblowing is not supported worldwide; however, nations are beginning to make a more collective approach by trying to understand the cultural diversity in terms of whistleblowing behavior (Cheng et al.). The claims in this article will be used to provide the understanding that whistleblowing can be beneficial to a growing economy. It can be used in potential advancing ways to strengthening government. The facts will direct research towards the positives that whistleblowing can provide for governments, environment, and financial needs.

    Breitschwerdt, Jannis. “‘What Are the Latest Developments on Whistleblowing in the Workplace in Germany?”.” Global Workplace Insider, 12 Mar. 2018, http://www.globalworkplaceinsider.com/2016/06/what-are-the-latest-developments-on-whistleblowing-in-the-workplace-in-germany/.

    This article is from a blog, Global Workplace Insider, designed to deliver diverse insight on legal and business developments and trends impacting employment and labor matters in various regions across the globe. Aside from the more famous case of the German nurse, Brigitte Henisch, who was dismissed after leaking the ill-treatment of elderly people in a Berlin retirement home; only relevance and public awareness has been considered and the subject remains as a complex matter. The claims in this article will broaden the research into German whistleblowers.

    Guyer, Thad, and Peterson, Nikolas. “The Current State of Whistleblower Law in Europe: A Report By The Government Accountability Project.” May 2013.

    This article is a report from the 2013 current state of whistleblower law in Europe. In Germany, there is no clear legislation that deals with whistleblowing procedures and how individuals who do commit the act are protected. German society shares cultural norms that are hostile to the protections for whistleblowing. The facts in this article will drive research into European whistleblower laws.

    Hassink, Harold, Meinderd de Vries, and Laury Bollen. “A Content Analysis of Whistleblowing Policies of Leading European Companies.” Journal of Business Ethics vol. 75 no. 1, 2007, pp. 25.

    This article is from a scholarly journal, Journal of Business Ethics, covers methodological and disciplinary aspects of ethical issues related to business. The German Corporate Governance code was introduced in 2002 and amended in 2005 with the intent of providing the same status of law, yet the code follows a “comply or explain” content which constitutes flexibility and self-regulation in the German constitution. The facts in this article will provide readers with the statue of laws within the German government.

Leave a Reply

Your email address will not be published. Required fields are marked *