14
Social & Ethical Issues Andrews, Lori. (2012). I know who you are and I saw what you did: Social networks and the death of privacy. New York, NY, Toronto, ON: Free Press. 323.04 A567I Lori Andrews explores the issue of eroding privacy as increasingly more personal information becomes available online, whether it is shared publicly or mined in secret. Although she focuses her discussion on social networks, Andrews provides the reader with a broad scope by including such topics as workplace discrimination and free speech in education. By revealing pertinent research, case studies and anecdotes of instances where data has been mined and manipulated in various contexts, this book explores privacy rights from numerous engaging perspectives. –NP Angwin, Julia. (2014). Dragnet nation: A quest for privacy, security, and freedom in a world of relentless surveillance. New York, NY: Times Books/Henry Holt and Company. 323.448 A581D Award-winning investigative journalist, Julia Angwin, looks at the state of surveillance in America from economic and governmental angles, including the overlap between the two spheres. Recounting the personal experience of her attempts to evade the scrutiny of the various watchers, Angwin uncovers just how difficult it is to participate in contemporary society without leaving a data trail. Ultimately, she theorizes on the likelihood and dangers of self-surveillance when these ever-present gazes become internalized. –NP Fuchs, Christian (Ed.). (2012). Internet and surveillance: The challenges of web 2.0 and social media. New York, NY: Routledge. 005.8 I61J A wide array of notable researchers and scholars offer their perspectives on the surveillance challenges that have arisen with the proliferation of social media. Part one delivers an in-depth introduction to the commercial context of Web 2.0, with works by Christian Fuchs, Mark Andrejevic, Daniel Trottier and David Lyon delineating the economic milieu of social network communications infrastructures. Part two delves into issues of power, interrogating the territory of consent between users and service providers. A rich, multilayered resource for novice and advanced scholars alike. –NP

Social & Ethical Issues...2015/11/02  · Greenwald, Glenn. (2014). No place to hide: Edward Snowden, the NSA and the surveillance state. London, ON: Hamish Hamilton. 323.4 G816N Glenn

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Social & Ethical Issues...2015/11/02  · Greenwald, Glenn. (2014). No place to hide: Edward Snowden, the NSA and the surveillance state. London, ON: Hamish Hamilton. 323.4 G816N Glenn

◉ Social & Ethical Issues ◉

Andrews, Lori. (2012). I know who you are and I saw what you did: Social networks and the death of privacy. New York, NY, Toronto, ON: Free Press. 323.04 A567I

Lori Andrews explores the issue of eroding privacy as increasingly more personal information becomes available online, whether it is shared publicly or mined in secret. Although she focuses her discussion on social networks, Andrews provides the reader with a broad scope by including such topics as workplace discrimination and free speech in education. By revealing pertinent research, case studies and anecdotes of instances where data has been mined and manipulated in various contexts, this book explores privacy rights from numerous engaging perspectives. –NP

Angwin, Julia. (2014). Dragnet nation: A quest for privacy, security, and freedom in a world of relentless surveillance. New York, NY: Times Books/Henry Holt and Company. 323.448 A581D

Award-winning investigative journalist, Julia Angwin, looks at the state of surveillance in America from economic and governmental angles, including the overlap between the two spheres. Recounting the personal experience of her attempts to evade the scrutiny of the various watchers, Angwin uncovers just how difficult it is to participate in contemporary society without leaving a data trail. Ultimately, she theorizes on the likelihood and dangers of self-surveillance when these ever-present gazes become internalized. –NP

Fuchs, Christian (Ed.). (2012). Internet and surveillance: The challenges of web 2.0 and social media. New York, NY: Routledge. 005.8 I61J

A wide array of notable researchers and scholars offer their perspectives on the surveillance challenges that have arisen with the proliferation of social media. Part one delivers an in-depth introduction to the commercial context of Web 2.0, with works by Christian Fuchs, Mark Andrejevic, Daniel Trottier and David Lyon delineating the economic milieu of social network communications infrastructures. Part two delves into issues of power, interrogating the territory of consent between users and service providers. A rich, multilayered resource for novice and advanced scholars alike. –NP

Page 2: Social & Ethical Issues...2015/11/02  · Greenwald, Glenn. (2014). No place to hide: Edward Snowden, the NSA and the surveillance state. London, ON: Hamish Hamilton. 323.4 G816N Glenn

2

Greenberg, Andy. (2012). The machine kills secrets: How wikileakers, cypherpunks and hacktivists aim to free the world’s information. New York, NY: Dutton 364.168 G798T

Leading to a contemporary expose, Andy Greenberg, a Forbes reporter, traces a historical account of resistance to institutional secrecy. Featuring never before shared communications with Julian Assange, Daniel Domscheit-Berg, and WikiLeaks' shadowy engineer known as the Architect (who has never been interviewed), Greenberg uncovers the drives and actions of politically-motivated hackers. A thrilling read for those interested in cybersecurity, this book offers a valuable context for advocates of free access to information.—NP

Greenwald, Glenn. (2014). No place to hide: Edward Snowden, the NSA and the surveillance state. London, ON: Hamish Hamilton. 323.4 G816N

Glenn Greenwald recounts his first meeting with Edward Snowden in Hong Kong—the build up to the now famous NSA surveillance leaks. In this riveting account of events, Greenwald questions not only the continued impact of these revelations, but also the ways in which the knowledge of such widespread surveillance programs has shaped public perceptions of the role of government. –NP

Hunker, Jeffrey. (2010). Creeping failure: How we broke the internet and what we can do to fix it. Toronto, ON: McClelland & Stewart. 364.168 H937C

As a manner of probing the social issues that have been reflected through the Internet over time Jeffrey Hunker re-envisions this technosocial space as London in the 1800s. Relaying the historical context of the development of the Internet, and progressing through time to examine the contemporary terrain of hacking, phishing, identity theft and cyber terrorism, Hunker questions what is next. In doing so, he proposes steps to develop a new model, with hopeful predictions of his own. A more liveable virtual city may indeed be possible for future users! –NP

Jarvis, Jeff. (2011). Public parts: How sharing in the digital age improves the way we work and live. New York, NY: Simon & Schuster. 302.30285 J38P

Jeff Jarvis, the author of What Would Google Do? (2009) argues that social networking heralds an era of increased openness and productivity. In a stark contrast to many critics, Jarvis envisions the digital age as reinvigorating work and social practices through increased availability and collaboration. A must-read for those interested in a business-oriented view of the social networking landscape.—NP

Page 3: Social & Ethical Issues...2015/11/02  · Greenwald, Glenn. (2014). No place to hide: Edward Snowden, the NSA and the surveillance state. London, ON: Hamish Hamilton. 323.4 G816N Glenn

3

Keenan, Thomas P. (2014). Technocreep: the surrender of privacy and the capitalization of intimacy. Vancouver, BC: Greystone Books. 323.448 K26T

Thomas Keenan looks at the ever-expanding reach of governments, corporations and individuals through the use of surveillance technologies. Technocreep highlights the plethora of ways that everyday objects can be used to monitor and record increasingly massive amounts of data on their unsuspecting subjects. Combining Keenan’s sparky writing style with a host of intriguing examples of new technologies set to observe, this book is sure to both delight and unnerve.—NP

Kreissl, Reinhard & Wright, David (Eds.). (2015). Surveillance in Europe. New York, NY: Routledge. 323.4482 S963S

Reinhard Kreissl and David Wright offer a comprehensive guide to the state of surveillance in Europe today using an interdisciplinary lens. With contributions from leading scholars and thinkers, this book provides a foundation from which to explore the surveillance industry and its socio-political implications. –NP

Mills, Jon L. (2015). Privacy in the new media age. Gainesville, FL: University Press of Florida. 342.730858 M657P

Jon Mills brings his own in depth knowledge of privacy and US constitutional law to the masses in this thorough and engaging examination of contemporary mediated life. Of particular interest to Mills is the intersection between freedom of expression and individual privacy. He deftly interrogates these topics by analyzing case studies, looking to international examples to offer his unique, solutions-focused perspective. –NP

Milne, George R. (2015). Digital privacy in the marketplace: Perspectives on the information exchange. New York, NY: Business Expert Press. 323.448 M659D

George Milne explores the topic of privacy from a market-oriented perspective, probing the data exchange between consumers and marketers. Providing context to the debate by exploring the standpoints of the multiple stakeholders in this environment, Milne positions privacy issues in a new light. Accounting for varied attitudes and needs, he offers his own take on the future direction of privacy in the marketplace. –NP

Page 4: Social & Ethical Issues...2015/11/02  · Greenwald, Glenn. (2014). No place to hide: Edward Snowden, the NSA and the surveillance state. London, ON: Hamish Hamilton. 323.4 G816N Glenn

4

Nelson, Lisa S. (2011). America identified: Biometric technology and society. Cambridge, MA: MIT Press. 303.483 N427A

Once a fantasy of imaginative minds anatomical, physiological and behavioural identification techniques are surging in popularity. Lisa Nelson shares findings from her own extensive research, in which she seeks to contextualize the complexities of the public response to the use of such surveillance technologies. This book offers a fascinating look at the rapidly advancing realm of biometric technologies, and their influences on our everyday lives. –NP

Phillips, Sandra & Priest, Dana. (2014). Covert operations: Investigating the known unknowns. Santa Fe, NM: Radius Books. 704.9493553432 C323C

A catalogue from an exhibition at Scottsdale Museum of Contemporary Art, curated by Claire Carter. The works explore contemporary American life in the context of an extended surveillance reach, and the moral panic that accompanies all new technologies. With documentation of photos, videos and constructed environments featured in the exhibition, this catalogue offers a stunning look at a creative response to social issues. –NP

Schneier, Bruce. (2015). Data and Goliath: The hidden battles to capture your data and control your world. New York, NY: W.W. Norton. 323.4482 S359D

As a security expert, Schneier investigates the inner workings of mass corporate and government surveillance. After querying the costs and benefits, he details recommendations to moving forward with a greater balance, equally valuing security and privacy for individuals and organizations. –NP

Staples, William G. (2014). Everyday surveillance: Vigilance and visibility in postmodern life (2nd Ed.). Lanham, MD: Rowman & Littlefield. 323.4482 S794E

William Staples explores the multitude of subtle ways in which surveillance has become a mundane part of contemporary life. With particular attention to the social ramifications of this climate, Staples draws parallels between the justice system and the quotidian. This second edition is updated to include a robust discussion of the role of social media. –NP

Trottier, Daniel. (2012). Social media as surveillance: Rethinking visibility in a converging world. Burlington, VT: Ashgate. 303.30285 T858S

With the ubiquity of social media, communications platforms such as Facebook have fostered an increase in the publicity of our everyday lives. While the issue of surveillance has gained traction, its relation to social life is complex, and often undeveloped. Daniel Trottier elucidates this relationship in his ethnographic research. By tracing Facebook use for work and leisure, Trottier examines monitoring on social media in a new light, adding to contemporary discourses of this technosocial environment. –NP

Page 5: Social & Ethical Issues...2015/11/02  · Greenwald, Glenn. (2014). No place to hide: Edward Snowden, the NSA and the surveillance state. London, ON: Hamish Hamilton. 323.4 G816N Glenn

5

Tucker, David. (2014). The end of intelligence: Espionage and state power in the information age. Stanford, CA: Stanford University Press. 327.12 T891E

An exploration of the mutual shaping between intelligence operations and information technologies, this book offers a revelatory discussion of power in the information age. David Tucker is most critical of the notion that information technologies have decentralized power, arguing instead that intelligence organizations are the pre-eminent contemporary operators of control.—NP

Tucker, Patrick. (2014). The naked future: What happens in a world that anticipates your every move. New York, NY: Current. 303.4833 T891N

Patrick Turner, an editor at large for The Futurist, develops a model for day-to-day life under the influence of the targeted uses of Big Data. Moving beyond an exposition of the current means of employing predictive analytics, Turner posits a drastic shift in privacy discourses. The Naked Future delivers a thought-provoking look at the changes that are occurring, and will continue to occur, as human life is increasingly quantified, scrutinized and anticipated.—NP

Zureik, Elia. (2010). Surveillance, privacy and the globalization of personal information: International comparisons. Montreal: McGill-Queen’s University Press. 323.448 S63S

In order to compare and contrast the experiences of diverse populations living under state surveillance in various contexts, this massive undertaking of research spans multiple countries. Including data from participants living in China, Japan, Brazil, Mexico, the United States, Canada, Spain, France and Hungary, this book explores how personal information is given and collected in local, national and global transfers. A tremendous resource for those interested in the relationship between governments, their citizens and the global private sector.—NP

◉ Legal Issues ◉

Cannataci, Joseph A. (2015). The individual and privacy (Vol. 1). Burlington, VT : Ashgate Publishing. 342.0858 I39I

A series of interdisciplinary essays that probe the philosophy of privacy with the goal of contributing to evidence-based policymaking. Problematizing privacy from legal, theoretical and social perspectives, this book offers a multi-disciplinary perspective on issues of privacy, on both individual and collective fronts. –NP

Page 6: Social & Ethical Issues...2015/11/02  · Greenwald, Glenn. (2014). No place to hide: Edward Snowden, the NSA and the surveillance state. London, ON: Hamish Hamilton. 323.4 G816N Glenn

6

Clarke, Richard A., Morrell, Michal J., Stone, Geoffrey R., Sustein, Cass R. & Swire, Peter (2014). The NSA report: Liberty and security in a changing world. Princeton, NJ: Princeton University Press. 353.170973 U58N

The official NSA report commissioned by President Obama following the publication of United States government documents by NSA contractor Edward Snowden. –NP

Claypoole, Theodore & Payton, Theresa M. (2014). Privacy in the age of big data: Recognizing threats, defending your rights, and protecting your family. Toronto, ON: Rowman & Littlefield. 323.448 P347P

Claypoole and Payton explore the socio-political climate that has contributed to the mass collection and storage of data from the plethora of digital devices that many of us use every day. However, Privacy in the Age of Big Data takes a refreshingly measured approach to exploring the topic of privacy, with the authors highlighting both positive and negative ramifications of digital surveillance. While there may be benefits to these practices, there remain multiple ethical issues that remain unsolved. To tackle these tensions the authors propose concrete technical, behavioural and political actions for the concerned digital citizen. –NP

Davis, Fergal, McGarrity, Nicola & Williams, George (Eds.). (2014). Surveillance, counter-terrorism and comparative constitutionalism. Abingdon, Oxon: Routledge 344.05325 S963S

A detailed exploration of US constitutional law that examines the expansion of government surveillance programs in the last fifteen years. With contributions from experts in the fields of counter-terrorism and constitutional law, this book’s contributors take the pulse of contemporary surveillance in the United States and beyond. –NP

Leath, Philip (Ed.). (2015). Privacy in the information society (Vol. II). Burlington, VT: Ashgate Publishing. 342.0858 P945P

A continuation of the series The Library of Essays on Law and Privacy, this collection of essays profiles the terrain upon which privacy regulation is currently debated. Covering a breadth of issues, from data protection concerns to the centralisation of information databases, this book provides an informative foundation for scholars of information and law. –NP

Page 7: Social & Ethical Issues...2015/11/02  · Greenwald, Glenn. (2014). No place to hide: Edward Snowden, the NSA and the surveillance state. London, ON: Hamish Hamilton. 323.4 G816N Glenn

7

Richards, Neal. (2015). Intellectual privacy: Rethinking civil liberties in the digital age. New York, NY: Oxford University Press. 342.0858 R513I

The proliferation of online communications has invigorated debates on the topics of public rights to anonymity, privacy and intellectual freedom. While Neal Richards takes a strong position in favour of free speech, he plots a course for upholding this value alongside intellectual privacy. Identifying surveillance from the state and commercial enterprises as a threat to intellectual freedom, Richards analyzes the ways these various stakeholders fare under current US law. –NP

Sloan, Robert H. & Warner, Richard (2014). Unauthorized access: The crisis in online privacy and security. Boca Raton, FL: CRC Press/Taylor & Francis. 323.448 S634U

With expertise in both computer security and law, Robert Sloan and Richard Warner have developed this legal guide for laypeople. In doing so the authors make complex technical and legal concepts more accessible. Responding to the disjuncture between law and technological advancement, Sloan and Warner propose concrete solutions to contemporary public policy issues. --NP

Von Silva-Tarouca Larse, Beatrice. (2011) Setting the watch: Privacy and the ethics of CCTV surveillance. Portland, OR: Hart. 342.420858 V945S

Identifying a lack of awareness surrounding the theorizations, experiences and understandings of public surveillance, Von Silva-Tarouca Larse develops a theory to negotiate the ethical implications of CCTV cameras in public spaces. Advocating for a right to anonymity in public, this book provides a thorough legal and social framework to begin fleshing out this taken-for-granted issue. –NP

◉ Conceptual Frameworks ◉

Ball, Kristi, Haggerty, Kevin D. & Lyon, David. (2012). Routledge handbook of surveillance studies. New York, NY: Routledge. 323.4482 R869R - Course Reserves

A robust overview of current multidisciplinary scholarship pertaining to the field of surveillance studies. Topics of note include surveillance and population control; policing, intelligence and war; production and consumption; new media; security; identification; and regulation and resistance. With over 40 essays from leading thinkers, this handbook is sure to be a go-to for scholars in a variety of settings for years to come. –NP

Page 8: Social & Ethical Issues...2015/11/02  · Greenwald, Glenn. (2014). No place to hide: Edward Snowden, the NSA and the surveillance state. London, ON: Hamish Hamilton. 323.4 G816N Glenn

8

Bernard-Wills, David. (2012). Surveillance and identity: Discourse, subjectivity and the state. Burlington, VT: Ashgate Publishing. 323. 4482 B259S

In this innovative look at subjectivity in contemporary society, David Bernard-Wills theorizes a model of the “surveillance identity” by arguing that the two concepts are inextricably linked. Exploring the ways that national surveillance projects and identity are reified through new media, Bernard-Willis provides a unique perspective for those seeking a philosophical lens from which to view contemporary surveillance structures in everyday life. –NP

Christensen, Miyase & Jansson, Andre (Eds). (2014) Media, surveillance and identity: Social perspective. New York, NY: Peter Lang Publishing. 302.23 M489M

A political economy perspective of mediated surveillance practices and the ways they interact with identity processes, covering such topics as social reproduction and broader socioeconomic structures. Tackling a multitude of issues and media forms, the research featured in this book offers refreshing new ways of thinking about surveillance. An optimal jumping-off point for new contributors to the field.—NP

Dowding, Martin R. (2011). Privacy: Defending an illusion. Lanham, MD: Scarecrow Press. 323.448 D745P

Martin Dowding highlights the shifting relationship between the public and notions of privacy in this analysis of privacy policy in the realms of healthcare, surveillance and social networking. Drawing a wide sociocultural net, this book helps to contextualize public and governmental responses to the changing affordances and constraints of life in the era of Web 2.0. –NP

Dubrofsky, Rachel E. & Magnet, Shoshana Amielle (Eds.). (2015). Feminist surveillance studies. Durham, NC: Duke University Press. 305.420973 F329F - Course Reserves

Using an intersectional feminist lens, this book’s contributors provide new standpoints from which to examine surveillance, in both theoretical and practical settings. By problematizing the notion of surveillance itself as a patriarchal practice a broader context of power emerges in the discourses of privacy and publicity, particularly in relation to new media. Featuring the work of such distinguished scholars as Lisa Nakamura and Yasmin Jiwani, Feminist Surveillance Studies provides a welcome intervention in contemporary surveillance debates. –NP

Page 9: Social & Ethical Issues...2015/11/02  · Greenwald, Glenn. (2014). No place to hide: Edward Snowden, the NSA and the surveillance state. London, ON: Hamish Hamilton. 323.4 G816N Glenn

9

Finn, Rachel L. & McCahill, Michael. (2014). Surveillance, capital and resistance: Theorizing the surveillance subject. New York, NY: Routledge, Taylor & Francis Group. 363.232 M121S

The product of a large research project conducted in a Northern UK city, this work explores how diverse populations experience and respond to monitoring through surveillance technologies. Informed by the work of Pierre Bourdieu, the celebrated French Structuralist, the authors explore the role of social position in the power dynamics of surveillance. –NP

Friedewald, Michael & Pohoryles, Ronald J. (Eds.) (2014). Privacy and security in the digital age. London; New York: Routledge. 323.448 P961P

This collection explores the relationship between privacy and technology, with particular emphasis on delineating new conceptual frameworks for the use of contemporary ICTs. The authors explore the ways that public views of privacy and data protection, now viewed by many as fundamental human rights, are shaped. Offering a thorough exploration of how these rights may be undermined by the commercialism of today’s Internet landscape, this book provides a solid foundation for an investigation into all matters of digital privacy. –NP

Lever, Annabelle. (2012). On privacy. New York, NY: Routledge. 323.448 L658P

With the goal of understanding the role of privacy in a democratic society, Annabelle Lever explores the impact of different balances of control between individuals and the state in a myriad of contexts. Teasing out the legal, social and ethical implications of government and employers holding sway in personal matters such as relationships and health, Lever makes a succinct argument that privacy is relational to other values, such as freedom, equality and security. --NP

McStay, Andrew. (2014). Privacy and philosophy: New media and affective protocol. New York, NY: Peter Lang. 323.44801 M479P

Offering a refreshing philosophical perspective to the fields of new media and surveillance studies, Andrew McStay explores privacy from epistemological, ontological and metaphysical perspectives. In exploring the mutual shaping between privacy and publicity, McStay delivers an engaging and original work that is not to be missed. –NP

Page 10: Social & Ethical Issues...2015/11/02  · Greenwald, Glenn. (2014). No place to hide: Edward Snowden, the NSA and the surveillance state. London, ON: Hamish Hamilton. 323.4 G816N Glenn

10

Nissenbaum, Helen. (2010). Privacy in context: Technology, policy, and the integrity of social life. Stanford, CA: Stanford Law Books. 323.4480973 N726P

Helen Nissenbaum explores public understandings of privacy as they pertain to information technologies and digital media. She questions the value of placing a distinction between public and private in privacy debates. Using a broad stroke to contextualize how the sharing of information is perceived by the general public, Nissenbaum contributes to a theoretical reframing of the topic.—NP

Quill, Lawrence. (2014). Secrets and democracy: From Arcana Imperii to Wikileaks. Hampshire, UK: Palgrave Macmillan. 323.445 Q6S

Although contemporary whistleblowers such as Edward Snowden and Julian Assange have increased attention to issues of surveillance and privacy, Lawrence Quill historicizes discourses on these topics as a way of parsing their complexity. By exploring the components of access and secrecy that shape the tension between a public right to know and the individual right to privacy, this book explores the relativity of concepts such as transparency, openness, anonymity, and privacy.—NP

Savirimuthu, Joseph. (2015). Security and privacy (Vol. 3). Burlington, VT: Ashgate Publishing. 342.0858 S444S

Engaging with scholarly works and public policy, this collection of essays deals with the institutional, regulatory and cultural contexts in which privacy, identity, and security come into being and interact.—NP

◉ Guides for Practice ◉

Behrnd-Klodt, Menzi & Prom, Christopher (Eds.). (2015). Rights in the digital era. Chicago, IL: Society of American Archivists. 344.73092 R571R

The second instalment in a series by the Society of American Archivists that explores contemporary trends in archival practice, this collection delves into the delicate balance between public and private in the holdings of archival institutions. With multiple authors presenting pointed debates centered on this theme, Rights in the Digital Era is a highly relevant examination of the ethical issues that are raised with the proliferation of data, with particular attention to the ways that this impacts historical documentation. –NP

Page 11: Social & Ethical Issues...2015/11/02  · Greenwald, Glenn. (2014). No place to hide: Edward Snowden, the NSA and the surveillance state. London, ON: Hamish Hamilton. 323.4 G816N Glenn

11

Cherry, Denny. (2014). The basics of digital privacy: Simple tools to protect your personal information and your identity online. Waltham, MA: Syngress. 005.8 C522B

Just as the title implies, Cherry details a clear and easy to follow plan to address your personal digital privacy. With practical tutorials for such day-to-day activities as selecting a username and password this book allows you to utilize the knowledge of infosecurity professionals in your daily networked interactions. –NP

Graham, Warren. (2012). The black belt librarian: Real world safety & security. Chicago. IL: American Library Association. 025.82 G742B

This guide for librarians is centered on two of the most significant values of the profession: openness and access. With over 20 years of experience as a library security manager, Warren Graham describes how these values can be upheld to maintain community trust. With backstage access to this wealth of real-world experience, this book can help any library professional develop their own skills. –NP

Iannarelli, John & O'Shaughnessy, Michael (2015). Information governance and security: Protecting and managing your company’s proprietary information. Waltham, MA: Butterworth-Heinemann. 658.472 I11I

Featuring case studies and step-by-step descriptions of how to protect an organization of any size, this guide assists managers in planning for the preservation of proprietary information. Beyond offering an organizational perspective, John Iannarelli and Michael O’Shaughnessy explore how the loss of such data can have a human impact. In this way, information governance issues are contextualized on systemic and individual levels. –NP

McCord, Gretchen. (2013). What you need to know about privacy law: A guide for librarians and educators. Santa Barbara, CA: Libraries Unlimited. 342.730858 M131W

A straightforward guide to tackling issues of privacy law that impact children and youth. Formulated specifically for librarians and educators, this book helps members of these professions stay up-to-date on the complex realm of personal privacy in order to assist and advocate for their publics. –NP

Page 12: Social & Ethical Issues...2015/11/02  · Greenwald, Glenn. (2014). No place to hide: Edward Snowden, the NSA and the surveillance state. London, ON: Hamish Hamilton. 323.4 G816N Glenn

12

Pearson, Siani & Yee, George (Eds.). (2012). Privacy and security for cloud computing. Heidelberg, Germany: Springer. 004.6782 P961P

Focusing on the consumer uncertainty that has arisen in the context of cloud computing, Siani Pearson and George Yee analyze the ways that risk can be managed with remote data storage. They provide a thorough introduction to newer computing environments, along with a glossary of terms. A useful tool for students and professionals alike! –NP

Smallwood, Robert F. (2012). Safeguarding critical e-documents: Implementing a program for securing confidential information assets. Hoboken, NJ: Wiley. 005.8 S635S

A guide for private organizations and public institutions to manage confidential documents in the most secure fashion. With detailed case studies serving as examples, this book provides a comprehensive framework for information professionals to use in developing best practices for safeguarding and preserving electronic documents. –NP

Winkler, Vic (J. R.). (2001). Securing the cloud: Cloud computer security techniques and tactics. Burlington, MA: Elsevier. 005.8 W775S

With the affordance of remote storage that is offered by cloud computing, data can be stored and accessed in new and novel ways. However, according to Vic Winkler, this new technological context may also raise new security concerns. With a particular emphasis on the business environment, Winkler explores how organizations can transition to utilizing this new technology, without compromising security or control.—NP

◉ Teaching Tools & Books for Young Readers ◉

Adams, Helen R. (2013). Protecting intellectual freedom and privacy in your school library. Santa Barbara, CA: Libraries Unlimited. 025.213 A213P

In a frequently challenging environment school librarians must balance the needs of their students with those of other stakeholders. Adams, a prominent intellectual freedom advocate, shares her industry knowledge and develops a framework from which those in the profession can work to better advocate for students. She provides an instructive manual for managing access and privacy issues, such as challenges to materials in the school collection and the confidentiality of student records. A must-read for anyone considering this professional path! –NP

Page 13: Social & Ethical Issues...2015/11/02  · Greenwald, Glenn. (2014). No place to hide: Edward Snowden, the NSA and the surveillance state. London, ON: Hamish Hamilton. 323.4 G816N Glenn

13

Allen, John. (2014). Online privacy and hacking. San Diego, CA: ReferencePoint Press. Juvenile ALL

By exploring the motivations and practices of hackers Allen offers a practical guide to addressing everyday privacy concerns. With a detailed overview of the vulnerability of online information and an introduction to new tools in the field of data protection, this book provides a look into the trajectory of online privacy from multiple perspectives. –NP

Brown, Tracy. (2014). Facebook safety and privacy. New York, NY: Rosen Central. Juvenile BRO

Part of a series for young readers, this book explores digital identity and safety issues in the context of social networking (with Facebook serving as the site of analysis). Brown includes detailed cases, examples and questions to provoke thought and discussion. Although it is recommended for children in grades 5-8, this is also a helpful tool for teachers, school librarians and care providers. –NP

Bryan, Dale-Marie. (2014). Smartphone safety and privacy. New York, NY: Rosen Central. Juvenile BRY

Part of a series for young readers, this book explores the safety of digital information as it is stored and transmitted through smartphones. Bryan includes detailed cases, examples and questions to provoke thought and discussion. Although it is recommended for children in grades 5-8, this is also a helpful tool for teachers, school librarians and care providers. –NP

Culp, Jennifer. (2014). Online gaming safety and privacy. New York, NY: Rosen Central. Juvenile CUL

Part of a series for young readers, this book explores the online gaming environment from the perspective of privacy and safety. Culp includes detailed cases, examples and questions to provoke thought and discussion. Recommended for children in grades 5-8, this is also a helpful tool for teachers, school librarians and other care providers. –NP

Page 14: Social & Ethical Issues...2015/11/02  · Greenwald, Glenn. (2014). No place to hide: Edward Snowden, the NSA and the surveillance state. London, ON: Hamish Hamilton. 323.4 G816N Glenn

14

Fromm, Megan. (2015). Privacy and digital security. New York, NY: Rosen Publishing. Juvenile FRO

With an emphasis on a journalistic context, this book helps young readers and their mentors understand digital surveillance and data protection. Fromm includes a primer on digital surveillance and best practices for individual safety online to complete this well-rounded practical guide. –NP

Suen, Anastasia. (2013). Online privacy and the law. New York, NY: Rosen Publishing. Juvenile SUE

By exploring digital identities and the implications of mediated interactions, this book helps young readers make informed decisions about their online presence.—NP

How to borrow

The Inforum is open to members of the University of Toronto community, as well as the general public. For more information, please see our borrowing page:

http://current.ischool.utoronto.ca/services/borrowing#Library_Cards

To find more books on this topic

There are many other books on this topic in the Inforum, as well as in other libraries in the University of Toronto Libraries (UTL) system. Try a subject search in the UTL catalogue at http://search.library.utoronto.ca with these suggested subject headings:

Electronic surveillance Privacy, Right of

Electronic surveillance – Social aspects Data protection

Electronic surveillance – Political aspects Freedom of information Video surveillance

– Compiled by Natalia Pietrzykowski, MI Candidate (2016) | Inforum Student Assistant (Nov 2015) Available on the Inforum website at http://uoft.me/inforum-bibliographies

Inforum, Faculty of Information, University of Toronto http://uoft.me/inforum