References
- Appelbaum, J., Gibson, A., Grothoff, C., Muler-Maguhn, A., Poitras, L., Sontheimer, M., & Stocker, C. (2014). Prying eyes: Inside the NSA’s war on internet security. Der Spiegel. Retrieved from http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html
- Ball, J., Borger, J., & Greenwald, G. (2013). Revealed: How US and UK spy agencies defeat internet privacy and security. The Guardian. Retrieved from http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security
- Bennett, C. J. (2011). In defence of privacy: The concept and the regime. Surveillance and Society, 8, 485–496. Retrieved from http://ojs.library.queensu.ca/index.php/surveillance-and-society/
- Brown, B. A. (2013). Primitive digital accumulation: Privacy, social networks, and biopolitical exploitation. Rethinking Marxism: A Journal of Economics, Culture and Society, 25, 385–403. doi:10.1080/08935696.2013.798974
- Coll, S. (2014). Power, knowledge, and the subjects of privacy: Understanding privacy as the ally of surveillance. Information, Communication and Society, 17, 1250–1263. doi:10.1080/1369118X.2014.918636
- Dobbin, F. (2001). Why the economy reflects the polity: Early rail policy in Britain, France, and the United States. In M. Granovetter & R. Swedberg (Eds.), The sociology of economic life (pp. 397–418). Cambridge: Westview Press.
- Fernback, J., & Papacharissi, Z. (2007). Online privacy as legal safeguard: The relationship among consumer, online portal, and privacy policies. New Media and Society, 9, 715–734. doi:10.1177/1461444807080336
- Fourcade, M. (2009). Economists and societies: Discipline and profession in the United States, Britain, and France, 1890s to 1990s. Princeton: Princeton University Press.
- Gilliom, J. (2011). A response to Bennett’s ‘in defence of privacy’. Surveillance and Society, 8, 500–504. Retrieved from http://ojs.library.queensu.ca/index.php/surveillance-and-society/
- Greenwald, G., MacAskill, E., Poitras, L., Ackerman, S., & Rushe, D. (2013). Microsoft handed the NSA access to encrypted messages. The Guardian. Retrieved from http://www.theguardian.com/world/2013/jul/11/microsoft-nsa-collaboration-user-data
- Krippner, G. R. (2007). The making of US monetary policy: Central bank transparency and the neoliberal dilemma. Theory and Society, 36(6), 477–513. doi:10.1007/s11186-007-9043-z
- Larson, J., Perlroth, N., & Shane, S. (2013). Revealed: The NSA’s secret campaign to crack, undermine internet security. ProPublica. Retrieved from https://www.propublica.org/article/the-nsas-secret-campaign-to-crack-undermine-internet-encryption
- Lyon, D. (2015). Surveillance after snowden. Cambridge: Polity Press.
- Mayrl, D., & Quinn, S. (2016). Defining the state from within. Sociological Theory, 34(1), 1–26. doi:10.1177/0735275116632557
- Möllers, N., & Halterlein, J. (2013). Privacy issues in public discourse: The case of ‘smart’ CCTV in Germany. Innovation: The European Journal of Social Science Research, 26, 57–70. doi:10.1080/13511610.2013.723396
- Nissenbaum, H. (2009). Privacy in context. Palo Alto, CA: Stanford University Press.
- Schreier, M. (2012). Qualitative content analysis in practice. Thousand Oaks, CA: SAGE.