References
- Barnard-Wills, David. 2011. “UK News Media Discourses of Surveillance.” The Sociological Quarterly 52 (4): 548–567.10.1111/tsq.2011.52.issue-4
- Barnes, Robert. 2013. “Secrecy of Surveillance Programs Blunt Challenges About Legality.” The Washington Post, June 7. https://www.washingtonpost.com/politics/secrecy-of-surveillance-programs-blunt-challenges-about-legality/2013/06/07/81da327a-cf9d-11e2-8f6b-67f40e176f03_story.html
- Boyne, R. 2000. “Post-panopticism.” Economy And Society 29 (2): 285–307.
- Bozovic, Miran, ed. 1995. Jeremy Bentham: The Panopticon Writings. London: Verso.
- Brivot, Marion, and Yves Gendron. 2011. “Beyond Panopticism: On the Ramifications of Surveillance in a Contemporary Professional Setting.” Accounting, Organizations and Society 36 (3): 135–155.10.1016/j.aos.2011.03.003
- Chadha, Kunal, and Anvita Bajpai. 2012. “Security Aspects of Cloud Computing.” International Journal of Computer Applications 40 (8): 43–47.10.5120/4987-7251
- Chadwick, Andrew, and Simon Collister. 2014. “Boundary-Drawing Power and the Renewal of Professional News Organizations: The Case of The Guardian and the Edward Snowden NSA Leak.” International Journal of Communication 8: 2240–2441.
- Chou, Te-Shun. 2013. “Security Threats on Cloud Computing Vulnerabilities.” International Journal of Computer Science and Information Technology 5: 79–88.10.5121/ijcsit
- Clarke, Roger. 2014. “Surveillance by the Australian Media, and its Regulation.” Surveillance and Society 12 (1): 89–107.
- Creswell, John W. 2013. Qualitative Inquiry and Research Design: Choosing Among Five Approaches. Thousand Oaks, CA: Sage.
- Focault, Michel. 1977. Discipline and Punish: The Birth of the Prison. New York: Vintage Books.
- Gellman, Barton, and Laura Poitras. 2013. “US, British Intelligence Mining Data from Nine US Internet Companies in Broad Secret Program.” The Washington Post, June 7. https://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html
- Greenwald, Glenn. 2013. “NSA Collecting Phone Records of Millions of Verizon Customers Daily.” The Guardian, June 5. https://www.theguardian.com/world/2013/jun/06/nsa-phone-records-verizon-court-order
- Greenwald, Glenn, Ewen MacAskill, and Laura Poitras. 2013. “Edward Snowden: The Whistleblower Behind the NSA Surveillance Revelations.” The Guardian, June 9. https://www.theguardian.com/world/2013/jun/09/edward-snowden-nsa-whistleblower-surveillance
- Hencke, D. 2011. “Privacy? It’s a Dangerous Myth.” British Journalism Review 22 (3): 43–48. doi:10.1177/0956474811422792.
- King, Geoffrey. 2014. “The NSA Puts Journalists Under a Cloud of Suspicion.” Attacks on the Press, Committee to Protect Journalists. https://cpj.org/2014/02/attacks-on-the-press-surveillance-storage.php.
- Lashmar, Paul. 2016. “No More Sources? The Impact of Snowden’s Revelations on Journalists and their Confidential Sources.” Journalism Practice 11 (6): 665–688.
- Lee, William E. 2007. “Deep Background: Journalists, Sources, and the Perils of Leaking.” American University Law Review 57: 1453–1529.
- Machanavajjhala, Ashwin, and Jerome P. Reiter. 2012. “Big Privacy.” XRDS: Crossroads, The ACM Magazine for Students 19 (1): 20–23. doi:10.1145/2331042.2331051.
- Maxwell, Joseph A. 2013. Qualitative Research Design: An Interactive Approach. Thousand Oaks, CA: Sage.
- McQuail, Denis. 2010. McQuail’s Mass Communication Theory. London: Sage.
- Paul, Rejoice, Mansi Talreja, and Aman Sahu. 2012. “Security Issues in Cloud Computing.” International Journal on Computer Science and Engineering 4 (11): 1863–1863.
- Rajaraman, V. 2014. “Cloud Computing.” Resonance 19 (3): 242–258.10.1007/s12045-014-0030-1
- Richards, Neil. 2013. “The Dangers of Surveillance.” Harvard Law Review 126 (7): 1934–1965.
- Stein, Sam. 2013. “Obama Administration on PRISM Program: ‘Only Non-US Persons Outside the US are Targeted.” The Huffington Post, June 7. https://www.huffingtonpost.com/2013/06/06/obama-administration-prism-program_n_3399858.html
- Taekke, Jesper. 2011. “Digital Panopticism and Organizational Power.” Surveillance and Society 8 (4): 441–454.
- Wahl-Jorgensen, Karin, Lucy K. Bennett, and Jonathan Cable. 2017. “Surveillance Normalization and Critique: News Coverage and Journalists’ Discourses Around the Snowden Revelations.” Digital Journalism 5 (3): 386–403.10.1080/21670811.2016.1250607
- Whittaker, Zack. 2013. “PRISM: Here’s How the NSA Wiretapped the Internet.” ZDNet, June 8. https://www.zdnet.com/prism-heres-how-the-nsa-wiretapped-the-internet-7000016565/
- Zhu, Wenwu, Chong Luo, Jianfeng Wang, and Shipeng Li. 2011. “Multimedia Cloud Computing.” IEEE Signal Processing Magazine 28 (3): 59–69.10.1109/MSP.2011.940269