Article evaluation

edit

Talk:Facebook#Relevancy of Hot or Not Creation

Article Ideas

edit

Agatha Baclear

- Currently does not have a Wikipedia article which I believe she should have one

- Sections

--- Liquid democracy and her vision of real-time politics

--- Her upbringing and path to becoming a politician

--- Campaign against Nancy Pelosi

"Politics and Technology" - Politics and technology

- Article presents no real examples of how technology and politics intermix

- Criticism does not even include hacking, manipulation, absence of

- There exists many examples of technology and politics (Big data, Hacking elections, Campaigning through technology, Liquid Democracy, etc.)

- Much controversy and large events that exposes prevalence of technology in politics

- No section on future streams of technology in politics

- No useful pictures that show different companies/devices used for politics

- Lack of section on devices (polling machines, electronic voting machines, etc.) used in politics

- No talk section means article is not as dense as it should be

- Lightly grazes on technology creating #BlackLivesMatter and other important online waves but does got go in depth nearly enough

- Online campaign fundraising and donations not mentioned

- Twitter and President Trump's/others' use of the social media not present

- Threats of violence through social media/coverage of terrorist attacks

- Exposure of other countries and how it has impacted

"Technology Policy" - Technology policy

- Article lacks concrete examples of policy around elections and technology

- Article does not reveal different events between Congress and CEO's of technology companies (Zuckerberg)

- No real time-table of the creation of policy that restricts/promotes technology

- Cambridge Analytic-a and other companies forcing governments to create policy should be mentioned

- Social media sites restricting hateful viewpoints and its intersection with the first amendment

Finalize your topic/find your sources

edit

On the technology policy Wikipedia article I would like to add a section on how there are many people who believe the US and other governments are now demanding policy that will regulate the use of technology in elections, politics, business, and other daily innovations that may be encroaching on people's lives. I would like to specify my article on the current political issues with the tampering of elections in the US and other nations involvement while also mentioning the prominence of big data in elections and how Congress has been involved with attempting to resolve those problems. I would also like to dive deep into the history of propaganda and how technology policy has been negatively used to suppress certain ideas and people while pushing a specific agenda on citizens of a country. I also believe the article should contain examples of technology policy that have been implemented in the US and other nations to protect businesses and civilians from being taken advantage of/put in harms way.

Works Cited

Allcott, Hunt, and Matthew Gentzkow. “Social Media and Fake News in the 2016 Election.” Journal of Economic Perspectives, vol. 31, no. 2, 2017, pp. 211–236., doi:10.1257/jep.27.1.1.

Dasgupta, Partha. Economic Policy and Technological Performance. Cambridge Univ. Press, 2005.

Liberini, Federica, et al. “Politics in the Facebook Era.” VOX, 7 Nov. 2018, voxeu.org/article/politics-facebook-era.

Madrigal, Alexis C. “What Facebook Did to American Democracy.” The Atlantic, Atlantic Media Company, 16 Nov. 2017, www.theatlantic.com/technology/archive/2017/10/what-facebook-did/542502/.

Stine, Deborah D. Science and Technology Policymaking: a Primer. Congressional Research Service, Library of Congress, 2009.

Winkler, Allan M. The Politics of Propaganda. Yale Univ. Pr., 1979.

Start Drafting Your Contributions

edit

The Call for Technology Policy in Politics

With the prevalence of technology throughout the 2000's, its power in politics have some people concerned about the speed at which it is advancing and the lack of sufficient regulation for it.[1] In the 2016 Presidential election, Neil Jenkins, the director in the Office of Cybersecurity and Communications at the Department of Homeland Security, revealed that Russian government actors had hacked into the Democratic National Committee's servers to steal some of their information against the Republican candidate Donald Trump[2].

The Russian infiltrators did not stop there, when new information showed that someone attempted to breach the election system by viewing the state's voter-registration database and stealing information on the registered voters[2]. Additionally, Arizona received cyber-attacks from the same I.P. addresses that had been used in the previous Illinois attacks to install malware[2]. Not long after, Jenkins found that many other states had received attacks from this same I.P. address [2] and reports from the Senate Intelligence Committee that concluded Russia targeted every U.S. state[3].

Given the breaches in the many different election systems in throughout the 2016 election, political figures nationwide have taken a firm stance against using electronic voting machines to avoid any future interference. One organization that leads the push toward U.S. paper voting is the Verified Voting Foundation; the foundation and its members believe that in order to protect the safety of U.S. elections in the future, government officials must be connected with experts in the field of technology to ensure unsecure and unreliable voting machines are not being used in the electoral process[4]. One of the board of directors, Barbra Simons, has gone as far to proclaiming that voting machines should be forbidden from U.S. elections as she, and many of her colleagues agree, that any data available online is subject to attack.[5]

Also in the 2016 election, the data firm Cambridge Analytica, became heavily involved with the enacting of Donald Trump as the 45th President of the United States when his Trump campaign hired the firm to guide his the data collecting process of it. In their work, Cambridge Analytica managed to scrape data on over 50 million users that detailed the users' personal information[6]. The data originated from Aleksandr Kogan, a former psychology professor at the University of Cambridge, who gave Cambridge Analytica by using a data extracting technique utilized at the University in which users filled out a personality survey and download an app[6].

With this data, the company created personality profiles for the users and mapped their trends in likes and friends to direct certain ads toward the user[6]. Considering that 62% of adults receive their news on social media sites like Facebook[7], Cambridge Analytica influenced the result of the election which leaves many wondering what role big data should have in the electoral process. Due to the influence that big data had in this election, the call to limit access to it and its usage has sparked a movement toward creating policy to restrict companies access to data called the "Great Privacy Awakening".[8] The state of California has begun exploring this regulation by enacting the California Consumer Privacy Act in late June, 2018; the act states that companies must declassify what sort of data they collect and grant users the option to delete data.[9] This leaves the rest of the U.S. watching to see the effectiveness of the California law in hopes to further protect U.S. citizens from becoming a victim to more unethical data practices.

 
A prototype of an autonomous Uber vehicle.

The Call for Technology Policy in Everyday Life

Along with the call for regulation in the political sector, many technological interventions in the everyday lives of citizens are raising concern for the future of regulation. For example, the concept of self-driving cars has grabbed the attention of many, including the popular rideshare company Uber; in March 2018, the company tested an AI-driven vehicle in Tempe, Arizona and during this test the vehicle struck and killed a 49 year old woman [10].

In this test, the self-driving vehicle was monitored by an Uber employee who they deemed a "watchdog."[10] It was later revealed that the reasoning for the accident had been due to an issue with the programming of the vehicle's AI; the company failed to create code capable of detecting jaywalkers [10]. Rather than classifying the jaywalking pedestrian as a human, the code defined the woman as "other" which the code did not have a protocol to perform under; it wasn't until 1.2 seconds before impact that the code detected a bicycle and alerted the vehicle to brake that the car began to slow down which was too late to avoid the accident.[10]

It was later determined by an investigation conducted by the National Transportation Safety Board (NTSB) that the Uber "watchdog" had been distracted by their mobile device[11]; this news called for the US government to create policy to protect citizens from further incidents. In result, the NTSB released new regulation that required companies testing autonomous vehicles on public roads to have their safety procedures throughly inspected and hand-recorded which would be subject to regulatory confirmation.[11]

 
A civil drone flying over a U.S. beach.

Another emerging technology that has captivated individuals worldwide are the civil use of drones. These drones are aerial vehicles controlled from a secondary device like a remote control, cell phone, etc. that are commonly equipped with a real-time camera uploading images to the user's device. Concerns around these unmanned vehicles have many concerned with the safety and privacy of them; many believe that these flying drones intrude on an individuals 4th amendment right that protects an individuals privacy while others believe that the drones pose a threat of collisions with other aircraft.[12] In response to such concerns, in December 2015 the Federal Aviation Administration (FAA) created rules that stated owners of these civil drones must register them with the FAA while individual states have enforced stricter laws that restrict them from certain public areas.[12]

This innovation has also attracted the attention of corporations, like Amazon, wishing to perfect their operations; in a proposed plan to commercialize drone delivery, the company has created prototypes of Amazon Prime Air drones built to deliver packages to customers' doorsteps via aerial travel in 30 minutes or less.[13] With a vision of hundreds of AI-driven drones flying freely to households nationwide, many opponents of such innovations have privacy concerns, including the president of the Electronic Privacy Information Center, Marc Rotenberg.[14] With these concerns in mind, in June 2016 the FAA released federal policy that made using drones much easier; companies would be able to fly drones under 55 pounds if they were operated by a person over 16 years old, flown below 400 feet, and were 5 miles away from an airport.[14] Although companies could use these drowns, the FAA failed to allow drones to be used for commercial package delivery due to the restriction that the drone must stay in-sight of the operator.[14]

Regulating the Internet

In the United States, net neutrality has been greatly discussed in politics; the idea of it is that corporations, governments, and internet providers should not discriminate against content on the internet.[15] This came about in the early 2000's when some internet providers (Comcast, AT&T, etc.) were restricting its customers from doing this like accessing VPNs and using Wi-Fi routers. The term "net neutrality" was created by Tim Wu, a Columbia University law professor, who called for net neutrality laws due to his concern that restricting certain internet access would greatly inhibit long-term innovation.[16] Shortly after in 2005, the Federal Communications Commission (FCC), under the Bush administration, issued a policy statement restricted providers from disallowing users to access legal content on the internet while allowing American citizens to freely connect their devices to whichever internet connections they desire.[16] Shortly after its creation, the FCC began enforcing these new rules when in 2005 it found a North Carolina internet provider, Madison River, guilty of interrupting internet phone calls: the FCC dealt the company fines and demanded Madison River to halt its unlawful actions.[17]

It wasn't long until this policy statement's authority came into question when in 2008 Comcast sued the FCC. In a court hearing, a federal court found that the FCC did not have the legal power to enforce the 2005 policy statement when they attempted to restrict Comcast from slowing their customers' connection to BitTorrent due to it greatly contributing to piracy.[16] This did not greatly impact the FCC's power, however, because in 2009 it forced Apple and AT&T to discontinue restricting its customers from making Skype calls.[17] With the Comcast case looming over the FCC, it desired to restructure its rules to make them stronger in court and in 2010, under the Obama administration, it did just that.

However, under this new legislation, the telecommunications company Verizon filed another lawsuit against the agency. Once again, the federal court found that, under Title II of the Communications Act, that the FCC did not have the jurisdiction to regulate corporations who are not "common carriers."[16] To address this issue, the former FCC-chair Tom Wheeler decided to deem broadband carriers, like Verizon, to be "Title II carriers" enabling the agency to regulate them which then sparked the passing of a new net neutrality order in 2015.[16] Still receiving lawsuits from many corporations, the new order finally held strong in federal court when the court declared that the agency's new rules were in fact under the authority of the FCC.[16]

Under the Trump administration, President Donald Trump appointed Ajit Pai as the new FCC chairman in January 2017 which lead to the voting out of the 2015 policy order in December 2017; under the new regulation, the rules of the 2015 order were dropped entirely and the regulation stated that broadband carriers were only required to publicly reveal how they were managing their networks.[16] Supporters of this new regulation claim that in reversing the former net neutrality policy, networks and internet providers will have more incentive to innovate and improve their networks by charging large companies for internet usage and introducing competition.[18] In October 2019, a federal appeals court ruled that the FCC's reversal of the 2015 policy order that imposed regulations was in fact lawful.[19]

Mass surveillance and censorship

One way governments utilize technology policy to their benefit is through the mass surveillance of its citizens.[20] Nations around the globe use these technologies and certain polices to listen to people's cell phone calls, read emails and text messages, track citizens' GPS, and many more actions claiming to be improving national safety for their country.[20] However, some nations will abuse their power of mass surveillance and inhibit the freedom of its citizens.[20] Here are a few examples of nations currently employing mass surveillance:

Name of Country Methods of Surveillance (Examples)
China
  • Internet surveillance
    • In 2018, the Chinese government requires major companies (Alibaba, Baidu, ByteDance, and Tencent) to track information on citizens' activity on blog posts, chat rooms, short video platforms and webcasts [21]
    • China prompts its citizens to delete "dangerous content" off of their devices and grants access only to approved applications and content [22]
    • Chinese companies are required to hand over data to the government at a moments notice [23]
  • Video surveillance
    • Under legislation, China monitors its people using thousands of cameras that utilize artificial intelligence and facial recognition to track the actions of its people [24]
    • Chinese law enforcement wear facial-recognition glasses capable of scanning and identifying civilians in just a few seconds [25]
India
  • Telecommunications surveillance
    • Under legislation, the Indian government is able to intercept telecommunications, with certain checks and balances that prevent a misuse of these actions. However, these written down rules are not clear and it is not clear if the government follows these rules [26]
Iran
  • Internet censorship
    • In November of 2019, the Iranian government shut off internet and mobile data access to more than 80 million of its citizens due to widespread protest against rising gasoline prices to restrict communication [27]
    • With protests and rallies against the government sparking in 2018, the Iranian government has gone threw waves of internet shutdowns on many popular social media sites and regional slowdowns in order to discourage civilian communication [28]
North Korea
  • Internet and information restrictions
    • Supreme leader, Kim Jong Un, completely controls all public information while serving harsh punishments for individuals who attempt to access content outside of these restrictions [29]
    • With the regime owning all news outlets, North Korea regulates and limits which kinds of information its citizens have access to with some looser restrictions being applied to elites and university students [30]
    • The government gives its people radio and television sets that only have access to government stations with these radio devices needing regular registrations with the police [30]
United States
  • Telecommunications and internet surveillance
    • Under the FISA Amendment Act passed in 2008 by President Bush, the NSA's power to monitor citizens' electronic communications had been largely expanded and allows them monitor individuals contact with foreigners while also permitting the government to conduct surveillance on people without probable cause [31]


Many technology producing corporations have taken advantage of these policies around the world and sold different devices for these nations to use for surveillance. For example,


Peer review three articles

edit

User:Maschristi/Agatha Bacelar/Peterorfanos Peer Review

Lead[edit]

edit

Guiding questions:

  • Has the Lead been updated to reflect the new content added by your peer?
    • The article does not have a clear lead.
  • Does the Lead include an introductory sentence that concisely and clearly describes the article's topic?
    • There are a couple paragraphs introducing her
  • Does the Lead include a brief description of the article's major sections?
    • No, the lead does not but could outline the major sections much better

Lead evaluation[edit]

edit

Lead of the article is up to you to make because it is a new article so try to give more of a general summation of her and her career/beliefs.

Content[edit]

edit

Guiding questions:

  • Is the content added relevant to the topic?
    • Yes, the content is relevant.
  • Is the content added up-to-date?
    • Yes, content added is up to date.
  • Is there content that is missing or content that does not belong?
    • I think adding more on liquid democracy could help out your article a lot!

Content evaluation[edit]

edit

Content is overall relevant and necessary for her Wikipedia page but should reference more on liquid democracy as that is her main political device/what she is know for.

Tone and Balance[edit]

edit

Guiding questions:

  • Is the content added neutral?
    • Yes, content is not bias in anyway.
  • Are there any claims that appear heavily biased toward a particular position?
    • No, no claims are made to seem biased.
  • Are there viewpoints that are overrepresented, or underrepresented?
    • No, no viewpoints are over or under represented.
  • Does the content added attempt to persuade the reader in favor of one position or away from another?
    • No, even though you talk about the race you do a good job of not trying to convince the reader to vote for her.

Sources and References[edit]

edit

Guiding questions:

  • Is all new content backed up by a reliable secondary source of information?
  • Are the sources thorough - i.e. Do they reflect the available literature on the topic?
  • Are the sources current?
  • Check a few links. Do they work?

Sources and references evaluation[edit]

edit

There are no sources in the additions to the article.

Organization[edit]

edit

Guiding questions:

  • Is the content added well-written - i.e. Is it concise, clear, and easy to read?
    • Yes, content sounds professional and is written very well.
  • Does the content added have any grammatical or spelling errors?
    • No grammatical or spelling errors.
  • Is the content added well-organized - i.e. broken down into sections that reflect the major points of the topic?
    • Yes, I believe the content is well-organized because it separates background and political history well.

Images and Media[edit]

edit

Guiding questions: If your peer added images or media

N/A

For New Articles Only[edit]

edit

If the draft you're reviewing is a new article, consider the following in addition to the above.

  • Does the article meet Wikipedia's Notability requirements - i.e. Is the article supported by 2-3 reliable secondary sources independent of the subject?
    • There are no sources included.
  • How exhaustive is the list of sources? Does it accurately represent all available literature on the subject?
    • No sources.
  • Does the article follow the patterns of other similar articles - i.e. contain any necessary infoboxes, section headings, and any other features contained within similar articles?
    • No, not really.
  • Does the article link to other articles so it is more discoverable?
    • Article does not link to other articles.

Overall impressions[edit]

edit

Guiding questions:

  • Has the content added improved the overall quality of the article - i.e. Is the article more complete?
  • What are the strengths of the content added?
  • How can the content added be improved?

Overall evaluation[edit]

edit

The content written is all new as it is a new article and the content written is all relevant. Please include citations and separate your article into concise sections that easily guide the reader. Adding a piece about liquid democracy would also be pretty useful.


User:Jameswang323/Civic Intelligence/Peterorfanos Peer Review

General info[edit]

edit

Lead[edit]

edit

Guiding questions:

  • Has the Lead been updated to reflect the new content added by your peer?
    • Yes, the lead has been updated.
  • Does the Lead include an introductory sentence that concisely and clearly describes the article's topic?
    • Yes
  • Does the Lead include a brief description of the article's major sections?
    • Yes
  • Does the Lead include information that is not present in the article?
    • Yes
  • Is the Lead concise or is it overly detailed?
    • Yes, the lead is concise.

Lead evaluation[edit]

edit

Content[edit]

edit

Guiding questions:

  • Is the content added relevant to the topic?
    • Yes, the content is relevant to the topic.
  • Is the content added up-to-date?
    • Yes, all content is up to date.
  • Is there content that is missing or content that does not belong?
    • Yes, there is some content that does not belong.

Content evaluation[edit]

edit

I think that James does a great job with adding information to the article however I think the section on "trolling" is unnecessary. Although it does tie into how it can negatively impact civic intelligence I think that you start to make a claim about it which I don't think is necessary so maybe try to make it seem less like a claim.

Tone and Balance[edit]

edit

Guiding questions:

  • Is the content added neutral?
    • For the most part
  • Are there any claims that appear heavily biased toward a particular position?
    • The trolling spot.
  • Are there viewpoints that are overrepresented, or underrepresented?
    • No, there are not.
  • Does the content added attempt to persuade the reader in favor of one position or away from another?
    • No.

Tone and balance evaluation[edit]

edit

I think the only gripe I have is with the trolling part, In the section you seem to make claims that you are concluding about how trolling causes all of these things but rather you should include examples of how trolling has caused certain movements/actions to happen (Area 51 raid could slide in).

Sources and References[edit]

edit

Guiding questions:

  • Is all new content backed up by a reliable secondary source of information?
    • Yes content is backed up.
  • Are the sources thorough - i.e. Do they reflect the available literature on the topic?
    • Yes
  • Are the sources current?
    • Yes
  • Check a few links. Do they work?
    • Yes

Sources and references evaluation[edit]

edit

The sources that James used were all very relevant and current plus the variety of sources that he used was very helpful for his article and is something I hope to get a little better at,

Organization[edit]

edit

Guiding questions:

  • Is the content added well-written - i.e. Is it concise, clear, and easy to read?
    • Yes
  • Does the content added have any grammatical or spelling errors?
    • There were a few
  • Is the content added well-organized - i.e. broken down into sections that reflect the major points of the topic?
    • I think it is well organized, could be broken up though

Organization evaluation[edit]

edit

The flow of the entire drafted article seemed to work very well. I think that if you were to use some other headings to break up what you are trying to elaborate on that would be a large help toward guiding the reader through the very intriguing information you've spelled out.

Images and Media[edit]

edit

Guiding questions: If your peer added images or media

N/A

Images and media evaluation[edit]

edit

For New Articles Only[edit]

edit

If the draft you're reviewing is a new article, consider the following in addition to the above.

  • Does the article meet Wikipedia's Notability requirements - i.e. Is the article supported by 2-3 reliable secondary sources independent of the subject?
  • How exhaustive is the list of sources? Does it accurately represent all available literature on the subject?
  • Does the article follow the patterns of other similar articles - i.e. contain any necessary infoboxes, section headings, and any other features contained within similar articles?
  • Does the article link to other articles so it is more discoverable?

New Article Evaluation[edit]

edit

Overall impressions[edit]

edit

Guiding questions:

  • Has the content added improved the overall quality of the article - i.e. Is the article more complete?
  • What are the strengths of the content added?
  • How can the content added be improved?

Overall evaluation[edit]

edit

I think that the content added improves the quality of the article tremendously. The current article lacks the details that James brings to the table and I am excited to see where James can add to it more. Personally, I really like the information on Boyte you merged into your article; it worked well with the whole political engagement aspect and explained a huge part of political engagement in our society. The one thing that could be improved is that the trolling portion seems to try to make claims that are not backed by sources so please try to find examples where trolling caused what you are claiming and you should be fine.

Responding to Peer Reviews

edit

I agree, the language in my article can seem bias in one direction because of the nature of the section I am trying to add to the article about people wanting policy on technology. In the future, I will avoid using words like "cry" and "need" and try to make the diction more neutral. I want to add titles to my article, however, I will need to restructure the order and flow of my article because I am trying to have all the paragraphs flow with one another at the moment but I realize that since there are different ideas so close breaking it up can be very useful. I'm currently struggling with finding a bunch of articles for my ideas; I would like to have a section about policy that has already been enacted into law in the US and other places but I have been having a difficult time finding that. I'll work on completing the last few paragraphs as I am still trying to find some direction for them.


  1. ^ Cassidy, Christina; Hartounian, Alaina (2018-11-02). "Voters raise concerns about voting machines, poll access". AP NEWS. Retrieved 2019-11-20.{{cite web}}: CS1 maint: url-status (link)
  2. ^ a b c d Zetter, Kim (2018-09-26). "The Crisis of Election Security". The New York Times. ISSN 0362-4331. Retrieved 2019-10-16.
  3. ^ Sanger, David E.; Edmondson, Catie (2019-07-25). "Russia Targeted Election Systems in All 50 States, Report Finds". The New York Times. ISSN 0362-4331. Retrieved 2019-10-16.
  4. ^ "Verified Voting Foundation | Verified Voting". Retrieved 2019-11-20.
  5. ^ Leovy, Jill (2017-11-08). "Meet the Computer Scientist Championing Paper Ballots". The Atlantic. Retrieved 2019-11-20.
  6. ^ a b c Granville, Kevin (2018-03-19). "Facebook and Cambridge Analytica: What You Need to Know as Fallout Widens". The New York Times. ISSN 0362-4331. Retrieved 2019-10-16.
  7. ^ Allcott, Hunt (Spring 2017). "Social Media and Fake News in the 2016 Election". Journal of Economic Perspectives. 31: 211–236.
  8. ^ Lapowsky, Issie (2019-03-17). "How Cambridge Analytica Sparked the Great Privacy Awakening". Wired. ISSN 1059-1028. Retrieved 2019-11-20.
  9. ^ Farivar, Cyrus; Ingram, David (2019-05-13). "California is bringing law and order to big data. It could change the internet in the U.S." NBC News. Retrieved 2019-11-20.{{cite web}}: CS1 maint: url-status (link)
  10. ^ a b c d at 05:48, Katyanna Quach 6 Nov 2019. "Remember the Uber self-driving car that killed a woman crossing the street? The AI had no clue about jaywalkers". www.theregister.co.uk. Retrieved 2019-11-19.{{cite web}}: CS1 maint: numeric names: authors list (link)
  11. ^ a b Beene, Ryan (2019-11-19). "Fatal Self-Driving Uber Crash Prompts Call for Tighter Oversight". finance.yahoo.com. Retrieved 2019-11-16.{{cite web}}: CS1 maint: url-status (link)
  12. ^ a b Wingfield, Nick (2015-11-23). "A Field Guide to Civilian Drones". The New York Times. ISSN 0362-4331. Retrieved 2019-11-20.
  13. ^ Coombs, Casey (2019-09-03). "With a Fleet of Drones, Amazon Wants To Deliver Packages Within 30 Minutes or Less". Retrieved 2019-11-20.
  14. ^ a b c Kang, Cecilia (2016-06-21). "F.A.A. Issues Commercial Drone Rules". The New York Times. ISSN 0362-4331. Retrieved 2019-11-20.
  15. ^ Kenton, Will. "Net Neutrality". Investopedia. Retrieved 2019-11-20.
  16. ^ a b c d e f g "Net Neutrality: Here's Everything You Need To Know". Wired. ISSN 1059-1028. Retrieved 2019-11-20.
  17. ^ a b "A Brief History of Net Neutrality". WIRED. Retrieved 2019-11-20.
  18. ^ Hellard, Bobby; Curtis, Joe. "The pros and cons of net neutrality". IT PRO. Retrieved 2019-11-20.{{cite web}}: CS1 maint: url-status (link)
  19. ^ McCabe, David (2019-10-01). "Court Upholds Net Neutrality Repeal, With Some Caveats". The New York Times. ISSN 0362-4331. Retrieved 2019-11-20.
  20. ^ a b c "Surveillance Technologies". Electronic Frontier Foundation. Retrieved 2019-11-27.
  21. ^ "China Steps Up Internet Surveillance by Recording User Activities". CPO Magazine. 2018-12-19. Retrieved 2019-11-27.
  22. ^ Ma, Alexandra. "China is building a vast civilian surveillance network — here are 10 ways it could be feeding its creepy 'social credit system'". Business Insider. Retrieved 2019-11-27.
  23. ^ Chin, Liza Lin and Josh. "China's Tech Giants Have a Second Job: Helping Beijing Spy on Its People". WSJ. Retrieved 2019-11-27.
  24. ^ Chan, Tara Francis. "Parts of China are using facial recognition technology that can scan the country's entire population in one second". Business Insider. Retrieved 2019-11-27.
  25. ^ Chan, Tara Francis. "Chinese police are using facial-recognition glasses to scan travelers". Business Insider. Retrieved 2019-11-27.
  26. ^ "State of Surveillance in India". Privacy International. Retrieved 2019-11-27.
  27. ^ Newman, Lily (2019-11-17). "How Iran's Government Shut Off the Internet". Wired. ISSN 1059-1028. Retrieved 2019-11-27.
  28. ^ "What You Need to Know about Internet Censorship in Iran". Centre for International Governance Innovation. Retrieved 2019-11-27.
  29. ^ Jerreat, Jessica (2017-04-24). "North Korean Censorship". HuffPost. Retrieved 2019-11-27.{{cite web}}: CS1 maint: url-status (link)
  30. ^ a b Sedaghat, Nouran (2014-03-17). "North Korea exposed: Censorship in the world's most secretive state". CJFE | Canadian Journalists for Free Expression. Retrieved 2019-11-27.{{cite web}}: CS1 maint: url-status (link)
  31. ^ "Documents Confirm How the NSA's Surveillance Procedures Threaten Americans' Privacy". American Civil Liberties Union. Retrieved 2019-11-27.