School of Information and Library Science
University of North Carolina at Chapel Hill

INLS 584, Information Ethics
Fall 2013

Effects of Computerization on
Democracy and Government

E-Government

Böhle, K., & Riehm, U. (2013). E-petition systems and political participation: About institutional challenges and democratic opportunities. First Monday, 18(7). http://dx.doi.org/10.5210%2Ffm.v18i7.4220.

Clayton, J., & Macdonald, S.J. (2013). The limits of technology: Social class, occupation and digital inclusion in the city of Sunderland, England. Information, Communication & Society, 16(6), 945-966. [UNC libraries]

Cullen, R., & Sommer, L. (2011). Participatory democracy and the value of online community networks: An exploration of online and offline communities engaged in civil society and political activity. Government Information Quarterly, 28(2), 148-154. [UNC libraries]

Henman, P. (2013). Governmentalities of Gov 2.0. Information, Communication & Society, 16(9), 1397-1418. [UNC libraries]

Johnson, T.J., Zhang, W., Bichard, S.L., & Seltzer, T. (2011). United we stand? Online social network sites and civic engagement. In Papacharissi, Z. (ed.), A Networked Self: Identity, Community, and Culture on social Network Sites. New York: Routledge, 185-207. [Davis Library - HM742 .N49 2011]

Letch, N., & Carroll, J. (2008). Excluded again: Implications of integrated e-government systems for those at the margins. IT and People, 21(3), 283-299. [UNC libraries]

Quinn, A.C., & Ramasubramanian, L. (2007). Information technologies and civic engagement: Perspectives from librarianship and planning. Government Information Quarterly, 24(3), 595-610. [UNC libraries]

Reddick, C.G., & Frank, H.A. (2007). The perceived impacts of e-government on U.S. cities: A survey of Florida and Texas City managers. Government Information Quarterly, 24(3), 576-594. [UNC libraries]

Sipior, J.C., Ward, B.T., & Connolly, R. (2011). The digital divide and t-government in the United States: Using the Technology Acceptance Model to understand usage. European Journal of Information Systems, 2093), 308-328. [UNC libraries]

Effects of Technology on Society/Democracy

Anttiroiko, A.-V. (2003). Building strong e-democracy: The role of technology in developing democracy for the information age. Communications of the ACM, 43(9 virtual extension). [ACM Digital Library]

Bohman, J. (2008). The transformation of the public sphere: Political authority, communicative freedom, and internet publics. In van den Hoven, J., & Weckert, J. (eds.), Information Technology and Moral Philosophy. Cambridge: Cambridge University Press, 66-92. [Davis Library - T58.5 .I53745 2008]

Dahlberg, L. (2011). Re-constructing digital democracy: An outline of four 'positions'. New Media & Society, 13(6), 855-872. [UNC libraries]

Elovaara, P., & Mörtberg, C. (2007). Design of digital democracies: Performances of citizenship, gender, and IT. Information, Communication, & Society, 10(3), 404-423. [UNC libraries]

Enjolras, B., Steen-Johnsen, K., & Wollebæk, D. (2013). Social media and mobilization to offline demonstrations: Transcending participatory divides? New Media & Society, 15(6), 890-908. [UNC libraries]

Evangelopoulos, N., & Visinescu, L. (2012). Text-mining the voice of the people. Communications of the ACM, 55(2), 62-69. [UNC libraries]

Goldman, A.I. (2008). The social epistemology of blogging. In van den Hoven, J., & Weckert, J. (eds.), Information Technology and Moral Philosophy. Cambridge: Cambridge University Press, 111-122. [Davis Library - T58.5 .I53745 2008]

Hampton, K.N. (2011). Comparing bonding and bridging ties for democratic engagement. Information, Communication & Society, 14(4), 510-528. [UNC libraries]

Jensen, M.J. (2007). Civil society and cyber society: The role of the internet in community associations and democratic politics. The Information Society, 23(1), 39-50. [UNC libraries]

Johnson, D.G. (2000). Democrative values and the Internet. In Langford, D. (ed.), Internet Ethics. New York: St. Martin's Press, 181-199. [SILS - TK5105.875 .I57 I547 2000]

Kobayashi, T., Ikeda, K., & Miyata, K. (2006). Social capital online: Collective use of the internet and reciprocity as lubricants of democracy. Information, Communication & Society, 9(5), 582-611. [UNC libraries]

Le Dantec, C.A. (2012). Considering the rights (and wrongs) of community technology. interactions, 19(4), 24-27. [UNC libraries]

Loveland, M.T., & Popescu, D. (2011). Democracy on the Web: Assessing the deliberative qualities of Internet forums. Information, Communication & Society, 14(5), 684-703. [UNC libraries]

Noam, E. M. (2005). Why the internet is bad for democracy. Communications of the ACM, 48(10), 57-58. [ACM Digital Library]

Oravec, J. A. (2005). Preventing e-voting hazards: The role of information professionals in securing the promise of electronic democracy. Information Management, 18(3/4), 3-4, 30. [forthcoming]

Salgado, S. (2012). The Web in African countries: Exploring the possible influences of the Internet in the democratization processes. Information, Communication & Society, 15(9), 1373-1389. [UNC libraries]

Schuler, D. (2001). Computer professionals and the next culture of democracy. Communications of the ACM, 44(1), 52-57. [ACM Digital Library]

Still, B. (2005). Hacking for a cause. First Monday, 10(9). http://firstmonday.org/issues/issue10_9/still/.

Sunstein, C.R. (2004). Democracy and filtering. Communications of the ACM, 47(12), 57-59. [ACM Digital Library]

Sunstein, C.R. (2008). Democracy and the Internet. Invan den Hoven, J., & Weckert, J. (eds.), Information Technology and Moral Philosophy. Cambridge University Press, 93-110. [Davis - T58.5 .I53745 2008]

Watson, R. T., & Mundy, B. (2001). A strategic perspective of electronic democracy. Communications of the ACM, 44(1), 27-30. [ACM Digital Library]

The USA PATRIOT Act and Homeland Security

Foerstel, H. N. (2004). Refuge of a Scoundrel: The PATRIOT Act in Libraries. Westport, CT: Libraries Unlimited. [SILS, Davis - KF4315 .F64 2004]

Freeman, M. (2005). Counterterrorism and privacy: The changing landscape of surveillance and civil liberties. In Freeman, L.A., & Peace, A.G. (eds.), Information Ethics: Privacy and Intellectual Property. Hershey, PA: Information Science Publishing, 163-179. [Law Library - T58.5 .I5248 2005]

Gorham-Orscilowski, U., & Jaeger, P.T. (2008). National security letters, the USA PATRIOT Act, and the Constitution: The tensions between national security and civil rights. Government Information Quarterly, 25(4), 625-644. [UNC libraries]

Hartzel, K.S., & Deegan, P.E. (2005). Balancing individual privacy rights and intelligence needs: Procedural-based vs. distributive-based justice perspectives on the PATRIOT Act. In Freeman, L.A., & Peace, A.G. (eds.), Information Ethics: Privacy and Intellectual Property. Hershey, PA: Information Science Publishing, 180-196. [Law Library - T58.5 .I5248 2005]

Jaeger, P. T., Bertot, J. C., & McClure, C. R. (2003). The impact of the USA PATRIOT Act on collection and analysis of personal information under the Foreign Intelligence Surveillance Act. Government Information Quarterly, 20(3), 295-314. [UNC libraries]

Lilly, J.R. (2003). National security at what price? A look into civil liberty concerns in the information age under the USA PATRIOT Act of 2001 and a proposed constitutional test for future legislation. Cornell Journal of Law and Public Policy, 447(2), 448-472. [UNC libraries]

Nakashima, E. (2007, Nov. 2).  Librarians say surveillance bills lack adequate oversight. Washington Post, Section A, 6. http://www.washingtonpost.com/wp-dyn/content/article/2007/11/01/AR2007110102233.html.

Penniman, W.D. (2005). U.S.A. P.A.T.R.I.O.T. Act: Where are we? Library & Archival Security, 20(1/2), 3-35. [UNC libraries]

Strickland, L. S. (2005). The USA PATRIOT Act redux: Should we reauthorize or repudiate the post-9/11 authorities? Bulletin of the American Society for Information Science & Technology, 31(5), 25-28. [UNC libraries]

Trinkaus-Randall, G. (2006). The USA PATRIOT Act: Archival implications. Journal of Archival Organization, 3(4), 7-23.  [UNC libraries]

USA PATRIOT Act Portal. (2003). Special Libraries Association. http://www.sla.org/content/SLA/advocacy/PATRIOTAct/index.cfm. Last accessed August 16, 2005.

Zetter, K. (2009, May 19). FBI use of PATRIOT Act authority increased dramatically in 2008.  Wired Magazine. http://www.wired.com/threatlevel/2009/05/fbi-use-of-patriot-act-authority-increased-dramatically-in-2008/.

Electronic Voting/Elections

Dill, D.L., & Castro, D. (2008). The U.S. should ban paperless electronic voting machines [Point/Counterpoint]. Communications of the ACM, 51(10), 29-35. [ACM Digital Library]

Dill, D. L., Schneier, B., & Simons, B. (2003). Viewpoint: Voting and technology: who gets to count your vote? [Viewpoint]. Communications of the ACM, 46(8), 29-31. [ACM Digital Library]

Faliszewski, P., Hemaspaandra, E., & Hemaspaandra, L.A. (2010). Using complexity to protect elections. Communications of the ACM, 53(11), 74-82. [UNC libraries]

Farivar, C. (2008). Clean elections. Communications of the ACM, 51(10), 16-18. [ACM Digital Library]

Fernandez, E.G., La Red, D.L., & Peláez, J.I. (2013). A conceptual approach to secure electronic elections based on patterns. Government Information Quarterly, 30(1), 64-73. [UNC libraries]

Neumann, P.G. (ed.) (2004). The problems and potentials of voting systems [Special section, including ACM Statement on Voting Systems]. Communications of the ACM, 47(10). [ACM Digital Library, multiple articles]

Olsen, K.A., & Nordhaug, H.F. (2012). Internet elections: Unsafe in any home? Communications of the ACM, 55(8), 36-38. [UNC libraries]

Robertson, S. P. (2005). Voter-centered design: Toward a voter decision support system. ACM Transactions on Computer-Human Interaction, 12(2), 263-292. [ACM Digital Library]

Simons, B., & Jones, D.W. (2012). Internet voting in the U.S. Communications of the ACM, 55(10), 68-77. [UNC libraries]

Woolley, T., & Fisher, C. (2004). Internet voting: Beyond technology. In Quigley, M. (ed.), Information Security and Ethics: Social and Organizational Issues. Hershey, PA: IRM Press, 117-138. [SILS - T14.5 .I55 2005]

Web Sites of Interest

Center for Democracy & Technology. http://www.cdt.org/

Additional References

Agre, P. E. (2001). Supporting the intellectual life of a democratic society. Ethics and Information Technology, 3(4), 289-298. [UNC libraries]

Beniger, J. R. (1986). Introduction. In The Control Revolution: Technological and Economic Origins of the Information Society. Cambridge, MA: Harvard University Press, 1-27. [Davis, UL - HM258 .B459 1986]

Bereano, P. (1997). Technology is a tool of the powerful. In Ermann, M. D., Williams, M. B., & Shauf, M. S. (Eds.), Computers, Ethics, and Society. 2nd ed. New York: Oxford University Press, 26-32. [Davis - QA76.9 .C66 C6575 1997]

Bucy, E. P., & Gregson, K. S. (2001). Media participation: A legitimizing mechanism of mass democracy. New Media and Society: An International Journal, 3(3), 359-382. Reprinted in Bucy, E. P. (2005). Living in the Information Age: A New Media Reader. 2nd edition. Wadsworth/Thomson Learning, 221-231. [SILS - P91.25 .L58 2005]

Cameron, J., & Geiselhart, K. (1997). A charter for citizens of the global information society. In Berleur, J., & Whitehouse, D. (Eds.), An Ethical Global Information Society: Culture and Democracy Revisited. IFIP TC9 WG 9.2/9.5 International Conference on Culture and Democracy Revisited in the Global Information Society (May 8-10, 1997, Corfu, Greece). London: Chapman & Hall, 15-29. [Davis - HM221 .I456 1997]

daSilveira, P. (2003). Representation, secrecy, and accountability. Journal of Information Ethics, 12(1), 8-20. [UNC libraries]

Goodrum, A., & Manion, M. (2000). Th ethics of hacktivism. Journal of Information Ethics, 9(2), 51-59. [SILS]

Gore, A. (1995). Global information infrastructure: remarks as delivered to the International Telecommunications Union, Monday, March 21, 1994. In Johnson, D. G. & Nissenbaum, H. (Eds.), Computers, Ethics, and Social Values. Englewood Cliffs, NJ: Prentice-Hall, 620-628. [Davis - QA76.9 .A25 C6665 1995]

Gore, A. (1991). Infrastructure for the global village. Scientific American, 265(3), 150-153. [UL, M/P]

Hall, B.R. (2012). Google critique: An application of depoliticization theory. Technology in Society, 34(3), 251-255. [UNC libraries]

Kavanaugh, A., & Isenhour, P. (2006). Designing technology for local citizen deliberation. Journal of Community Informatics, 2(2). Available at http://www.ci-journal.net/viewarticle.php?id=192&layout=html

Michelfelder, D. P. (2004). Technological ethics in a different voice. In Kaplan, D. M. (ed.), Readings in the Philosophy of Technology. Lanham: Rowman & Littlefield, 273-283. [SILS - T14 .R39 2004]

Rheingold, H. (1993). Disinformocracy. In The Virtual Community: Homesteading on the Electronic Frontier. Reading, MA: Addison-Wesley, 276-300. [Davis - TK5105.5 .R48 1993]

Schiller, H. I. (1978). Computer systems: Power for whom and for what? Journal of Communication, 28(4), 184-193. [Davis - P87 .J6] Reprinted in Johnson, D. G., & Snapper, J. W. (1985). Ethical Issues in the Use of Computers. Belmont, CA: Wadsworth, 283-292. [Davis - QA76.9 .M65 E84 1985]

Tribe, L. H. (2004). The Constitution in cyberspace: Law and liberty beyond the electronic frontier. In Kaplan, D. M. (ed.), Readings in the Philosophy of Technology. Lanham: Rowman & Littlefield, 259-271. [SILS - T14 .R39 2004]


Return to INLS 584 Syllabus or INLS 584 Schedule


Creative Commons LicenseThe INLS 584 website, UNC-CH, 2013, is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License. Address all comments and questions to Barbara M. Wildemuth at wildemuth@unc.edu.
This page was last modified on September 11, 2013, by Barbara M. Wildemuth.