Angelopoulos, Christina. 2015. ‘Sketching the Outline of a Ghost: The Fair Balance between Copyright and Fundamental Rights in Intermediary Third Party Liability’. Info 17(6):72–96. doi: 10.1108/info-05-2015-0028.
Anon. n.d.-a. ‘A Declaration of the Independence of Cyberspace | Electronic Frontier Foundation’. Retrieved (https://www.eff.org/cyberspace-independence).
Anon. n.d.-b. ‘A Multi-Dimensional Approach to Disinformation : Report of the Independent High Level Group on Fake News and Online Disinformation.’
Anon. n.d.-c. ‘Addressing the Harm of Total Surveillance: A Reply to Professor Neil Richards - Harvard Law Review’.
Anon. n.d.-d. ‘Artificial Intelligence Committee, AI in the UK: Ready, Willing and Able? (HL 2018 - 100)’.
Anon. n.d.-e. ‘Centre for Information Policy Leadership, “The Central Role of Organisational Accountability in Data Protection”’.
Anon. n.d.-f. ‘Code of Practice on Disinformation’. Retrieved (https://ec.europa.eu/digital-single-market/en/news/code-practice-disinformation).
Anon. n.d.-g. ‘• E Laidlaw and H Young, Internet Intermediary Liability in Defamation: Proposals For Statutory Reform: Defamation Law in the Internet Age (2017)’.
Anon. n.d.-h. ‘• European Parliament Committee on Legal Affairs, “Report with Recommendations to the Commission on Civil Law Rules on Robotics” (2015/2103(INL)) A8-0005/27 January 2017’.
Anon. n.d.-i. ‘• House of Commons Digital, Culture, Media and Sport Committee, Disinformation and “Fake News”: Final Report HC 1791 Eighth Report of Session 2017–19’.
Anon. n.d.-j. ‘Science and Technology Committee, Robotics and Artificial Intelligence (HC 2016-145)’.
Anon. n.d.-k. ‘The EU-US Privacy Shield’.
Anon. n.d.-l. ‘UK ICO, “Big Data, Artificial Intelligence, Machine Learning and Data Protection” (2017)’.
Anon. n.d.-m. ‘UK ICO, “Big Data, Artificial Intelligence, Machine Learning and Data Protection” (2017)’.
Anon. n.d.-n. ‘Uniform Domain-Name Dispute-Resolution Policy - ICANN’. Retrieved (https://www.icann.org/resources/pages/help/dndr/udrp-en).
Arnot, J. A. n.d. ‘Navigating Cybersquatting Enforcement in the Expanding Internet’. John Marshall Review of Intellectual Property Law,.
Balkin, J. M. n.d. ‘Digital Speech and Democratic Culture: A Theory of Freedom of Expression for the Information Society’. New York University Law Review,.
Balkin, Jack M. n.d. ‘The Path of Robotics Law’.
Barendt, E. M. 2009. Freedom of Speech. 2nd ed. Oxford: Oxford University Press.
Barfield, Woodrow, and Ugo Pagallo, eds. 2018. Research Handbook on the Law of Artificial Intelligence. Cheltenham, UK: Edward Elgar Publishing.
Bernd Justin Jütte*. 2016. ‘The Beginning of a (Happy?) Relationship: Copyright and Freedom of Expression in Europe’. European Intellectual Property Review 38:11–22.
Brown, Ian, and Christopher T. Marsden. n.d. Regulating Code: Good Governance and Better Regulation in the Information Age. Cambridge, Mass: The MIT Press.
Bryson, Joanna J., Mihailis E. Diamantis, and Thomas D. Grant. 2017. ‘Of, for, and by the People: The Legal Lacuna of Synthetic Persons’. Artificial Intelligence and Law 25(3):273–91. doi: 10.1007/s10506-017-9214-9.
Calderoni, Francesco. 2010. ‘The European Legal Framework on Cybercrime: Striving for an Effective Implementation’. Crime, Law and Social Change 54(5):339–57. doi: 10.1007/s10611-010-9261-6.
Cameron, Iain. n.d. ‘A. Court of Justice Balancing Data Protection and Law Enforcement Needs: Tele2 Sverige and Watson’. Common Market Law Review 54(5):1467–95.
Cate, F. H., and V. Mayer-Schonberger. 2013. ‘Notice and Consent in a World of Big Data’. International Data Privacy Law 3(2):67–73. doi: 10.1093/idpl/ipt005.
Chesney, R.; Citron, D. n.d. ‘Deepfakes and the New Disinformation War: The Coming Age of Post-Truth Geopolitics’. Foreign Affairs,.
Clough, Jonathan. 2015. Principles of Cybercrime. Cambridge: Cambridge University Press.
Cohen, Julie E. n.d. Configuring the Networked Self: Law, Code, and the Play of Everyday Practice. New Haven [Conn.]: Yale University Press.
Davies, Gemma. 2018. ‘Court of Appeal High Court’. The Journal of Criminal Law 82(4):296–300. doi: 10.1177/0022018318791670.
Edwards, Lilian, ed. 2019a. Law, Policy, and the Internet. Oxford, UK: Hart Publishing.
Edwards, Lilian, ed. 2019b. Law, Policy, and the Internet. Oxford, UK: Hart Publishing.
Edwards, Lilian, ed. 2019c. Law, Policy, and the Internet. Oxford, UK: Hart Publishing.
Edwards, Lilian, ed. 2019d. Law, Policy, and the Internet. Oxford, UK: Hart Publishing.
Fafinski, Stefan. 2008. ‘Computer Misuse: The Implications of the Police and Justice Act 2006’. The Journal of Criminal Law 72(1):53–66. doi: 10.1350/jcla.2008.72.1.477.
Fafinski, Stefan. 2009a. Computer Misuse: Response, Regulation, and the Law. Cullompton, Devon: Willan Pub.
Fafinski, Stefan. 2009b. Computer Misuse: Response, Regulation, and the Law. Cullompton, Devon: Willan Pub.
Ferretti, Federico. n.d. ‘Data Protection and the Legitimate Interest of Data Controllers: Much Ado about Nothing or the Winter of Rights?’ Common Market Law Review 51(3):843–68.
Geiger, C.; Izyumenko, E. n.d. ‘The Role of Human Rights in Copyright Enforcement Online: Elaborating a Legal Framework for Website Blocking’. American University International Law Review,.
Geist, M. n.d. ‘Fair.Com: An Examination of the Allegations of Systemic Unfairness in the ICANN UDRP’. Brooklyn Journal of International Law,.
Gillespie, Alisdair A. 2019. Cybercrime: Key Issues and Debates. 2nd ed. Milton: Routledge.
Goldberg, D. n.d. ‘Responding to Fake News: Is There an Alternative to Law and Regulation’. Southwestern Law Review,.
Guihot, M.; Matthew, A. F.; Suzor, N. P. n.d. ‘Nudging Robots: Innovative Solutions to Regulate Artificial Intelligence’. Vanderbilt Journal of Entertainment & Technology Law,.
Holstein-Childress, V. n.d. ‘Lex Cyberus: The UDRP as a Gatekeeper to Judicial Resolution of Competing Rights to Domain Names’. Penn State Law Review,.
Johnson, David R., and David Post. 1996. ‘Law and Borders: The Rise of Law in Cyberspace’. Stanford Law Review 48(5). doi: 10.2307/1229390.
Klerman, D. n.d. ‘Forum Selling and Domain-Name Disputes’. Loyola University Chicago Law Journal,.
Koops, B. J. 2014. ‘The Trouble with European Data Protection Law’. International Data Privacy Law 4(4):250–61. doi: 10.1093/idpl/ipu023.
Kouvakas, I. n.d. ‘The Watson Case: Another Missed Opportunity for Stricto Sensu Proportionality’. Cambridge Law Review,.
Kuner, Christopher. 2017. ‘Reality and Illusion in EU Data Transfer Regulation Post’. German Law Journal 18(4):881–918. doi: 10.1017/S2071832200022197.
Laidlaw, Emily B. 2015a. Regulating Speech in Cyberspace. Cambridge: Cambridge University Press.
Laidlaw, Emily B. 2015b. Regulating Speech in Cyberspace: Gatekeepers, Human Rights and Corporate Responsibility. Cambridge, United Kingdom: Cambridge University Press.
Lane, Julia, Victoria Stodden, Stefan Bender, and Helen Fay Nissenbaum. 2014. Privacy, Big Data, and the Public Good: Frameworks for Engagement. Cambridge: Cambridge University Press.
Lawrence, Lessig. n.d.-a. ‘Code Version 2.0’. Retrieved (http://codev2.cc/download+remix/Lessig-Codev2.pdf).
Lawrence, Lessig. n.d.-b. ‘Code Version 2.0’. Retrieved (http://codev2.cc/download+remix/Lessig-Codev2.pdf).
Lazer, David M. J. 2018. ‘The Science of Fake News’. Science 359(6380):1094–96. doi: 10.1126/science.aao2998.
Lindsay, D. n.d. ‘Website Blocking Injunctions to Prevent Copyright Infringements: Proportionality and Effectiveness’. University of New South Wales Law Journal,.
Lodder, Arno R. and Puck Polter. 2017. ‘ISP Blocking and Filtering: On the Shallow Justification in Case Law Regarding Effectiveness of Measures’. European Journal of Law and Technology 8(2).
Lynskey, Orla. 2015. The Foundations of EU Data Protection Law. First edition. Oxford, United Kingdom: Oxford University Press.
Mac Sithigh, D. 2010. ‘More than Words: The Introduction of Internationalised Domain Names and the Reform of Generic Top-Level Domains at ICANN’. International Journal of Law and Information Technology 18(3):274–300. doi: 10.1093/ijlit/eaq007.
Mangan, David. 2015. ‘Regulating for Responsibility: Reputation and Social Media’. International Review of Law, Computers & Technology 29(1):16–32. doi: 10.1080/13600869.2015.1008960.
Mangan, David, and Lorna E. Gillies, eds. 2017. ‘An Unwholesome Layer Cake: Intermediary Liability in English Defamation and Data Protection Law’. in The Legal Challenges of Social Media.
Mantelero, Alessandro. 2014. ‘The Future of Consumer Data Protection in the E.U. Re-Thinking the "notice and Consent” Paradigm in the New Era of Predictive Analytics’. Computer Law & Security Review 30(6):643–60. doi: 10.1016/j.clsr.2014.09.004.
Mayer-Schonberger, V. n.d. ‘Demystifying Lessig’. Wisconsin Law Review ,.
Mayer-Schonberger, V.; Padova, Y. n.d. ‘Regime Change: Enabling Big Data through Europe’s New Data Protection Regulation’. Columbia Science and Technology Law Review,.
Mayer-Schönberger, Viktor, and Kenneth Cukier. 2013. Big Data: A Revolution That Will Transform How We Live, Work and Think. London: John Murray.
Michael, Williams, and Smith Rebecca. 2014. ‘‘Searching for the Silver Bullet: How Website Blocking Injunctions Are Changing Online IP Enforcement’. Australian Intellectual Property Journal 25.
Mills, Alex. 2015. ‘The Law Applicable to Cross-Border Defamation on Social Media: Whose Law Governs Free Speech in “Facebookistan”?’ Journal of Media Law 7(1):1–35. doi: 10.1080/17577632.2015.1055942.
Murray, Andrew. 2019a. Information Technology Law: The Law & Society. 4th edition. Oxford: Oxford University Press.
Murray, Andrew. 2019b. Information Technology Law: The Law & Society. 4th edition. Oxford: Oxford University Press.
Murray, Andrew. 2019c. Information Technology Law: The Law & Society. 4th edition. Oxford: Oxford University Press.
Murray, Andrew. 2019d. Information Technology Law: The Law & Society. 4th edition. Oxford: Oxford University Press.
Murray, Andrew. 2019e. Information Technology Law: The Law & Society. 4th edition. Oxford: Oxford University Press.
Murray, Andrew. 2019f. Information Technology Law: The Law & Society. 4th edition. Oxford: Oxford University Press.
Murray, Andrew. 2019g. Information Technology Law: The Law & Society. 4th edition. Oxford: Oxford University Press.
Murray, Andrew. 2019h. Information Technology Law: The Law & Society. 4th edition. Oxford: Oxford University Press.
Murray, Andrew. 2019i. Information Technology Law: The Law & Society. 4th edition. Oxford: Oxford University Press.
Murray, Andrew. 2019j. Information Technology Law: The Law & Society. 4th edition. Oxford: Oxford University Press.
Murray, Andrew. 2019k. Information Technology Law: The Law & Society. 4th edition. Oxford: Oxford University Press.
Napoli, P. M. n.d. ‘What If More Speech Is No Longer the Solution: First Amendment Theory Meets Fake News and the Filter Bubble’. Federal Communications Law Journal,.
Ni Loideain, Nora. 2015. ‘EU Law and Mass Internet Metadata Surveillance in the Post-Snowden Era’. Media and Communication 3(2). doi: 10.17645/mac.v3i2.297.
Nissenbaum, Helen Fay. 2010a. Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford, Calif: Stanford Law Books.
Nissenbaum, Helen Fay. 2010b. Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford, Calif: Stanford Law Books.
Polański, Paul Przemysław. 2018. ‘Rethinking the Notion of Hosting in the Aftermath of Delfi: Shifting from Liability to Responsibility?’ Computer Law & Security Review 34(4):870–80. doi: 10.1016/j.clsr.2018.05.034.
Polonetsky, J.; Tene, O. n.d. ‘Privacy and Big Data: Making Ends Meet’. Stanford Law Review Online,.
Post, David G. 2000. ‘What Larry Doesn’t Get: Code, Law, and Liberty in Cyberspace’. Stanford Law Review 52(5). doi: 10.2307/1229518.
Poullet, Yves. 2018. ‘Is the General Data Protection Regulation the Solution?’ Computer Law & Security Review 34(4):773–78. doi: 10.1016/j.clsr.2018.05.021.
Powles, J. n.d. ‘The Case That Won’t Be Forgotten’. Loyola University Chicago Law Journal,.
Raab, Charles, and Ivan Szekely. 2017. ‘Data Protection Authorities and Information Technology’. Computer Law & Security Review 33(4):421–33. doi: 10.1016/j.clsr.2017.05.002.
Reed, Chris. 2012. Making Laws for Cyberspace. 1st ed. Oxford, U.K.: Oxford University Press.
Reed, Chris. 2018. ‘How Should We Regulate Artificial Intelligence?’ Philosophical Transactions. Series A, Mathematical, Physical, and Engineering Sciences 376(2128).
Reidenberg, J. R. n.d. ‘Lex Informatica:  The Formulation of Information Policy Rules through Technology’. Texas Law Review,.
Richards, Neil M.1 (AUTHOR). 2013. ‘THE DANGERS OF SURVEILLANCE.’ Harvard Law Review 126(Issue 7):1934–65.
Rowland, Diane, and et al., eds. 2017. Information Technology Law. Fifth edition. Abingdon: Routledge.
Rowland, Diane, Uta Kohl, and Andrew Charlesworth. 2017a. Information Technology Law. Fifth edition. Abingdon, Oxon: Routledge.
Rowland, Diane, Uta Kohl, and Andrew Charlesworth. 2017b. Information Technology Law. Fifth edition. Abingdon, Oxon: Routledge.
Rowland, Diane, Uta Kohl, and Andrew Charlesworth. 2017c. Information Technology Law. Fifth edition. Abingdon, Oxon: Routledge.
Rowland, Diane, Uta Kohl, and Andrew Charlesworth. 2017d. Information Technology Law. Fifth edition. Abingdon, Oxon: Routledge.
Rowland, Diane, Uta Kohl, and Andrew Charlesworth. 2017e. Information Technology Law. Fifth edition. Abingdon, Oxon: Routledge.
Rowland, Diane, Uta Kohl, and Andrew Charlesworth. 2017f. Information Technology Law. Fifth edition. Abingdon, Oxon: Routledge.
Rowland, Diane, Uta Kohl, and Andrew Charlesworth. 2017g. Information Technology Law. Fifth edition. Abingdon, Oxon: Routledge.
Rowland, Diane, Uta Kohl, and Andrew Charlesworth. 2017h. Information Technology Law. Fifth edition. Abingdon, Oxon: Routledge.
Rowland, Diane, Uta Kohl, and Andrew Charlesworth. 2017i. Information Technology Law. Fifth edition. Abingdon, Oxon: Routledge.
Rowland, Diane, Uta Kohl, and Andrew Charlesworth. 2017j. Information Technology Law. Fifth edition. Abingdon, Oxon: Routledge.
Rubinstein, I. S. 2013. ‘Big Data: The End of Privacy or a New Beginning?’ International Data Privacy Law 3(2):74–87. doi: 10.1093/idpl/ips036.
Ryan Calo. 2015. ‘Robotics and the Lessons of Cyberlaw’. California Law Review 103(3).
Solove, D. J. n.d. ‘I’ve Got Nothing to Hide and Other Misunderstandings of Privacy’. San Diego Law Review,.
Synodinou, Tatiana-Eleni. 2015. ‘Intermediaries’ Liability for Online Copyright Infringement in the EU: Evolutions and Confusions’. Computer Law & Security Review 31(1):57–67. doi: 10.1016/j.clsr.2014.11.010.
Thompson, M. n.d. ‘Beyond Gatekeeping: The Normative Responsibility of Internet Intermediaries’. Vanderbilt Journal of Entertainment & Technology Law,.
van der Sloot, B.; van Schendel, S. n.d. ‘Ten Questions for Future Regulation of Big Data: A Comparative and Empirical Legal Study’. Journal of Intellectual Property, Information Technology and Electronic Commerce Law,.
Veale, Michael, Reuben Binns, and Jef Ausloos. 2018. ‘When Data Protection by Design and Data Subject Rights Clash’. International Data Privacy Law 8(2):105–23. doi: 10.1093/idpl/ipy002.
Vranaki, A. A. n.d.-a. ‘Learning Lessons from Cloud Investigations in Europe: Bargaining Enforcement and Multiple Centers of Regulation in Data Protection’. University of Illinois Journal of Law, Technology & Policy,.
Vranaki, A. A. n.d.-b. ‘Regulating Social Networking Sites: Facebook, Online Behavioral Advertising, Data Protection Laws and Powe’. Rutgers Computer and Technology Law Journal,.
Vranaki, A. A. n.d.-c. ‘Regulating Social Networking Sites: Facebook, Online Behavioral Advertising, Data Protection Laws and Powe’. Rutgers Computer and Technology Law Journal,.
Vranaki, Asma A. I. 2016. ‘Cloud Investigations by European Data Protection Authorities: An Empirical Account’. in Research handbook on electronic commercelaw, edited by J. A. Rothchild.
Wachter, S.; Mittelstadt, B. n.d. ‘A Right to Reasonable Inferences: Re-Thinking Data Protection Law in the Age of Big Data and AI’. Columbia Business Law Review,.
Walden, Ian. 2016. Computer Crimes and Digital Investigations. 2nd edition. Oxford: Oxford University Press.