A Declaration of the Independence of Cyberspace | Electronic Frontier Foundation. (n.d.). https://www.eff.org/cyberspace-independence
A multi-dimensional approach to disinformation : report of the independent High level Group on fake news and online disinformation. (n.d.). https://publications.europa.eu/en/publication-detail/-/publication/6ef4df8b-4cea-11e8-be1d-01aa75ed71a1
Addressing the Harm of Total Surveillance: A Reply to Professor Neil Richards - Harvard Law Review. (n.d.). https://harvardlawreview.org/2013/06/addressing-the-harm-of-total-surveillance-a-reply-to-professor-neil-richards/
Angelopoulos, C. (2015). Sketching the outline of a ghost: the fair balance between copyright and fundamental rights in intermediary third party liability. Info, 17(6), 72–96. https://doi.org/10.1108/info-05-2015-0028
Arnot, J. A. (n.d.). Navigating Cybersquatting Enforcement in the Expanding Internet. John Marshall Review of Intellectual Property Law,. http://heinonline.org/HOL/Page?public=false&handle=hein.journals/johnmars13&id=329
Artificial Intelligence Committee, AI in the UK: Ready, Willing and Able? (HL 2018 - 100). (n.d.). https://publications.parliament.uk/pa/ld201719/ldselect/ldai/100/100.pdf
Balkin, J. M. (n.d.). Digital Speech and Democratic Culture: A Theory of Freedom of Expression for the Information Society. New York University Law Review,. http://heinonline.org/HOL/Page?public=false&handle=hein.journals/nylr79&id=15
Balkin, Jack M. (n.d.). The Path of Robotics Law. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2586570
Barendt, E. M. (2009). Freedom of speech (2nd ed). Oxford University Press.
Barfield, W., & Pagallo, U. (Eds.). (2018). Research handbook on the law of artificial intelligence. Edward Elgar Publishing. https://www.elgaronline.com/view/edcoll/9781786439048/9781786439048.xml
Bernd Justin Jütte*. (2016). The beginning of a (happy?) relationship: copyright and freedom of expression in Europe. European Intellectual Property Review, 38, 11–22. http://signon.thomsonreuters.com/federation/UKF?entityID=https%3A%2F%2Fidp.bris.ac.uk%2Fshibboleth&returnto=https%3A%2F%2Fwestlawuk.thomsonreuters.co.uk%2FBrowse%2FHome%2FWestlawUK%3FskipAnonymous%3Dtrue
Brown, I., & Marsden, C. T. (n.d.). Regulating code: good governance and better regulation in the information age. The MIT Press.
Bryson, J. J., Diamantis, M. E., & Grant, T. D. (2017). Of, for, and by the people: the legal lacuna of synthetic persons. Artificial Intelligence and Law, 25(3), 273–291. https://doi.org/10.1007/s10506-017-9214-9
Calderoni, F. (2010). The European legal framework on cybercrime: striving for an effective implementation. Crime, Law and Social Change, 54(5), 339–357. https://doi.org/10.1007/s10611-010-9261-6
Cameron, Iain. (n.d.). A. Court of Justice Balancing data protection and law enforcement needs: Tele2 Sverige and Watson. Common Market Law Review, 54(5), 1467–1495. http://www.kluwerlawonline.com/abstract.php?area=Journals&id=COLA2017119
Cate, F. H., & Mayer-Schonberger, V. (2013). Notice and consent in a world of Big Data. International Data Privacy Law, 3(2), 67–73. https://doi.org/10.1093/idpl/ipt005
Centre for Information Policy Leadership, ‘The Central Role of Organisational Accountability in Data Protection’. (n.d.). https://www.informationpolicycentre.com/uploads/5/7/1/0/57104281/cipl_accountability_paper_1_-_the_case_for_accountability_-_how_it_enables_effective_data_protection_and_trust_in_the_digital_society.pdf
Chesney, R.; Citron, D. (n.d.). Deepfakes and the New Disinformation War: The Coming Age of Post-Truth Geopolitics. Foreign Affairs,. http://heinonline.org/HOL/Page?public=false&handle=hein.journals/fora98&id=1
Clough, J. (2015). Principles of Cybercrime. Cambridge University Press. https://doi.org/10.1017/CBO9781139540803
Code of Practice on Disinformation. (n.d.). https://ec.europa.eu/digital-single-market/en/news/code-practice-disinformation
Cohen, J. E. (n.d.). Configuring the networked self: law, code, and the play of everyday practice. Yale University Press.
Davies, G. (2018). Court of Appeal High Court. The Journal of Criminal Law, 82(4), 296–300. https://doi.org/10.1177/0022018318791670
• E Laidlaw and H Young, Internet Intermediary Liability in Defamation: Proposals For Statutory Reform: Defamation Law in the Internet Age (2017). (n.d.). http://www.lco-cdo.org/wp-content/uploads/2017/07/DIA-Commissioned-Paper-Laidlaw-and-Young.pdf
Edwards, L. (Ed.). (2019a). Law, policy, and the Internet. Hart Publishing.
Edwards, L. (Ed.). (2019b). Law, policy, and the Internet. Hart Publishing.
Edwards, L. (Ed.). (2019c). Law, policy, and the Internet. Hart Publishing.
Edwards, L. (Ed.). (2019d). Law, policy, and the Internet. Hart Publishing.
• European Parliament Committee on Legal Affairs, ‘Report with Recommendations to the Commission on Civil Law Rules on Robotics’ (2015/2103(INL)) A8-0005/27 January 2017. (n.d.). http://www.europarl.europa.eu/doceo/document/A-8-2017-0005_EN.html
Fafinski, S. (2008). Computer Misuse: The Implications of the Police and Justice Act 2006. The Journal of Criminal Law, 72(1), 53–66. https://doi.org/10.1350/jcla.2008.72.1.477
Fafinski, S. (2009a). Computer misuse: response, regulation, and the law. Willan Pub.
Fafinski, S. (2009b). Computer misuse: response, regulation, and the law. Willan Pub.
Ferretti, Federico. (n.d.). Data protection and the legitimate interest of data controllers: Much ado about nothing or the winter of rights? Common Market Law Review, 51(3), 843–868. http://www.kluwerlawonline.com/abstract.php?area=Journals&id=COLA2014063
Geiger, C.; Izyumenko, E. (n.d.). The Role of Human Rights in Copyright Enforcement Online: Elaborating a Legal Framework for Website Blocking. American University International Law Review,. http://heinonline.org/HOL/Page?public=false&handle=hein.journals/amuilr32&id=1
Geist, M. (n.d.). Fair.Com: An Examination of the Allegations of Systemic Unfairness in the ICANN UDRP. Brooklyn Journal of International Law,. http://heinonline.org/HOL/Page?public=false&handle=hein.journals/bjil27&id=915
Gillespie, A. A. (2019). Cybercrime: Key Issues and Debates (2nd ed). Routledge.
Goldberg, D. (n.d.). Responding to Fake News: Is There an Alternative to Law and Regulation. Southwestern Law Review,. http://heinonline.org/HOL/Page?public=false&handle=hein.journals/swulr47&id=1
Guihot, M.; Matthew, A. F.; Suzor, N. P. (n.d.). Nudging Robots: Innovative Solutions to Regulate Artificial Intelligence. Vanderbilt Journal of Entertainment & Technology Law,. http://heinonline.org/HOL/Page?public=false&handle=hein.journals/vanep20&id=1
Holstein-Childress, V. (n.d.). Lex Cyberus: The UDRP as a Gatekeeper to Judicial Resolution of Competing Rights to Domain Names. Penn State Law Review,. http://heinonline.org/HOL/Page?public=false&handle=hein.journals/dlr109&id=575
• House of Commons Digital, Culture, Media and Sport Committee, Disinformation and ‘fake news’: Final Report HC 1791 Eighth Report of Session 2017–19. (n.d.). https://publications.parliament.uk/pa/cm201719/cmselect/cmcumeds/1791/1791.pdf
Johnson, D. R., & Post, D. (1996). Law and Borders: The Rise of Law in Cyberspace. Stanford Law Review, 48(5). https://doi.org/10.2307/1229390
Klerman, D. (n.d.). Forum Selling and Domain-Name Disputes. Loyola University Chicago Law Journal,. http://heinonline.org/HOL/Page?public=false&handle=hein.journals/luclj48&id=1
Koops, B.-J. (2014). The trouble with European data protection law. International Data Privacy Law, 4(4), 250–261. https://doi.org/10.1093/idpl/ipu023
Kouvakas, I. (n.d.). The Watson Case: Another Missed Opportunity for Stricto Sensu Proportionality. Cambridge Law Review,. http://heinonline.org/HOL/Page?public=false&handle=hein.journals/cambrilv2&id=181
Kuner, C. (2017). Reality and Illusion in EU Data Transfer Regulation Post. German Law Journal, 18(4), 881–918. https://doi.org/10.1017/S2071832200022197
Laidlaw, E. B. (2015a). Regulating Speech in Cyberspace. Cambridge University Press. https://doi.org/10.1017/CBO9781107278721
Laidlaw, E. B. (2015b). Regulating speech in cyberspace: gatekeepers, human rights and corporate responsibility. Cambridge University Press.
Lane, J., Stodden, V., Bender, S., & Nissenbaum, H. F. (2014). Privacy, big data, and the public good: frameworks for engagement. Cambridge University Press.
Lawrence, L. (n.d.-a). Code Version 2.0. http://codev2.cc/download+remix/Lessig-Codev2.pdf
Lawrence, L. (n.d.-b). Code Version 2.0. http://codev2.cc/download+remix/Lessig-Codev2.pdf
Lazer, D. M. J. (2018). The science of fake news. Science, 359(6380), 1094–1096. https://doi.org/10.1126/science.aao2998
Lindsay, D. (n.d.). Website Blocking Injunctions to Prevent Copyright Infringements: Proportionality and Effectiveness. University of New South Wales Law Journal,. http://heinonline.org/HOL/Page?public=false&handle=hein.journals/swales40&id=1528
Lodder, A. R. & Puck Polter. (2017). ISP blocking and filtering: on the shallow justification in case law regarding effectiveness of measures. European Journal of Law and Technology, 8(2). http://ejlt.org/article/view/517
Lynskey, O. (2015). The foundations of EU data protection law (First edition). Oxford University Press.
Mac Sithigh, D. (2010). More than words: the introduction of internationalised domain names and the reform of generic top-level domains at ICANN. International Journal of Law and Information Technology, 18(3), 274–300. https://doi.org/10.1093/ijlit/eaq007
Mangan, D. (2015). Regulating for responsibility: reputation and social media. International Review of Law, Computers & Technology, 29(1), 16–32. https://doi.org/10.1080/13600869.2015.1008960
Mangan, D., & Gillies, L. E. (Eds.). (2017). An unwholesome layer cake: intermediary liability in English defamation and data protection law. In The Legal Challenges of Social Media. https://www.elgaronline.com/view/edcoll/9781785364501/9781785364501.00025.xml
Mantelero, A. (2014). The future of consumer data protection in the E.U. Re-thinking the "notice and consent” paradigm in the new era of predictive analytics. Computer Law & Security Review, 30(6), 643–660. https://doi.org/10.1016/j.clsr.2014.09.004
Mayer-Schonberger, V. (n.d.). Demystifying Lessig. Wisconsin Law Review
,. http://heinonline.org/HOL/Page?public=false&handle=hein.journals/wlr2008&id=725
Mayer-Schönberger, V., & Cukier, K. (2013). Big data: a revolution that will transform how we live, work and think. John Murray.
Mayer-Schonberger, V.; Padova, Y. (n.d.). Regime Change: Enabling Big Data through Europe’s New Data Protection Regulation. Columbia Science and Technology Law Review,. http://heinonline.org/HOL/Page?public=false&handle=hein.journals/cstlr17&id=1
Michael, W., & Rebecca, S. (2014). ‘Searching for the Silver Bullet: How Website Blocking Injunctions are Changing Online IP Enforcement. Australian Intellectual Property Journal, 25.
Mills, A. (2015). The law applicable to cross-border defamation on social media: whose law governs free speech in ‘Facebookistan’? Journal of Media Law, 7(1), 1–35. https://doi.org/10.1080/17577632.2015.1055942
Murray, A. (2019a). Information technology law: the law & society (4th edition). Oxford University Press.
Murray, A. (2019b). Information technology law: the law & society (4th edition). Oxford University Press.
Murray, A. (2019c). Information technology law: the law & society (4th edition). Oxford University Press.
Murray, A. (2019d). Information technology law: the law & society (4th edition). Oxford University Press.
Murray, A. (2019e). Information technology law: the law & society (4th edition). Oxford University Press.
Murray, A. (2019f). Information technology law: the law & society (4th edition). Oxford University Press.
Murray, A. (2019g). Information technology law: the law & society (4th edition). Oxford University Press.
Murray, A. (2019h). Information technology law: the law & society (4th edition). Oxford University Press.
Murray, A. (2019i). Information technology law: the law & society (4th edition). Oxford University Press.
Murray, A. (2019j). Information technology law: the law & society (4th edition). Oxford University Press.
Murray, A. (2019k). Information technology law: the law & society (4th edition). Oxford University Press.
Napoli, P. M. (n.d.). What If More Speech Is No Longer the Solution: First Amendment Theory Meets Fake News and the Filter Bubble. Federal Communications Law Journal,. http://heinonline.org/HOL/Page?public=false&handle=hein.journals/fedcom70&id=67
Ni Loideain, N. (2015). EU Law and Mass Internet Metadata Surveillance in the Post-Snowden Era. Media and Communication, 3(2). https://doi.org/10.17645/mac.v3i2.297
Nissenbaum, H. F. (2010a). Privacy in context: technology, policy, and the integrity of social life. Stanford Law Books.
Nissenbaum, H. F. (2010b). Privacy in context: technology, policy, and the integrity of social life. Stanford Law Books.
Polański, P. P. (2018). Rethinking the notion of hosting in the aftermath of Delfi: Shifting from liability to responsibility? Computer Law & Security Review, 34(4), 870–880. https://doi.org/10.1016/j.clsr.2018.05.034
Polonetsky, J.; Tene, O. (n.d.). Privacy and Big Data: Making Ends Meet. Stanford Law Review Online,. http://heinonline.org/HOL/Page?public=false&handle=hein.journals/slro66&id=25
Post, D. G. (2000). What Larry Doesn’t Get: Code, Law, and Liberty in Cyberspace. Stanford Law Review, 52(5). https://doi.org/10.2307/1229518
Poullet, Y. (2018). Is the general data protection regulation the solution? Computer Law & Security Review, 34(4), 773–778. https://doi.org/10.1016/j.clsr.2018.05.021
Powles, J. (n.d.). The Case That Won’t Be Forgotten. Loyola University Chicago Law Journal,. http://heinonline.org/HOL/Page?public=false&handle=hein.journals/luclj47&id=1
Raab, C., & Szekely, I. (2017). Data protection authorities and information technology. Computer Law & Security Review, 33(4), 421–433. https://doi.org/10.1016/j.clsr.2017.05.002
Reed, C. (2012). Making laws for cyberspace (1st ed). Oxford University Press.
Reed, C. (2018). How should we regulate artificial intelligence? Philosophical Transactions. Series A, Mathematical, Physical, and Engineering Sciences, 376(2128). https://royalsocietypublishing.org/doi/full/10.1098/rsta.2017.0360
Reidenberg, J. R. (n.d.). Lex Informatica: The Formulation of Information Policy Rules through Technology. Texas Law Review,. http://heinonline.org/HOL/Page?public=false&handle=hein.journals/tlr76&id=571
Richards, Neil M.1 (AUTHOR). (2013). THE DANGERS OF SURVEILLANCE. Harvard Law Review, 126(Issue 7), 1934–1965. http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=87598612&site=ehost-live
Rowland, D., & et al. (Eds.). (2017). Information Technology Law (Fifth edition). Routledge. https://doi.org/10.4324/9780203798522
Rowland, D., Kohl, U., & Charlesworth, A. (2017a). Information technology law (Fifth edition). Routledge.
Rowland, D., Kohl, U., & Charlesworth, A. (2017b). Information technology law (Fifth edition). Routledge.
Rowland, D., Kohl, U., & Charlesworth, A. (2017c). Information technology law (Fifth edition). Routledge.
Rowland, D., Kohl, U., & Charlesworth, A. (2017d). Information technology law (Fifth edition). Routledge.
Rowland, D., Kohl, U., & Charlesworth, A. (2017e). Information technology law (Fifth edition). Routledge.
Rowland, D., Kohl, U., & Charlesworth, A. (2017f). Information technology law (Fifth edition). Routledge.
Rowland, D., Kohl, U., & Charlesworth, A. (2017g). Information technology law (Fifth edition). Routledge.
Rowland, D., Kohl, U., & Charlesworth, A. (2017h). Information technology law (Fifth edition). Routledge.
Rowland, D., Kohl, U., & Charlesworth, A. (2017i). Information technology law (Fifth edition). Routledge.
Rowland, D., Kohl, U., & Charlesworth, A. (2017j). Information technology law (Fifth edition). Routledge.
Rubinstein, I. S. (2013). Big Data: The End of Privacy or a New Beginning? International Data Privacy Law, 3(2), 74–87. https://doi.org/10.1093/idpl/ips036
Ryan Calo. (2015). Robotics and the Lessons of Cyberlaw. California Law Review, 103(3). https://www.jstor.org/stable/24758483?seq=1#metadata_info_tab_contents
Science and Technology Committee, Robotics and Artificial Intelligence (HC 2016-145). (n.d.). https://publications.parliament.uk/pa/cm201617/cmselect/cmsctech/145/14502.htm
Solove, D. J. (n.d.). I’ve Got Nothing to Hide and Other Misunderstandings of Privacy. San Diego Law Review,. http://heinonline.org/HOL/Page?public=false&handle=hein.journals/sanlr44&id=1
Synodinou, T.-E. (2015). Intermediaries’ liability for online copyright infringement in the EU: Evolutions and confusions. Computer Law & Security Review, 31(1), 57–67. https://doi.org/10.1016/j.clsr.2014.11.010
The EU-US Privacy Shield. (n.d.). https://iapp.org/media/pdf/resource_center/eu_us_privacy_shield_full_text.pdf.pdf
Thompson, M. (n.d.). Beyond Gatekeeping: The Normative Responsibility of Internet Intermediaries. Vanderbilt Journal of Entertainment & Technology Law,. http://heinonline.org/HOL/Page?public=false&handle=hein.journals/vanep18&id=807
UK ICO, ‘Big Data, Artificial Intelligence, Machine Learning and Data Protection’ (2017). (n.d.-a). https://ico.org.uk/media/for-organisations/documents/2013559/big-data-ai-ml-and-data-protection.pdf
UK ICO, ‘Big Data, Artificial Intelligence, Machine Learning and Data Protection’ (2017). (n.d.-b). https://ico.org.uk/media/for-organisations/documents/2013559/big-data-ai-ml-and-data-protection.pdf
Uniform Domain-Name Dispute-Resolution Policy - ICANN. (n.d.). https://www.icann.org/resources/pages/help/dndr/udrp-en
van der Sloot, B.; van Schendel, S. (n.d.). Ten Questions for Future Regulation of Big Data: A Comparative and Empirical Legal Study. Journal of Intellectual Property, Information Technology and Electronic Commerce Law,. http://heinonline.org/HOL/Page?public=false&handle=hein.journals/jipitec7&id=116
Veale, M., Binns, R., & Ausloos, J. (2018). When data protection by design and data subject rights clash. International Data Privacy Law, 8(2), 105–123. https://doi.org/10.1093/idpl/ipy002
Vranaki, A. A. (n.d.-a). Learning Lessons from Cloud Investigations in Europe: Bargaining Enforcement and Multiple Centers of Regulation in Data Protection. University of Illinois Journal of Law, Technology & Policy,. http://heinonline.org/HOL/Page?public=false&handle=hein.journals/jltp2016&id=1
Vranaki, A. A. (n.d.-b). Regulating Social Networking Sites: Facebook, Online Behavioral Advertising, Data Protection Laws and Powe. Rutgers Computer and Technology Law Journal,. http://heinonline.org/HOL/Page?public=false&handle=hein.journals/rutcomt43&id=1
Vranaki, A. A. (n.d.-c). Regulating Social Networking Sites: Facebook, Online Behavioral Advertising, Data Protection Laws and Powe. Rutgers Computer and Technology Law Journal,. http://heinonline.org/HOL/Page?public=false&handle=hein.journals/rutcomt43&id=1
Vranaki, A. A. I. (2016). Cloud investigations by European data protection authorities: an empirical account. In J. A. Rothchild (Ed.), Research handbook on electronic commercelaw. https://www.elgaronline.com/view/edcoll/9781783479917/9781783479917.00045.xml
Wachter, S.; Mittelstadt, B. (n.d.). A Right to Reasonable Inferences: Re-Thinking Data Protection Law in the Age of Big Data and AI. Columbia Business Law Review,. http://heinonline.org/HOL/Page?public=false&handle=hein.journals/colb2019&id=1
Walden, I. (2016). Computer crimes and digital investigations (2nd edition). Oxford University Press.