@article{Angelopoulos_2015, title={Sketching the outline of a ghost: the fair balance between copyright and fundamental rights in intermediary third party liability}, volume={17}, DOI={10.1108/info-05-2015-0028}, number={6}, journal={info}, author={Angelopoulos, Christina}, year={2015}, month={Sep}, pages={72–96} }
@article{Arnot, J. A., title={Navigating Cybersquatting Enforcement in the Expanding Internet}, url={http://heinonline.org/HOL/Page?public=false&handle=hein.journals/johnmars13&id=329}, journal={John Marshall Review of Intellectual Property Law,}, author={Arnot, J. A.} }
@article{Balkin, J. M., title={Digital Speech and Democratic Culture: A Theory of Freedom of Expression for the Information Society}, url={http://heinonline.org/HOL/Page?public=false&handle=hein.journals/nylr79&id=15}, journal={New York University Law Review,}, author={Balkin, J. M.} }
@article{Balkin, Jack M., title={The Path of Robotics Law}, url={https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2586570}, author={Balkin, Jack M.} }
@book{Barendt_2009, address={Oxford}, edition={2nd ed}, title={Freedom of speech}, publisher={Oxford University Press}, author={Barendt, E. M.}, year={2009} }
@article{Bernd Justin Jütte*_2016, title={The beginning of a (happy?) relationship: copyright and freedom of expression in Europe}, volume={38}, url={http://signon.thomsonreuters.com/federation/UKF?entityID=https%3A%2F%2Fidp.bris.ac.uk%2Fshibboleth&returnto=https%3A%2F%2Fwestlawuk.thomsonreuters.co.uk%2FBrowse%2FHome%2FWestlawUK%3FskipAnonymous%3Dtrue}, journal={European Intellectual Property Review}, author={Bernd Justin Jütte*}, year={2016}, pages={11–22} }
@book{Brown_Marsden, address={Cambridge, Mass}, title={Regulating code: good governance and better regulation in the information age}, publisher={The MIT Press}, author={Brown, Ian and Marsden, Christopher T.} }
@article{Bryson_Diamantis_Grant_2017, title={Of, for, and by the people: the legal lacuna of synthetic persons}, volume={25}, DOI={10.1007/s10506-017-9214-9}, number={3}, journal={Artificial Intelligence and Law}, author={Bryson, Joanna J. and Diamantis, Mihailis E. and Grant, Thomas D.}, year={2017}, month={Sep}, pages={273–291} }
@article{Calderoni_2010, title={The European legal framework on cybercrime: striving for an effective implementation}, volume={54}, DOI={10.1007/s10611-010-9261-6}, number={5}, journal={Crime, Law and Social Change}, author={Calderoni, Francesco}, year={2010}, month={Dec}, pages={339–357} }
@article{Cameron, Iain, title={A. Court of Justice Balancing data protection and law enforcement needs: Tele2 Sverige and Watson}, volume={54}, url={http://www.kluwerlawonline.com/abstract.php?area=Journals&id=COLA2017119}, number={5}, journal={Common Market Law Review}, publisher={Kluwer Law International}, author={Cameron, Iain}, pages={1467–1495} }
@article{Cate_Mayer-Schonberger_2013, title={Notice and consent in a world of Big Data}, volume={3}, DOI={10.1093/idpl/ipt005}, number={2}, journal={International Data Privacy Law}, author={Cate, F. H. and Mayer-Schonberger, V.}, year={2013}, month={May}, pages={67–73} }
@article{Chesney, R.; Citron, D., title={Deepfakes and the New Disinformation War: The Coming Age of Post-Truth Geopolitics}, url={http://heinonline.org/HOL/Page?public=false&handle=hein.journals/fora98&id=1}, journal={Foreign Affairs,}, author={Chesney, R.; Citron, D.} }
@book{Clough_2015, address={Cambridge}, title={Principles of Cybercrime}, url={http://ebooks.cambridge.org/ref/id/CBO9781139540803}, DOI={10.1017/CBO9781139540803}, publisher={Cambridge University Press}, author={Clough, Jonathan}, year={2015} }
@book{Cohen, address={New Haven [Conn.]}, title={Configuring the networked self: law, code, and the play of everyday practice}, publisher={Yale University Press}, author={Cohen, Julie E.} }
@article{Davies_2018, title={Court of Appeal High Court}, volume={82}, DOI={10.1177/0022018318791670}, number={4}, journal={The Journal of Criminal Law}, author={Davies, Gemma}, year={2018}, month={Aug}, pages={296–300} }
@article{Fafinski_2008, title={Computer Misuse: The Implications of the Police and Justice Act 2006}, volume={72}, DOI={10.1350/jcla.2008.72.1.477}, number={1}, journal={The Journal of Criminal Law}, author={Fafinski, Stefan}, year={2008}, month={Feb}, pages={53–66} }
@book{Fafinski_2009a, address={Cullompton, Devon}, title={Computer misuse: response, regulation, and the law}, publisher={Willan Pub}, author={Fafinski, Stefan}, year={2009} }
@book{Fafinski_2009b, address={Cullompton, Devon}, title={Computer misuse: response, regulation, and the law}, publisher={Willan Pub}, author={Fafinski, Stefan}, year={2009} }
@article{Ferretti, Federico, title={Data protection and the legitimate interest of data controllers: Much ado about nothing or the winter of rights?}, volume={51}, url={http://www.kluwerlawonline.com/abstract.php?area=Journals&id=COLA2014063}, number={3}, journal={Common Market Law Review}, publisher={Kluwer Law International}, author={Ferretti, Federico}, pages={843–868} }
@article{Geiger, C.; Izyumenko, E., title={The Role of Human Rights in Copyright Enforcement Online: Elaborating a Legal Framework for Website Blocking}, url={http://heinonline.org/HOL/Page?public=false&handle=hein.journals/amuilr32&id=1}, journal={American University International Law Review,}, author={Geiger, C.; Izyumenko, E.} }
@article{Geist, M., title={Fair.Com: An Examination of the Allegations of Systemic Unfairness in the ICANN UDRP}, url={http://heinonline.org/HOL/Page?public=false&handle=hein.journals/bjil27&id=915}, journal={Brooklyn Journal of International Law,}, author={Geist, M.} }
@book{Gillespie_2019, address={Milton}, edition={2nd ed}, title={Cybercrime: Key Issues and Debates}, publisher={Routledge}, author={Gillespie, Alisdair A.}, year={2019} }
@article{Goldberg, D., title={Responding to Fake News: Is There an Alternative to Law and Regulation}, url={http://heinonline.org/HOL/Page?public=false&handle=hein.journals/swulr47&id=1}, journal={Southwestern Law Review,}, author={Goldberg, D.} }
@article{Guihot, M.; Matthew, A. F.; Suzor, N. P., title={Nudging Robots: Innovative Solutions to Regulate Artificial Intelligence}, url={http://heinonline.org/HOL/Page?public=false&handle=hein.journals/vanep20&id=1}, journal={Vanderbilt Journal of Entertainment & Technology Law,}, author={Guihot, M.; Matthew, A. F.; Suzor, N. P.} }
@article{Holstein-Childress, V., title={Lex Cyberus: The UDRP as a Gatekeeper to Judicial Resolution of Competing Rights to Domain Names}, url={http://heinonline.org/HOL/Page?public=false&handle=hein.journals/dlr109&id=575}, journal={Penn State Law Review,}, author={Holstein-Childress, V.} }
@article{Johnson_Post_1996, title={Law and Borders: The Rise of Law in Cyberspace}, volume={48}, DOI={10.2307/1229390}, number={5}, journal={Stanford Law Review}, author={Johnson, David R. and Post, David}, year={1996}, month={May} }
@article{Klerman, D., title={Forum Selling and Domain-Name Disputes}, url={http://heinonline.org/HOL/Page?public=false&handle=hein.journals/luclj48&id=1}, journal={Loyola University Chicago Law Journal,}, author={Klerman, D.} }
@article{Koops_2014, title={The trouble with European data protection law}, volume={4}, DOI={10.1093/idpl/ipu023}, number={4}, journal={International Data Privacy Law}, author={Koops, B.-J.}, year={2014}, month={Nov}, pages={250–261} }
@article{Kouvakas, I., title={The Watson Case: Another Missed Opportunity for Stricto Sensu Proportionality}, url={http://heinonline.org/HOL/Page?public=false&handle=hein.journals/cambrilv2&id=181}, journal={Cambridge Law Review,}, author={Kouvakas, I.} }
@article{Kuner_2017, title={Reality and Illusion in EU Data Transfer Regulation Post}, volume={18}, DOI={10.1017/S2071832200022197}, number={4}, journal={German Law Journal}, author={Kuner, Christopher}, year={2017}, month={Jul}, pages={881–918} }
@book{Laidlaw_2015a, address={Cambridge, United Kingdom}, title={Regulating speech in cyberspace: gatekeepers, human rights and corporate responsibility}, publisher={Cambridge University Press}, author={Laidlaw, Emily B.}, year={2015} }
@book{Laidlaw_2015b, address={Cambridge}, title={Regulating Speech in Cyberspace}, url={http://ebooks.cambridge.org/ref/id/CBO9781107278721}, DOI={10.1017/CBO9781107278721}, publisher={Cambridge University Press}, author={Laidlaw, Emily B.}, year={2015} }
@book{Lane_Stodden_Bender_Nissenbaum_2014, address={Cambridge}, title={Privacy, big data, and the public good: frameworks for engagement}, publisher={Cambridge University Press}, author={Lane, Julia and Stodden, Victoria and Bender, Stefan and Nissenbaum, Helen Fay}, year={2014} }
@misc{Lawrence, title={Code Version 2.0}, url={http://codev2.cc/download+remix/Lessig-Codev2.pdf}, author={Lawrence, Lessig} }
@misc{Lawrence, title={Code Version 2.0}, url={http://codev2.cc/download+remix/Lessig-Codev2.pdf}, author={Lawrence, Lessig} }
@article{Lazer_2018, title={The science of fake news}, volume={359}, DOI={10.1126/science.aao2998}, number={6380}, journal={Science}, author={Lazer, David M. J.}, year={2018}, month={Mar}, pages={1094–1096} }
@article{Lindsay, D., title={Website Blocking Injunctions to Prevent Copyright Infringements: Proportionality and Effectiveness}, url={http://heinonline.org/HOL/Page?public=false&handle=hein.journals/swales40&id=1528}, journal={University of New South Wales Law Journal,}, author={Lindsay, D.} }
@article{Lodder_Puck Polter_2017, title={ISP blocking and filtering: on the shallow justification in case law regarding effectiveness of measures}, volume={8}, url={http://ejlt.org/article/view/517}, number={2}, journal={European Journal of Law and Technology}, author={Lodder, Arno R. and Puck Polter}, year={2017}, month={Nov} }
@book{Lynskey_2015, address={Oxford, United Kingdom}, edition={First edition}, title={The foundations of EU data protection law}, publisher={Oxford University Press}, author={Lynskey, Orla}, year={2015} }
@article{Mac Sithigh_2010, title={More than words: the introduction of internationalised domain names and the reform of generic top-level domains at ICANN}, volume={18}, DOI={10.1093/ijlit/eaq007}, number={3}, journal={International Journal of Law and Information Technology}, author={Mac Sithigh, D.}, year={2010}, month={Sep}, pages={274–300} }
@article{Mangan_2015, title={Regulating for responsibility: reputation and social media}, volume={29}, DOI={10.1080/13600869.2015.1008960}, number={1}, journal={International Review of Law, Computers & Technology}, author={Mangan, David}, year={2015}, month={Jan}, pages={16–32} }
@article{Mantelero_2014, title={The future of consumer data protection in the E.U. Re-thinking the "notice and consent” paradigm in the new era of predictive analytics}, volume={30}, DOI={10.1016/j.clsr.2014.09.004}, number={6}, journal={Computer Law & Security Review}, author={Mantelero, Alessandro}, year={2014}, month={Dec}, pages={643–660} }
@article{Mayer-Schonberger, V., title={Demystifying Lessig}, url={http://heinonline.org/HOL/Page?public=false&handle=hein.journals/wlr2008&id=725}, journal={Wisconsin Law Review
,}, author={Mayer-Schonberger, V.} }
@article{Mayer-Schonberger, V.; Padova, Y., title={Regime Change: Enabling Big Data through Europe’s New Data Protection Regulation}, url={http://heinonline.org/HOL/Page?public=false&handle=hein.journals/cstlr17&id=1}, journal={Columbia Science and Technology Law Review,}, author={Mayer-Schonberger, V.; Padova, Y.} }
@book{Mayer-Schönberger_Cukier_2013, address={London}, title={Big data: a revolution that will transform how we live, work and think}, publisher={John Murray}, author={Mayer-Schönberger, Viktor and Cukier, Kenneth}, year={2013} }
@article{Michael_Rebecca_2014, title={‘Searching for the Silver Bullet: How Website Blocking Injunctions are Changing Online IP Enforcement}, volume={25}, journal={Australian Intellectual Property Journal}, author={Michael, Williams and Rebecca, Smith}, year={2014} }
@article{Mills_2015, title={The law applicable to cross-border defamation on social media: whose law governs free speech in ‘Facebookistan’?}, volume={7}, DOI={10.1080/17577632.2015.1055942}, number={1}, journal={Journal of Media Law}, author={Mills, Alex}, year={2015}, month={Jan}, pages={1–35} }
@book{Murray_2019a, address={Oxford}, edition={4th edition}, title={Information technology law: the law & society}, publisher={Oxford University Press}, author={Murray, Andrew}, year={2019} }
@book{Murray_2019b, address={Oxford}, edition={4th edition}, title={Information technology law: the law & society}, publisher={Oxford University Press}, author={Murray, Andrew}, year={2019} }
@book{Murray_2019c, address={Oxford}, edition={4th edition}, title={Information technology law: the law & society}, publisher={Oxford University Press}, author={Murray, Andrew}, year={2019} }
@book{Murray_2019d, address={Oxford}, edition={4th edition}, title={Information technology law: the law & society}, publisher={Oxford University Press}, author={Murray, Andrew}, year={2019} }
@book{Murray_2019e, address={Oxford}, edition={4th edition}, title={Information technology law: the law & society}, publisher={Oxford University Press}, author={Murray, Andrew}, year={2019} }
@book{Murray_2019f, address={Oxford}, edition={4th edition}, title={Information technology law: the law & society}, publisher={Oxford University Press}, author={Murray, Andrew}, year={2019} }
@book{Murray_2019g, address={Oxford}, edition={4th edition}, title={Information technology law: the law & society}, publisher={Oxford University Press}, author={Murray, Andrew}, year={2019} }
@book{Murray_2019h, address={Oxford}, edition={4th edition}, title={Information technology law: the law & society}, publisher={Oxford University Press}, author={Murray, Andrew}, year={2019} }
@book{Murray_2019i, address={Oxford}, edition={4th edition}, title={Information technology law: the law & society}, publisher={Oxford University Press}, author={Murray, Andrew}, year={2019} }
@book{Murray_2019j, address={Oxford}, edition={4th edition}, title={Information technology law: the law & society}, publisher={Oxford University Press}, author={Murray, Andrew}, year={2019} }
@book{Murray_2019k, address={Oxford}, edition={4th edition}, title={Information technology law: the law & society}, publisher={Oxford University Press}, author={Murray, Andrew}, year={2019} }
@article{Napoli, P. M., title={What If More Speech Is No Longer the Solution: First Amendment Theory Meets Fake News and the Filter Bubble}, url={http://heinonline.org/HOL/Page?public=false&handle=hein.journals/fedcom70&id=67}, journal={Federal Communications Law Journal,}, author={Napoli, P. M.} }
@article{Ni Loideain_2015, title={EU Law and Mass Internet Metadata Surveillance in the Post-Snowden Era}, volume={3}, DOI={10.17645/mac.v3i2.297}, number={2}, journal={Media and Communication}, author={Ni Loideain, Nora}, year={2015}, month={Sep} }
@book{Nissenbaum_2010a, address={Stanford, Calif}, title={Privacy in context: technology, policy, and the integrity of social life}, publisher={Stanford Law Books}, author={Nissenbaum, Helen Fay}, year={2010} }
@book{Nissenbaum_2010b, address={Stanford, Calif}, title={Privacy in context: technology, policy, and the integrity of social life}, publisher={Stanford Law Books}, author={Nissenbaum, Helen Fay}, year={2010} }
@article{Polański_2018, title={Rethinking the notion of hosting in the aftermath of Delfi: Shifting from liability to responsibility?}, volume={34}, DOI={10.1016/j.clsr.2018.05.034}, number={4}, journal={Computer Law & Security Review}, author={Polański, Paul Przemysław}, year={2018}, month={Aug}, pages={870–880} }
@article{Polonetsky, J.; Tene, O., title={Privacy and Big Data: Making Ends Meet}, url={http://heinonline.org/HOL/Page?public=false&handle=hein.journals/slro66&id=25}, journal={Stanford Law Review Online,}, author={Polonetsky, J.; Tene, O.} }
@article{Post_2000, title={What Larry Doesn’t Get: Code, Law, and Liberty in Cyberspace}, volume={52}, DOI={10.2307/1229518}, number={5}, journal={Stanford Law Review}, author={Post, David G.}, year={2000}, month={May} }
@article{Poullet_2018, title={Is the general data protection regulation the solution?}, volume={34}, DOI={10.1016/j.clsr.2018.05.021}, number={4}, journal={Computer Law & Security Review}, author={Poullet, Yves}, year={2018}, month={Aug}, pages={773–778} }
@article{Powles, J., title={The Case That Won’t Be Forgotten}, url={http://heinonline.org/HOL/Page?public=false&handle=hein.journals/luclj47&id=1}, journal={Loyola University Chicago Law Journal,}, author={Powles, J.} }
@article{Raab_Szekely_2017, title={Data protection authorities and information technology}, volume={33}, DOI={10.1016/j.clsr.2017.05.002}, number={4}, journal={Computer Law & Security Review}, author={Raab, Charles and Szekely, Ivan}, year={2017}, month={Aug}, pages={421–433} }
@book{Reed_2012, address={Oxford, U.K.}, edition={1st ed}, title={Making laws for cyberspace}, publisher={Oxford University Press}, author={Reed, Chris}, year={2012} }
@article{Reed_2018, title={How should we regulate artificial intelligence?}, volume={376}, url={https://royalsocietypublishing.org/doi/full/10.1098/rsta.2017.0360}, number={2128}, journal={Philosophical transactions. Series A, Mathematical, physical, and engineering sciences}, author={Reed, Chris}, year={2018}, month={Sep} }
@article{Reidenberg, J. R., title={Lex Informatica: The Formulation of Information Policy Rules through Technology}, url={http://heinonline.org/HOL/Page?public=false&handle=hein.journals/tlr76&id=571}, journal={Texas Law Review,}, author={Reidenberg, J. R.} }
@article{Richards, Neil M.1 (AUTHOR)_2013, title={THE DANGERS OF SURVEILLANCE.}, volume={126}, url={http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=87598612&site=ehost-live}, number={Issue 7}, journal={Harvard Law Review}, author={Richards, Neil M.1 (AUTHOR)}, year={2013}, pages={1934–1965} }
@book{Rowland_Kohl_Charlesworth_2017a, address={Abingdon, Oxon}, edition={Fifth edition}, title={Information technology law}, publisher={Routledge}, author={Rowland, Diane and Kohl, Uta and Charlesworth, Andrew}, year={2017} }
@book{Rowland_Kohl_Charlesworth_2017b, address={Abingdon, Oxon}, edition={Fifth edition}, title={Information technology law}, publisher={Routledge}, author={Rowland, Diane and Kohl, Uta and Charlesworth, Andrew}, year={2017} }
@book{Rowland_Kohl_Charlesworth_2017c, address={Abingdon, Oxon}, edition={Fifth edition}, title={Information technology law}, publisher={Routledge}, author={Rowland, Diane and Kohl, Uta and Charlesworth, Andrew}, year={2017} }
@book{Rowland_Kohl_Charlesworth_2017d, address={Abingdon, Oxon}, edition={Fifth edition}, title={Information technology law}, publisher={Routledge}, author={Rowland, Diane and Kohl, Uta and Charlesworth, Andrew}, year={2017} }
@book{Rowland_Kohl_Charlesworth_2017e, address={Abingdon, Oxon}, edition={Fifth edition}, title={Information technology law}, publisher={Routledge}, author={Rowland, Diane and Kohl, Uta and Charlesworth, Andrew}, year={2017} }
@book{Rowland_Kohl_Charlesworth_2017f, address={Abingdon, Oxon}, edition={Fifth edition}, title={Information technology law}, publisher={Routledge}, author={Rowland, Diane and Kohl, Uta and Charlesworth, Andrew}, year={2017} }
@book{Rowland_Kohl_Charlesworth_2017g, address={Abingdon, Oxon}, edition={Fifth edition}, title={Information technology law}, publisher={Routledge}, author={Rowland, Diane and Kohl, Uta and Charlesworth, Andrew}, year={2017} }
@book{Rowland_Kohl_Charlesworth_2017h, address={Abingdon, Oxon}, edition={Fifth edition}, title={Information technology law}, publisher={Routledge}, author={Rowland, Diane and Kohl, Uta and Charlesworth, Andrew}, year={2017} }
@book{Rowland_Kohl_Charlesworth_2017i, address={Abingdon, Oxon}, edition={Fifth edition}, title={Information technology law}, publisher={Routledge}, author={Rowland, Diane and Kohl, Uta and Charlesworth, Andrew}, year={2017} }
@book{Rowland_Kohl_Charlesworth_2017j, address={Abingdon, Oxon}, edition={Fifth edition}, title={Information technology law}, publisher={Routledge}, author={Rowland, Diane and Kohl, Uta and Charlesworth, Andrew}, year={2017} }
@article{Rubinstein_2013, title={Big Data: The End of Privacy or a New Beginning?}, volume={3}, DOI={10.1093/idpl/ips036}, number={2}, journal={International Data Privacy Law}, author={Rubinstein, I. S.}, year={2013}, month={May}, pages={74–87} }
@article{Ryan Calo_2015, title={Robotics and the Lessons of Cyberlaw}, volume={103}, url={https://www.jstor.org/stable/24758483?seq=1#metadata_info_tab_contents}, number={3}, journal={California Law Review}, publisher={California Law Review, Inc.}, author={Ryan Calo}, year={2015} }
@article{Solove, D. J., title={I’ve Got Nothing to Hide and Other Misunderstandings of Privacy}, url={http://heinonline.org/HOL/Page?public=false&handle=hein.journals/sanlr44&id=1}, journal={San Diego Law Review,}, author={Solove, D. J.} }
@article{Synodinou_2015, title={Intermediaries’ liability for online copyright infringement in the EU: Evolutions and confusions}, volume={31}, DOI={10.1016/j.clsr.2014.11.010}, number={1}, journal={Computer Law & Security Review}, author={Synodinou, Tatiana-Eleni}, year={2015}, month={Feb}, pages={57–67} }
@article{Thompson, M., title={Beyond Gatekeeping: The Normative Responsibility of Internet Intermediaries}, url={http://heinonline.org/HOL/Page?public=false&handle=hein.journals/vanep18&id=807}, journal={Vanderbilt Journal of Entertainment & Technology Law,}, author={Thompson, M.} }
@article{van der Sloot, B.; van Schendel, S., title={Ten Questions for Future Regulation of Big Data: A Comparative and Empirical Legal Study}, url={http://heinonline.org/HOL/Page?public=false&handle=hein.journals/jipitec7&id=116}, journal={Journal of Intellectual Property, Information Technology and Electronic Commerce Law,}, author={van der Sloot, B.; van Schendel, S.} }
@article{Veale_Binns_Ausloos_2018, title={When data protection by design and data subject rights clash}, volume={8}, DOI={10.1093/idpl/ipy002}, number={2}, journal={International Data Privacy Law}, author={Veale, Michael and Binns, Reuben and Ausloos, Jef}, year={2018}, month={May}, pages={105–123} }
@article{Vranaki, A. A., title={Regulating Social Networking Sites: Facebook, Online Behavioral Advertising, Data Protection Laws and Powe}, url={http://heinonline.org/HOL/Page?public=false&handle=hein.journals/rutcomt43&id=1}, journal={Rutgers Computer and Technology Law Journal,}, author={Vranaki, A. A.} }
@article{Vranaki, A. A., title={Regulating Social Networking Sites: Facebook, Online Behavioral Advertising, Data Protection Laws and Powe}, url={http://heinonline.org/HOL/Page?public=false&handle=hein.journals/rutcomt43&id=1}, journal={Rutgers Computer and Technology Law Journal,}, author={Vranaki, A. A.} }
@article{Vranaki, A. A., title={Learning Lessons from Cloud Investigations in Europe: Bargaining Enforcement and Multiple Centers of Regulation in Data Protection}, url={http://heinonline.org/HOL/Page?public=false&handle=hein.journals/jltp2016&id=1}, journal={University of Illinois Journal of Law, Technology & Policy,}, author={Vranaki, A. A.} }
@inbook{Vranaki_2016, title={Cloud investigations by European data protection authorities: an empirical account}, url={https://www.elgaronline.com/view/edcoll/9781783479917/9781783479917.00045.xml}, booktitle={Research handbook on electronic commercelaw}, author={Vranaki, Asma A.I.}, editor={Rothchild, John A.}, year={2016} }
@article{Wachter, S.; Mittelstadt, B., title={A Right to Reasonable Inferences: Re-Thinking Data Protection Law in the Age of Big Data and AI}, url={http://heinonline.org/HOL/Page?public=false&handle=hein.journals/colb2019&id=1}, journal={Columbia Business Law Review,}, author={Wachter, S.; Mittelstadt, B.} }
@book{Walden_2016, address={Oxford}, edition={2nd edition}, title={Computer crimes and digital investigations}, publisher={Oxford University Press}, author={Walden, Ian}, year={2016} }
@book{Rowland_2017, address={Abingdon}, edition={Fifth edition}, title={Information Technology Law}, url={https://doi.org/10.4324/9780203798522}, DOI={10.4324/9780203798522}, publisher={Routledge}, year={2017} }
@inbook{Mangan_Gillies_2017, title={An unwholesome layer cake: intermediary liability in English defamation and data protection law}, url={https://www.elgaronline.com/view/edcoll/9781785364501/9781785364501.00025.xml}, booktitle={The Legal Challenges of Social Media}, year={2017} }
@book{Barfield_Pagallo_2018, address={Cheltenham, UK}, title={Research handbook on the law of artificial intelligence}, url={https://www.elgaronline.com/view/edcoll/9781786439048/9781786439048.xml}, publisher={Edward Elgar Publishing}, year={2018} }
@book{Edwards_2019a, address={Oxford, UK}, title={Law, policy, and the Internet}, publisher={Hart Publishing}, year={2019} }
@book{Edwards_2019b, address={Oxford, UK}, title={Law, policy, and the Internet}, publisher={Hart Publishing}, year={2019} }
@book{Edwards_2019c, address={Oxford, UK}, title={Law, policy, and the Internet}, publisher={Hart Publishing}, year={2019} }
@book{Edwards_2019d, address={Oxford, UK}, title={Law, policy, and the Internet}, publisher={Hart Publishing}, year={2019} }
@misc{A Declaration of the Independence of Cyberspace | Electronic Frontier Foundation, url={https://www.eff.org/cyberspace-independence} }
@misc{The EU-US Privacy Shield, url={https://iapp.org/media/pdf/resource_center/eu_us_privacy_shield_full_text.pdf.pdf} }
@misc{Centre for Information Policy Leadership, ‘The Central Role of Organisational Accountability in Data Protection’, url={https://www.informationpolicycentre.com/uploads/5/7/1/0/57104281/cipl_accountability_paper_1_-_the_case_for_accountability_-_how_it_enables_effective_data_protection_and_trust_in_the_digital_society.pdf} }
@misc{UK ICO, ‘Big Data, Artificial Intelligence, Machine Learning and Data Protection’ (2017), url={https://ico.org.uk/media/for-organisations/documents/2013559/big-data-ai-ml-and-data-protection.pdf} }
@misc{UK ICO, ‘Big Data, Artificial Intelligence, Machine Learning and Data Protection’ (2017), url={https://ico.org.uk/media/for-organisations/documents/2013559/big-data-ai-ml-and-data-protection.pdf} }
@article{A multi-dimensional approach to disinformation : report of the independent High level Group on fake news and online disinformation., url={https://publications.europa.eu/en/publication-detail/-/publication/6ef4df8b-4cea-11e8-be1d-01aa75ed71a1} }
@misc{Code of Practice on Disinformation, url={https://ec.europa.eu/digital-single-market/en/news/code-practice-disinformation} }
@misc{• House of Commons Digital, Culture, Media and Sport Committee, Disinformation and ‘fake news’: Final Report HC 1791 Eighth Report of Session 2017–19, url={https://publications.parliament.uk/pa/cm201719/cmselect/cmcumeds/1791/1791.pdf} }
@misc{• E Laidlaw and H Young, Internet Intermediary Liability in Defamation: Proposals For Statutory Reform: Defamation Law in the Internet Age (2017), url={http://www.lco-cdo.org/wp-content/uploads/2017/07/DIA-Commissioned-Paper-Laidlaw-and-Young.pdf} }
@article{Addressing the Harm of Total Surveillance: A Reply to Professor Neil Richards - Harvard Law Review, url={https://harvardlawreview.org/2013/06/addressing-the-harm-of-total-surveillance-a-reply-to-professor-neil-richards/} }
@misc{Uniform Domain-Name Dispute-Resolution Policy - ICANN, url={https://www.icann.org/resources/pages/help/dndr/udrp-en} }
@misc{• European Parliament Committee on Legal Affairs, ‘Report with Recommendations to the Commission on Civil Law Rules on Robotics’ (2015/2103(INL)) A8-0005/27 January 2017, url={http://www.europarl.europa.eu/doceo/document/A-8-2017-0005_EN.html} }
@misc{Science and Technology Committee, Robotics and Artificial Intelligence (HC 2016-145), url={https://publications.parliament.uk/pa/cm201617/cmselect/cmsctech/145/14502.htm} }
@misc{Artificial Intelligence Committee, AI in the UK: Ready, Willing and Able? (HL 2018 - 100), url={https://publications.parliament.uk/pa/ld201719/ldselect/ldai/100/100.pdf} }