‘A Declaration of the Independence of Cyberspace | Electronic Frontier Foundation’. n.d. https://www.eff.org/cyberspace-independence.
‘A Multi-Dimensional Approach to Disinformation : Report of the Independent High Level Group on Fake News and Online Disinformation.’ n.d. https://publications.europa.eu/en/publication-detail/-/publication/6ef4df8b-4cea-11e8-be1d-01aa75ed71a1.
‘Addressing the Harm of Total Surveillance: A Reply to Professor Neil Richards - Harvard Law Review’. n.d. https://harvardlawreview.org/2013/06/addressing-the-harm-of-total-surveillance-a-reply-to-professor-neil-richards/.
Angelopoulos, Christina. 2015. ‘Sketching the Outline of a Ghost: The Fair Balance between Copyright and Fundamental Rights in Intermediary Third Party Liability’. Info 17 (6): 72–96. https://doi.org/10.1108/info-05-2015-0028.
Arnot, J. A. n.d. ‘Navigating Cybersquatting Enforcement in the Expanding Internet’. John Marshall Review of Intellectual Property Law,. http://heinonline.org/HOL/Page?public=false&handle=hein.journals/johnmars13&id=329.
‘Artificial Intelligence Committee, AI in the UK: Ready, Willing and Able? (HL 2018 - 100)’. n.d. https://publications.parliament.uk/pa/ld201719/ldselect/ldai/100/100.pdf.
Balkin, J. M. n.d. ‘Digital Speech and Democratic Culture: A Theory of Freedom of Expression for the Information Society’. New York University Law Review,. http://heinonline.org/HOL/Page?public=false&handle=hein.journals/nylr79&id=15.
Balkin, Jack M. n.d. ‘The Path of Robotics Law’. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2586570.
Barendt, E. M. 2009. Freedom of Speech. 2nd ed. Oxford: Oxford University Press.
Barfield, Woodrow, and Ugo Pagallo, eds. 2018. Research Handbook on the Law of Artificial Intelligence. Cheltenham, UK: Edward Elgar Publishing. https://www.elgaronline.com/view/edcoll/9781786439048/9781786439048.xml.
Bernd Justin Jütte*. 2016. ‘The Beginning of a (Happy?) Relationship: Copyright and Freedom of Expression in Europe’. European Intellectual Property Review 38: 11–22. http://signon.thomsonreuters.com/federation/UKF?entityID=https%3A%2F%2Fidp.bris.ac.uk%2Fshibboleth&returnto=https%3A%2F%2Fwestlawuk.thomsonreuters.co.uk%2FBrowse%2FHome%2FWestlawUK%3FskipAnonymous%3Dtrue.
Brown, Ian, and Christopher T. Marsden. n.d. Regulating Code: Good Governance and Better Regulation in the Information Age. Cambridge, Mass: The MIT Press.
Bryson, Joanna J., Mihailis E. Diamantis, and Thomas D. Grant. 2017. ‘Of, for, and by the People: The Legal Lacuna of Synthetic Persons’. Artificial Intelligence and Law 25 (3): 273–91. https://doi.org/10.1007/s10506-017-9214-9.
Calderoni, Francesco. 2010. ‘The European Legal Framework on Cybercrime: Striving for an Effective Implementation’. Crime, Law and Social Change 54 (5): 339–57. https://doi.org/10.1007/s10611-010-9261-6.
Cameron, Iain. n.d. ‘A. Court of Justice Balancing Data Protection and Law Enforcement Needs: Tele2 Sverige and Watson’. Common Market Law Review 54 (5): 1467–95. http://www.kluwerlawonline.com/abstract.php?area=Journals&id=COLA2017119.
Cate, F. H., and V. Mayer-Schonberger. 2013. ‘Notice and Consent in a World of Big Data’. International Data Privacy Law 3 (2): 67–73. https://doi.org/10.1093/idpl/ipt005.
‘Centre for Information Policy Leadership, “The Central Role of Organisational Accountability in Data Protection”’. n.d. https://www.informationpolicycentre.com/uploads/5/7/1/0/57104281/cipl_accountability_paper_1_-_the_case_for_accountability_-_how_it_enables_effective_data_protection_and_trust_in_the_digital_society.pdf.
Chesney, R.; Citron, D. n.d. ‘Deepfakes and the New Disinformation War: The Coming Age of Post-Truth Geopolitics’. Foreign Affairs,. http://heinonline.org/HOL/Page?public=false&handle=hein.journals/fora98&id=1.
Clough, Jonathan. 2015. Principles of Cybercrime. Cambridge: Cambridge University Press. https://doi.org/10.1017/CBO9781139540803.
‘Code of Practice on Disinformation’. n.d. https://ec.europa.eu/digital-single-market/en/news/code-practice-disinformation.
Cohen, Julie E. n.d. Configuring the Networked Self: Law, Code, and the Play of Everyday Practice. New Haven [Conn.]: Yale University Press.
Davies, Gemma. 2018. ‘Court of Appeal High Court’. The Journal of Criminal Law 82 (4): 296–300. https://doi.org/10.1177/0022018318791670.
‘• E Laidlaw and H Young, Internet Intermediary Liability in Defamation: Proposals For Statutory Reform: Defamation Law in the Internet Age (2017)’. n.d. http://www.lco-cdo.org/wp-content/uploads/2017/07/DIA-Commissioned-Paper-Laidlaw-and-Young.pdf.
Edwards, Lilian, ed. 2019a. Law, Policy, and the Internet. Oxford, UK: Hart Publishing.
———, ed. 2019b. Law, Policy, and the Internet. Oxford, UK: Hart Publishing.
———, ed. 2019c. Law, Policy, and the Internet. Oxford, UK: Hart Publishing.
———, ed. 2019d. Law, Policy, and the Internet. Oxford, UK: Hart Publishing.
‘• European Parliament Committee on Legal Affairs, “Report with Recommendations to the Commission on Civil Law Rules on Robotics” (2015/2103(INL)) A8-0005/27 January 2017’. n.d. http://www.europarl.europa.eu/doceo/document/A-8-2017-0005_EN.html.
Fafinski, Stefan. 2008. ‘Computer Misuse: The Implications of the Police and Justice Act 2006’. The Journal of Criminal Law 72 (1): 53–66. https://doi.org/10.1350/jcla.2008.72.1.477.
———. 2009a. Computer Misuse: Response, Regulation, and the Law. Cullompton, Devon: Willan Pub.
———. 2009b. Computer Misuse: Response, Regulation, and the Law. Cullompton, Devon: Willan Pub.
Ferretti, Federico. n.d. ‘Data Protection and the Legitimate Interest of Data Controllers: Much Ado about Nothing or the Winter of Rights?’ Common Market Law Review 51 (3): 843–68. http://www.kluwerlawonline.com/abstract.php?area=Journals&id=COLA2014063.
Geiger, C.; Izyumenko, E. n.d. ‘The Role of Human Rights in Copyright Enforcement Online: Elaborating a Legal Framework for Website Blocking’. American University International Law Review,. http://heinonline.org/HOL/Page?public=false&handle=hein.journals/amuilr32&id=1.
Geist, M. n.d. ‘Fair.Com: An Examination of the Allegations of Systemic Unfairness in the ICANN UDRP’. Brooklyn Journal of International Law,. http://heinonline.org/HOL/Page?public=false&handle=hein.journals/bjil27&id=915.
Gillespie, Alisdair A. 2019. Cybercrime: Key Issues and Debates. 2nd ed. Milton: Routledge.
Goldberg, D. n.d. ‘Responding to Fake News: Is There an Alternative to Law and Regulation’. Southwestern Law Review,. http://heinonline.org/HOL/Page?public=false&handle=hein.journals/swulr47&id=1.
Guihot, M.; Matthew, A. F.; Suzor, N. P. n.d. ‘Nudging Robots: Innovative Solutions to Regulate Artificial Intelligence’. Vanderbilt Journal of Entertainment & Technology Law,. http://heinonline.org/HOL/Page?public=false&handle=hein.journals/vanep20&id=1.
Holstein-Childress, V. n.d. ‘Lex Cyberus: The UDRP as a Gatekeeper to Judicial Resolution of Competing Rights to Domain Names’. Penn State Law Review,. http://heinonline.org/HOL/Page?public=false&handle=hein.journals/dlr109&id=575.
‘• House of Commons Digital, Culture, Media and Sport Committee, Disinformation and “Fake News”: Final Report HC 1791 Eighth Report of Session 2017–19’. n.d. https://publications.parliament.uk/pa/cm201719/cmselect/cmcumeds/1791/1791.pdf.
Johnson, David R., and David Post. 1996. ‘Law and Borders: The Rise of Law in Cyberspace’. Stanford Law Review 48 (5). https://doi.org/10.2307/1229390.
Klerman, D. n.d. ‘Forum Selling and Domain-Name Disputes’. Loyola University Chicago Law Journal,. http://heinonline.org/HOL/Page?public=false&handle=hein.journals/luclj48&id=1.
Koops, B.-J. 2014. ‘The Trouble with European Data Protection Law’. International Data Privacy Law 4 (4): 250–61. https://doi.org/10.1093/idpl/ipu023.
Kouvakas, I. n.d. ‘The Watson Case: Another Missed Opportunity for Stricto Sensu Proportionality’. Cambridge Law Review,. http://heinonline.org/HOL/Page?public=false&handle=hein.journals/cambrilv2&id=181.
Kuner, Christopher. 2017. ‘Reality and Illusion in EU Data Transfer Regulation Post’. German Law Journal 18 (4): 881–918. https://doi.org/10.1017/S2071832200022197.
Laidlaw, Emily B. 2015a. Regulating Speech in Cyberspace. Cambridge: Cambridge University Press. https://doi.org/10.1017/CBO9781107278721.
———. 2015b. Regulating Speech in Cyberspace: Gatekeepers, Human Rights and Corporate Responsibility. Cambridge, United Kingdom: Cambridge University Press.
Lane, Julia, Victoria Stodden, Stefan Bender, and Helen Fay Nissenbaum. 2014. Privacy, Big Data, and the Public Good: Frameworks for Engagement. Cambridge: Cambridge University Press.
Lawrence, Lessig. n.d. ‘Code Version 2.0’. http://codev2.cc/download+remix/Lessig-Codev2.pdf.
———. n.d. ‘Code Version 2.0’. http://codev2.cc/download+remix/Lessig-Codev2.pdf.
Lazer, David M. J. 2018. ‘The Science of Fake News’. Science 359 (6380): 1094–96. https://doi.org/10.1126/science.aao2998.
Lindsay, D. n.d. ‘Website Blocking Injunctions to Prevent Copyright Infringements: Proportionality and Effectiveness’. University of New South Wales Law Journal,. http://heinonline.org/HOL/Page?public=false&handle=hein.journals/swales40&id=1528.
Lodder, Arno R. and Puck Polter. 2017. ‘ISP Blocking and Filtering: On the Shallow Justification in Case Law Regarding Effectiveness of Measures’. European Journal of Law and Technology 8 (2). http://ejlt.org/article/view/517.
Lynskey, Orla. 2015. The Foundations of EU Data Protection Law. First edition. Oxford, United Kingdom: Oxford University Press.
Mac Sithigh, D. 2010. ‘More than Words: The Introduction of Internationalised Domain Names and the Reform of Generic Top-Level Domains at ICANN’. International Journal of Law and Information Technology 18 (3): 274–300. https://doi.org/10.1093/ijlit/eaq007.
Mangan, David. 2015. ‘Regulating for Responsibility: Reputation and Social Media’. International Review of Law, Computers & Technology 29 (1): 16–32. https://doi.org/10.1080/13600869.2015.1008960.
Mangan, David, and Lorna E. Gillies, eds. 2017. ‘An Unwholesome Layer Cake: Intermediary Liability in English Defamation and Data Protection Law’. In The Legal Challenges of Social Media. https://www.elgaronline.com/view/edcoll/9781785364501/9781785364501.00025.xml.
Mantelero, Alessandro. 2014. ‘The Future of Consumer Data Protection in the E.U. Re-Thinking the "notice and Consent” Paradigm in the New Era of Predictive Analytics’. Computer Law & Security Review 30 (6): 643–60. https://doi.org/10.1016/j.clsr.2014.09.004.
Mayer-Schonberger, V. n.d. ‘Demystifying Lessig’. Wisconsin Law Review ,. http://heinonline.org/HOL/Page?public=false&handle=hein.journals/wlr2008&id=725.
Mayer-Schonberger, V.; Padova, Y. n.d. ‘Regime Change: Enabling Big Data through Europe’s New Data Protection Regulation’. Columbia Science and Technology Law Review,. http://heinonline.org/HOL/Page?public=false&handle=hein.journals/cstlr17&id=1.
Mayer-Schönberger, Viktor, and Kenneth Cukier. 2013. Big Data: A Revolution That Will Transform How We Live, Work and Think. London: John Murray.
Michael, Williams, and Smith Rebecca. 2014. ‘‘Searching for the Silver Bullet: How Website Blocking Injunctions Are Changing Online IP Enforcement’. Australian Intellectual Property Journal 25.
Mills, Alex. 2015. ‘The Law Applicable to Cross-Border Defamation on Social Media: Whose Law Governs Free Speech in “Facebookistan”?’ Journal of Media Law 7 (1): 1–35. https://doi.org/10.1080/17577632.2015.1055942.
Murray, Andrew. 2019a. Information Technology Law: The Law & Society. 4th edition. Oxford: Oxford University Press.
———. 2019b. Information Technology Law: The Law & Society. 4th edition. Oxford: Oxford University Press.
———. 2019c. Information Technology Law: The Law & Society. 4th edition. Oxford: Oxford University Press.
———. 2019d. Information Technology Law: The Law & Society. 4th edition. Oxford: Oxford University Press.
———. 2019e. Information Technology Law: The Law & Society. 4th edition. Oxford: Oxford University Press.
———. 2019f. Information Technology Law: The Law & Society. 4th edition. Oxford: Oxford University Press.
———. 2019g. Information Technology Law: The Law & Society. 4th edition. Oxford: Oxford University Press.
———. 2019h. Information Technology Law: The Law & Society. 4th edition. Oxford: Oxford University Press.
———. 2019i. Information Technology Law: The Law & Society. 4th edition. Oxford: Oxford University Press.
———. 2019j. Information Technology Law: The Law & Society. 4th edition. Oxford: Oxford University Press.
———. 2019k. Information Technology Law: The Law & Society. 4th edition. Oxford: Oxford University Press.
Napoli, P. M. n.d. ‘What If More Speech Is No Longer the Solution: First Amendment Theory Meets Fake News and the Filter Bubble’. Federal Communications Law Journal,. http://heinonline.org/HOL/Page?public=false&handle=hein.journals/fedcom70&id=67.
Ni Loideain, Nora. 2015. ‘EU Law and Mass Internet Metadata Surveillance in the Post-Snowden Era’. Media and Communication 3 (2). https://doi.org/10.17645/mac.v3i2.297.
Nissenbaum, Helen Fay. 2010a. Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford, Calif: Stanford Law Books.
———. 2010b. Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford, Calif: Stanford Law Books.
Polański, Paul Przemysław. 2018. ‘Rethinking the Notion of Hosting in the Aftermath of Delfi: Shifting from Liability to Responsibility?’ Computer Law & Security Review 34 (4): 870–80. https://doi.org/10.1016/j.clsr.2018.05.034.
Polonetsky, J.; Tene, O. n.d. ‘Privacy and Big Data: Making Ends Meet’. Stanford Law Review Online,. http://heinonline.org/HOL/Page?public=false&handle=hein.journals/slro66&id=25.
Post, David G. 2000. ‘What Larry Doesn’t Get: Code, Law, and Liberty in Cyberspace’. Stanford Law Review 52 (5). https://doi.org/10.2307/1229518.
Poullet, Yves. 2018. ‘Is the General Data Protection Regulation the Solution?’ Computer Law & Security Review 34 (4): 773–78. https://doi.org/10.1016/j.clsr.2018.05.021.
Powles, J. n.d. ‘The Case That Won’t Be Forgotten’. Loyola University Chicago Law Journal,. http://heinonline.org/HOL/Page?public=false&handle=hein.journals/luclj47&id=1.
Raab, Charles, and Ivan Szekely. 2017. ‘Data Protection Authorities and Information Technology’. Computer Law & Security Review 33 (4): 421–33. https://doi.org/10.1016/j.clsr.2017.05.002.
Reed, Chris. 2012. Making Laws for Cyberspace. 1st ed. Oxford, U.K.: Oxford University Press.
———. 2018. ‘How Should We Regulate Artificial Intelligence?’ Philosophical Transactions. Series A, Mathematical, Physical, and Engineering Sciences 376 (2128). https://royalsocietypublishing.org/doi/full/10.1098/rsta.2017.0360.
Reidenberg, J. R. n.d. ‘Lex Informatica:  The Formulation of Information Policy Rules through Technology’. Texas Law Review,. http://heinonline.org/HOL/Page?public=false&handle=hein.journals/tlr76&id=571.
Richards, Neil M.1 (AUTHOR). 2013. ‘THE DANGERS OF SURVEILLANCE.’ Harvard Law Review 126 (Issue 7): 1934–65. http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=87598612&site=ehost-live.
Rowland, Diane, and et al., eds. 2017. Information Technology Law. Fifth edition. Abingdon: Routledge. https://doi.org/10.4324/9780203798522.
Rowland, Diane, Uta Kohl, and Andrew Charlesworth. 2017a. Information Technology Law. Fifth edition. Abingdon, Oxon: Routledge.
———. 2017b. Information Technology Law. Fifth edition. Abingdon, Oxon: Routledge.
———. 2017c. Information Technology Law. Fifth edition. Abingdon, Oxon: Routledge.
———. 2017d. Information Technology Law. Fifth edition. Abingdon, Oxon: Routledge.
———. 2017e. Information Technology Law. Fifth edition. Abingdon, Oxon: Routledge.
———. 2017f. Information Technology Law. Fifth edition. Abingdon, Oxon: Routledge.
———. 2017g. Information Technology Law. Fifth edition. Abingdon, Oxon: Routledge.
———. 2017h. Information Technology Law. Fifth edition. Abingdon, Oxon: Routledge.
———. 2017i. Information Technology Law. Fifth edition. Abingdon, Oxon: Routledge.
———. 2017j. Information Technology Law. Fifth edition. Abingdon, Oxon: Routledge.
Rubinstein, I. S. 2013. ‘Big Data: The End of Privacy or a New Beginning?’ International Data Privacy Law 3 (2): 74–87. https://doi.org/10.1093/idpl/ips036.
Ryan Calo. 2015. ‘Robotics and the Lessons of Cyberlaw’. California Law Review 103 (3). https://www.jstor.org/stable/24758483?seq=1#metadata_info_tab_contents.
‘Science and Technology Committee, Robotics and Artificial Intelligence (HC 2016-145)’. n.d. https://publications.parliament.uk/pa/cm201617/cmselect/cmsctech/145/14502.htm.
Solove, D. J. n.d. ‘I’ve Got Nothing to Hide and Other Misunderstandings of Privacy’. San Diego Law Review,. http://heinonline.org/HOL/Page?public=false&handle=hein.journals/sanlr44&id=1.
Synodinou, Tatiana-Eleni. 2015. ‘Intermediaries’ Liability for Online Copyright Infringement in the EU: Evolutions and Confusions’. Computer Law & Security Review 31 (1): 57–67. https://doi.org/10.1016/j.clsr.2014.11.010.
‘The EU-US Privacy Shield’. n.d. https://iapp.org/media/pdf/resource_center/eu_us_privacy_shield_full_text.pdf.pdf.
Thompson, M. n.d. ‘Beyond Gatekeeping: The Normative Responsibility of Internet Intermediaries’. Vanderbilt Journal of Entertainment & Technology Law,. http://heinonline.org/HOL/Page?public=false&handle=hein.journals/vanep18&id=807.
‘UK ICO, “Big Data, Artificial Intelligence, Machine Learning and Data Protection” (2017)’. n.d. https://ico.org.uk/media/for-organisations/documents/2013559/big-data-ai-ml-and-data-protection.pdf.
‘———’. n.d. https://ico.org.uk/media/for-organisations/documents/2013559/big-data-ai-ml-and-data-protection.pdf.
‘Uniform Domain-Name Dispute-Resolution Policy - ICANN’. n.d. https://www.icann.org/resources/pages/help/dndr/udrp-en.
van der Sloot, B.; van Schendel, S. n.d. ‘Ten Questions for Future Regulation of Big Data: A Comparative and Empirical Legal Study’. Journal of Intellectual Property, Information Technology and Electronic Commerce Law,. http://heinonline.org/HOL/Page?public=false&handle=hein.journals/jipitec7&id=116.
Veale, Michael, Reuben Binns, and Jef Ausloos. 2018. ‘When Data Protection by Design and Data Subject Rights Clash’. International Data Privacy Law 8 (2): 105–23. https://doi.org/10.1093/idpl/ipy002.
Vranaki, A. A. n.d. ‘Learning Lessons from Cloud Investigations in Europe: Bargaining Enforcement and Multiple Centers of Regulation in Data Protection’. University of Illinois Journal of Law, Technology & Policy,. http://heinonline.org/HOL/Page?public=false&handle=hein.journals/jltp2016&id=1.
———. n.d. ‘Regulating Social Networking Sites: Facebook, Online Behavioral Advertising, Data Protection Laws and Powe’. Rutgers Computer and Technology Law Journal,. http://heinonline.org/HOL/Page?public=false&handle=hein.journals/rutcomt43&id=1.
———. n.d. ‘Regulating Social Networking Sites: Facebook, Online Behavioral Advertising, Data Protection Laws and Powe’. Rutgers Computer and Technology Law Journal,. http://heinonline.org/HOL/Page?public=false&handle=hein.journals/rutcomt43&id=1.
Vranaki, Asma A.I. 2016. ‘Cloud Investigations by European Data Protection Authorities: An Empirical Account’. In Research Handbook on Electronic Commercelaw, edited by John A. Rothchild. https://www.elgaronline.com/view/edcoll/9781783479917/9781783479917.00045.xml.
Wachter, S.; Mittelstadt, B. n.d. ‘A Right to Reasonable Inferences: Re-Thinking Data Protection Law in the Age of Big Data and AI’. Columbia Business Law Review,. http://heinonline.org/HOL/Page?public=false&handle=hein.journals/colb2019&id=1.
Walden, Ian. 2016. Computer Crimes and Digital Investigations. 2nd edition. Oxford: Oxford University Press.