[1]
A. Murray, Information technology law: the law & society, 4th edition. Oxford: Oxford University Press, 2019.
[2]
D. Rowland, U. Kohl, and A. Charlesworth, Information technology law, Fifth edition. Abingdon, Oxon: Routledge, 2017.
[3]
L. Edwards, Ed., Law, policy, and the Internet. Oxford, UK: Hart Publishing, 2019.
[4]
C. Reed, Making laws for cyberspace, 1st ed. Oxford, U.K.: Oxford University Press, 2012.
[5]
H. F. Nissenbaum, Privacy in context: technology, policy, and the integrity of social life. Stanford, Calif: Stanford Law Books, 2010.
[6]
J. E. Cohen, Configuring the networked self: law, code, and the play of everyday practice. New Haven [Conn.]: Yale University Press.
[7]
‘A Declaration of the Independence of Cyberspace | Electronic Frontier Foundation’. [Online]. Available: https://www.eff.org/cyberspace-independence
[8]
D. R. Johnson and D. Post, ‘Law and Borders: The Rise of Law in Cyberspace’, Stanford Law Review, vol. 48, no. 5, May 1996, doi: 10.2307/1229390.
[9]
L. Lawrence, ‘Code Version 2.0’. [Online]. Available: http://codev2.cc/download+remix/Lessig-Codev2.pdf
[10]
A. Murray, Information technology law: the law & society, 4th edition. Oxford: Oxford University Press, 2019.
[11]
Vranaki, A. A., ‘Regulating Social Networking Sites: Facebook, Online Behavioral Advertising, Data Protection Laws and Powe’, Rutgers Computer and Technology Law Journal, [Online]. Available: http://heinonline.org/HOL/Page?public=false&handle=hein.journals/rutcomt43&id=1
[12]
D. Rowland and et al., Eds., Information Technology Law, Fifth edition. Abingdon: Routledge, 2017 [Online]. Available: https://doi.org/10.4324/9780203798522
[13]
A. Murray, Information technology law: the law & society, 4th edition. Oxford: Oxford University Press, 2019.
[14]
Vranaki, A. A., ‘Regulating Social Networking Sites: Facebook, Online Behavioral Advertising, Data Protection Laws and Powe’, Rutgers Computer and Technology Law Journal, [Online]. Available: http://heinonline.org/HOL/Page?public=false&handle=hein.journals/rutcomt43&id=1
[15]
L. Lawrence, ‘Code Version 2.0’. [Online]. Available: http://codev2.cc/download+remix/Lessig-Codev2.pdf
[16]
D. G. Post, ‘What Larry Doesn’t Get: Code, Law, and Liberty in Cyberspace’, Stanford Law Review, vol. 52, no. 5, May 2000, doi: 10.2307/1229518.
[17]
Reidenberg, J. R., ‘Lex Informatica:  The Formulation of Information Policy Rules through Technology’, Texas Law Review, [Online]. Available: http://heinonline.org/HOL/Page?public=false&handle=hein.journals/tlr76&id=571
[18]
Mayer-Schonberger, V., ‘Demystifying Lessig’, Wisconsin Law Review , [Online]. Available: http://heinonline.org/HOL/Page?public=false&handle=hein.journals/wlr2008&id=725
[19]
I. Brown and C. T. Marsden, Regulating code: good governance and better regulation in the information age. Cambridge, Mass: The MIT Press.
[20]
D. Rowland, U. Kohl, and A. Charlesworth, Information technology law, Fifth edition. Abingdon, Oxon: Routledge, 2017.
[21]
L. Edwards, Ed., Law, policy, and the Internet. Oxford, UK: Hart Publishing, 2019.
[22]
A. Murray, Information technology law: the law & society, 4th edition. Oxford: Oxford University Press, 2019.
[23]
‘The EU-US Privacy Shield’. [Online]. Available: https://iapp.org/media/pdf/resource_center/eu_us_privacy_shield_full_text.pdf.pdf
[24]
A. Murray, Information technology law: the law & society, 4th edition. Oxford: Oxford University Press, 2019.
[25]
D. Rowland, U. Kohl, and A. Charlesworth, Information technology law, Fifth edition. Abingdon, Oxon: Routledge, 2017.
[26]
O. Lynskey, The foundations of EU data protection law, First edition. Oxford, United Kingdom: Oxford University Press, 2015.
[27]
Y. Poullet, ‘Is the general data protection regulation the solution?’, Computer Law & Security Review, vol. 34, no. 4, pp. 773–778, Aug. 2018, doi: 10.1016/j.clsr.2018.05.021.
[28]
‘Centre for Information Policy Leadership, “The Central Role of Organisational Accountability in Data Protection”’. [Online]. Available: https://www.informationpolicycentre.com/uploads/5/7/1/0/57104281/cipl_accountability_paper_1_-_the_case_for_accountability_-_how_it_enables_effective_data_protection_and_trust_in_the_digital_society.pdf
[29]
Ferretti, Federico, ‘Data protection and the legitimate interest of data controllers: Much ado about nothing or the winter of rights?’, Common Market Law Review, vol. 51, no. 3, pp. 843–868 [Online]. Available: http://www.kluwerlawonline.com/abstract.php?area=Journals&id=COLA2014063
[30]
Powles, J., ‘The Case That Won’t Be Forgotten’, Loyola University Chicago Law Journal, [Online]. Available: http://heinonline.org/HOL/Page?public=false&handle=hein.journals/luclj47&id=1
[31]
M. Veale, R. Binns, and J. Ausloos, ‘When data protection by design and data subject rights clash’, International Data Privacy Law, vol. 8, no. 2, pp. 105–123, May 2018, doi: 10.1093/idpl/ipy002.
[32]
C. Kuner, ‘Reality and Illusion in EU Data Transfer Regulation Post’, German Law Journal, vol. 18, no. 4, pp. 881–918, Jul. 2017, doi: 10.1017/S2071832200022197.
[33]
Vranaki, A. A., ‘Learning Lessons from Cloud Investigations in Europe: Bargaining Enforcement and Multiple Centers of Regulation in Data Protection’, University of Illinois Journal of Law, Technology & Policy, [Online]. Available: http://heinonline.org/HOL/Page?public=false&handle=hein.journals/jltp2016&id=1
[34]
A. A. I. Vranaki, ‘Cloud investigations by European data protection authorities: an empirical account’, in Research handbook on electronic commercelaw, J. A. Rothchild, Ed. 2016 [Online]. Available: https://www.elgaronline.com/view/edcoll/9781783479917/9781783479917.00045.xml
[35]
B.-J. Koops, ‘The trouble with European data protection law’, International Data Privacy Law, vol. 4, no. 4, pp. 250–261, Nov. 2014, doi: 10.1093/idpl/ipu023.
[36]
C. Raab and I. Szekely, ‘Data protection authorities and information technology’, Computer Law & Security Review, vol. 33, no. 4, pp. 421–433, Aug. 2017, doi: 10.1016/j.clsr.2017.05.002.
[37]
D. Rowland, U. Kohl, and A. Charlesworth, Information technology law, Fifth edition. Abingdon, Oxon: Routledge, 2017.
[38]
‘UK ICO, “Big Data, Artificial Intelligence, Machine Learning and Data Protection” (2017)’. [Online]. Available: https://ico.org.uk/media/for-organisations/documents/2013559/big-data-ai-ml-and-data-protection.pdf
[39]
Polonetsky, J.; Tene, O., ‘Privacy and Big Data: Making Ends Meet’, Stanford Law Review Online, [Online]. Available: http://heinonline.org/HOL/Page?public=false&handle=hein.journals/slro66&id=25
[40]
J. Lane, V. Stodden, S. Bender, and H. F. Nissenbaum, Privacy, big data, and the public good: frameworks for engagement. Cambridge: Cambridge University Press, 2014.
[41]
I. S. Rubinstein, ‘Big Data: The End of Privacy or a New Beginning?’, International Data Privacy Law, vol. 3, no. 2, pp. 74–87, May 2013, doi: 10.1093/idpl/ips036.
[42]
‘UK ICO, “Big Data, Artificial Intelligence, Machine Learning and Data Protection” (2017)’. [Online]. Available: https://ico.org.uk/media/for-organisations/documents/2013559/big-data-ai-ml-and-data-protection.pdf
[43]
H. F. Nissenbaum, Privacy in context: technology, policy, and the integrity of social life. Stanford, Calif: Stanford Law Books, 2010.
[44]
van der Sloot, B.; van Schendel, S., ‘Ten Questions for Future Regulation of Big Data: A Comparative and Empirical Legal Study’, Journal of Intellectual Property, Information Technology and Electronic Commerce Law, [Online]. Available: http://heinonline.org/HOL/Page?public=false&handle=hein.journals/jipitec7&id=116
[45]
V. Mayer-Schönberger and K. Cukier, Big data: a revolution that will transform how we live, work and think. London: John Murray, 2013.
[46]
Mayer-Schonberger, V.; Padova, Y., ‘Regime Change: Enabling Big Data through Europe’s New Data Protection Regulation’, Columbia Science and Technology Law Review, [Online]. Available: http://heinonline.org/HOL/Page?public=false&handle=hein.journals/cstlr17&id=1
[47]
A. Mantelero, ‘The future of consumer data protection in the E.U. Re-thinking the "notice and consent” paradigm in the new era of predictive analytics’, Computer Law & Security Review, vol. 30, no. 6, pp. 643–660, Dec. 2014, doi: 10.1016/j.clsr.2014.09.004.
[48]
F. H. Cate and V. Mayer-Schonberger, ‘Notice and consent in a world of Big Data’, International Data Privacy Law, vol. 3, no. 2, pp. 67–73, May 2013, doi: 10.1093/idpl/ipt005.
[49]
Wachter, S.; Mittelstadt, B., ‘A Right to Reasonable Inferences: Re-Thinking Data Protection Law in the Age of Big Data and AI’, Columbia Business Law Review, [Online]. Available: http://heinonline.org/HOL/Page?public=false&handle=hein.journals/colb2019&id=1
[50]
A. Murray, Information technology law: the law & society, 4th edition. Oxford: Oxford University Press, 2019.
[51]
D. Rowland, U. Kohl, and A. Charlesworth, Information technology law, Fifth edition. Abingdon, Oxon: Routledge, 2017.
[52]
‘A multi-dimensional approach to disinformation : report of the independent High level Group on fake news and online disinformation.’ [Online]. Available: https://publications.europa.eu/en/publication-detail/-/publication/6ef4df8b-4cea-11e8-be1d-01aa75ed71a1
[53]
‘Code of Practice on Disinformation’. [Online]. Available: https://ec.europa.eu/digital-single-market/en/news/code-practice-disinformation
[54]
Napoli, P. M., ‘What If More Speech Is No Longer the Solution: First Amendment Theory Meets Fake News and the Filter Bubble’, Federal Communications Law Journal, [Online]. Available: http://heinonline.org/HOL/Page?public=false&handle=hein.journals/fedcom70&id=67
[55]
Chesney, R.; Citron, D., ‘Deepfakes and the New Disinformation War: The Coming Age of Post-Truth Geopolitics’, Foreign Affairs, [Online]. Available: http://heinonline.org/HOL/Page?public=false&handle=hein.journals/fora98&id=1
[56]
Balkin, J. M., ‘Digital Speech and Democratic Culture: A Theory of Freedom of Expression for the Information Society’, New York University Law Review, [Online]. Available: http://heinonline.org/HOL/Page?public=false&handle=hein.journals/nylr79&id=15
[57]
E. B. Laidlaw, Regulating speech in cyberspace: gatekeepers, human rights and corporate responsibility. Cambridge, United Kingdom: Cambridge University Press, 2015.
[58]
E. M. Barendt, Freedom of speech, 2nd ed. Oxford: Oxford University Press, 2009.
[59]
D. M. J. Lazer, ‘The science of fake news’, Science, vol. 359, no. 6380, pp. 1094–1096, Mar. 2018, doi: 10.1126/science.aao2998.
[60]
‘• House of Commons Digital, Culture, Media and Sport Committee, Disinformation and “fake news”: Final Report HC 1791 Eighth Report of Session 2017–19’. [Online]. Available: https://publications.parliament.uk/pa/cm201719/cmselect/cmcumeds/1791/1791.pdf
[61]
Goldberg, D., ‘Responding to Fake News: Is There an Alternative to Law and Regulation’, Southwestern Law Review, [Online]. Available: http://heinonline.org/HOL/Page?public=false&handle=hein.journals/swulr47&id=1
[62]
A. Murray, Information technology law: the law & society, 4th edition. Oxford: Oxford University Press, 2019.
[63]
D. Rowland, U. Kohl, and A. Charlesworth, Information technology law, Fifth edition. Abingdon, Oxon: Routledge, 2017.
[64]
D. Rowland, U. Kohl, and A. Charlesworth, Information technology law, Fifth edition. Abingdon, Oxon: Routledge, 2017.
[65]
A. Mills, ‘The law applicable to cross-border defamation on social media: whose law governs free speech in “Facebookistan”?’, Journal of Media Law, vol. 7, no. 1, pp. 1–35, Jan. 2015, doi: 10.1080/17577632.2015.1055942.
[66]
‘• E Laidlaw and H Young, Internet Intermediary Liability in Defamation: Proposals For Statutory Reform: Defamation Law in the Internet Age (2017)’. [Online]. Available: http://www.lco-cdo.org/wp-content/uploads/2017/07/DIA-Commissioned-Paper-Laidlaw-and-Young.pdf
[67]
L. Edwards, Ed., Law, policy, and the Internet. Oxford, UK: Hart Publishing, 2019.
[68]
Thompson, M., ‘Beyond Gatekeeping: The Normative Responsibility of Internet Intermediaries’, Vanderbilt Journal of Entertainment & Technology Law, [Online]. Available: http://heinonline.org/HOL/Page?public=false&handle=hein.journals/vanep18&id=807
[69]
D. Mangan, ‘Regulating for responsibility: reputation and social media’, International Review of Law, Computers & Technology, vol. 29, no. 1, pp. 16–32, Jan. 2015, doi: 10.1080/13600869.2015.1008960.
[70]
E. B. Laidlaw, Regulating Speech in Cyberspace. Cambridge: Cambridge University Press, 2015 [Online]. Available: http://ebooks.cambridge.org/ref/id/CBO9781107278721
[71]
P. P. Polański, ‘Rethinking the notion of hosting in the aftermath of Delfi: Shifting from liability to responsibility?’, Computer Law & Security Review, vol. 34, no. 4, pp. 870–880, Aug. 2018, doi: 10.1016/j.clsr.2018.05.034.
[72]
D. Mangan and L. E. Gillies, Eds., ‘An unwholesome layer cake: intermediary liability in English defamation and data protection law’, in The Legal Challenges of Social Media, 2017 [Online]. Available: https://www.elgaronline.com/view/edcoll/9781785364501/9781785364501.00025.xml
[73]
D. Rowland, U. Kohl, and A. Charlesworth, Information technology law, Fifth edition. Abingdon, Oxon: Routledge, 2017.
[74]
A. Murray, Information technology law: the law & society, 4th edition. Oxford: Oxford University Press, 2019.
[75]
S. Fafinski, Computer misuse: response, regulation, and the law. Cullompton, Devon: Willan Pub, 2009.
[76]
A. Murray, Information technology law: the law & society, 4th edition. Oxford: Oxford University Press, 2019.
[77]
S. Fafinski, Computer misuse: response, regulation, and the law. Cullompton, Devon: Willan Pub, 2009.
[78]
S. Fafinski, ‘Computer Misuse: The Implications of the Police and Justice Act 2006’, The Journal of Criminal Law, vol. 72, no. 1, pp. 53–66, Feb. 2008, doi: 10.1350/jcla.2008.72.1.477.
[79]
A. A. Gillespie, Cybercrime: Key Issues and Debates, 2nd ed. Milton: Routledge, 2019.
[80]
J. Clough, Principles of Cybercrime. Cambridge: Cambridge University Press, 2015 [Online]. Available: http://ebooks.cambridge.org/ref/id/CBO9781139540803
[81]
I. Walden, Computer crimes and digital investigations, 2nd edition. Oxford: Oxford University Press, 2016.
[82]
F. Calderoni, ‘The European legal framework on cybercrime: striving for an effective implementation’, Crime, Law and Social Change, vol. 54, no. 5, pp. 339–357, Dec. 2010, doi: 10.1007/s10611-010-9261-6.
[83]
G. Davies, ‘Court of Appeal High Court’, The Journal of Criminal Law, vol. 82, no. 4, pp. 296–300, Aug. 2018, doi: 10.1177/0022018318791670.
[84]
A. Murray, Information technology law: the law & society, 4th edition. Oxford: Oxford University Press, 2019.
[85]
Richards, Neil M.1 (AUTHOR), ‘THE DANGERS OF SURVEILLANCE.’, Harvard Law Review, vol. 126, no. Issue 7, pp. 1934–1965, 2013 [Online]. Available: http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=87598612&site=ehost-live
[86]
‘Addressing the Harm of Total Surveillance: A Reply to Professor Neil Richards - Harvard Law Review’ [Online]. Available: https://harvardlawreview.org/2013/06/addressing-the-harm-of-total-surveillance-a-reply-to-professor-neil-richards/
[87]
Solove, D. J., ‘I’ve Got Nothing to Hide and Other Misunderstandings of Privacy’, San Diego Law Review, [Online]. Available: http://heinonline.org/HOL/Page?public=false&handle=hein.journals/sanlr44&id=1
[88]
D. Rowland, U. Kohl, and A. Charlesworth, Information technology law, Fifth edition. Abingdon, Oxon: Routledge, 2017.
[89]
N. Ni Loideain, ‘EU Law and Mass Internet Metadata Surveillance in the Post-Snowden Era’, Media and Communication, vol. 3, no. 2, Sep. 2015, doi: 10.17645/mac.v3i2.297.
[90]
Kouvakas, I., ‘The Watson Case: Another Missed Opportunity for Stricto Sensu Proportionality’, Cambridge Law Review, [Online]. Available: http://heinonline.org/HOL/Page?public=false&handle=hein.journals/cambrilv2&id=181
[91]
Cameron, Iain, ‘A. Court of Justice Balancing data protection and law enforcement needs: Tele2 Sverige and Watson’, Common Market Law Review, vol. 54, no. 5, pp. 1467–1495 [Online]. Available: http://www.kluwerlawonline.com/abstract.php?area=Journals&id=COLA2017119
[92]
L. Edwards, Ed., Law, policy, and the Internet. Oxford, UK: Hart Publishing, 2019.
[93]
D. Rowland, U. Kohl, and A. Charlesworth, Information technology law, Fifth edition. Abingdon, Oxon: Routledge, 2017.
[94]
Klerman, D., ‘Forum Selling and Domain-Name Disputes’, Loyola University Chicago Law Journal, [Online]. Available: http://heinonline.org/HOL/Page?public=false&handle=hein.journals/luclj48&id=1
[95]
D. Mac Sithigh, ‘More than words: the introduction of internationalised domain names and the reform of generic top-level domains at ICANN’, International Journal of Law and Information Technology, vol. 18, no. 3, pp. 274–300, Sep. 2010, doi: 10.1093/ijlit/eaq007.
[96]
Arnot, J. A., ‘Navigating Cybersquatting Enforcement in the Expanding Internet’, John Marshall Review of Intellectual Property Law, [Online]. Available: http://heinonline.org/HOL/Page?public=false&handle=hein.journals/johnmars13&id=329
[97]
‘Uniform Domain-Name Dispute-Resolution Policy - ICANN’. [Online]. Available: https://www.icann.org/resources/pages/help/dndr/udrp-en
[98]
Holstein-Childress, V., ‘Lex Cyberus: The UDRP as a Gatekeeper to Judicial Resolution of Competing Rights to Domain Names’, Penn State Law Review, [Online]. Available: http://heinonline.org/HOL/Page?public=false&handle=hein.journals/dlr109&id=575
[99]
Geist, M., ‘Fair.Com: An Examination of the Allegations of Systemic Unfairness in the ICANN UDRP’, Brooklyn Journal of International Law, [Online]. Available: http://heinonline.org/HOL/Page?public=false&handle=hein.journals/bjil27&id=915
[100]
A. Murray, Information technology law: the law & society, 4th edition. Oxford: Oxford University Press, 2019.
[101]
Lindsay, D., ‘Website Blocking Injunctions to Prevent Copyright Infringements: Proportionality and Effectiveness’, University of New South Wales Law Journal, [Online]. Available: http://heinonline.org/HOL/Page?public=false&handle=hein.journals/swales40&id=1528
[102]
A. R. Lodder and Puck Polter, ‘ISP blocking and filtering: on the shallow justification in case law regarding effectiveness of measures’, European Journal of Law and Technology, vol. 8, no. 2, Nov. 2017 [Online]. Available: http://ejlt.org/article/view/517
[103]
Geiger, C.; Izyumenko, E., ‘The Role of Human Rights in Copyright Enforcement Online: Elaborating a Legal Framework for Website Blocking’, American University International Law Review, [Online]. Available: http://heinonline.org/HOL/Page?public=false&handle=hein.journals/amuilr32&id=1
[104]
W. Michael and S. Rebecca, ‘‘Searching for the Silver Bullet: How Website Blocking Injunctions are Changing Online IP Enforcement’, Australian Intellectual Property Journal, vol. 25, 2014.
[105]
Bernd Justin Jütte*, ‘The beginning of a (happy?) relationship: copyright and freedom of expression in Europe’, European Intellectual Property Review, vol. 38, pp. 11–22, 2016 [Online]. Available: http://signon.thomsonreuters.com/federation/UKF?entityID=https%3A%2F%2Fidp.bris.ac.uk%2Fshibboleth&returnto=https%3A%2F%2Fwestlawuk.thomsonreuters.co.uk%2FBrowse%2FHome%2FWestlawUK%3FskipAnonymous%3Dtrue
[106]
T.-E. Synodinou, ‘Intermediaries’ liability for online copyright infringement in the EU: Evolutions and confusions’, Computer Law & Security Review, vol. 31, no. 1, pp. 57–67, Feb. 2015, doi: 10.1016/j.clsr.2014.11.010.
[107]
C. Angelopoulos, ‘Sketching the outline of a ghost: the fair balance between copyright and fundamental rights in intermediary third party liability’, info, vol. 17, no. 6, pp. 72–96, Sep. 2015, doi: 10.1108/info-05-2015-0028.
[108]
J. J. Bryson, M. E. Diamantis, and T. D. Grant, ‘Of, for, and by the people: the legal lacuna of synthetic persons’, Artificial Intelligence and Law, vol. 25, no. 3, pp. 273–291, Sep. 2017, doi: 10.1007/s10506-017-9214-9.
[109]
Guihot, M.; Matthew, A. F.; Suzor, N. P., ‘Nudging Robots: Innovative Solutions to Regulate Artificial Intelligence’, Vanderbilt Journal of Entertainment & Technology Law, [Online]. Available: http://heinonline.org/HOL/Page?public=false&handle=hein.journals/vanep20&id=1
[110]
C. Reed, ‘How should we regulate artificial intelligence?’, Philosophical transactions. Series A, Mathematical, physical, and engineering sciences, vol. 376, no. 2128, Sep. 2018 [Online]. Available: https://royalsocietypublishing.org/doi/full/10.1098/rsta.2017.0360
[111]
W. Barfield and U. Pagallo, Eds., Research handbook on the law of artificial intelligence. Cheltenham, UK: Edward Elgar Publishing, 2018 [Online]. Available: https://www.elgaronline.com/view/edcoll/9781786439048/9781786439048.xml
[112]
‘• European Parliament Committee on Legal Affairs, “Report with Recommendations to the Commission on Civil Law Rules on Robotics” (2015/2103(INL)) A8-0005/27 January 2017’. [Online]. Available: http://www.europarl.europa.eu/doceo/document/A-8-2017-0005_EN.html
[113]
‘Science and Technology Committee, Robotics and Artificial Intelligence (HC 2016-145)’. [Online]. Available: https://publications.parliament.uk/pa/cm201617/cmselect/cmsctech/145/14502.htm
[114]
‘Artificial Intelligence Committee, AI in the UK: Ready, Willing and Able? (HL 2018 - 100)’. [Online]. Available: https://publications.parliament.uk/pa/ld201719/ldselect/ldai/100/100.pdf
[115]
Ryan Calo, ‘Robotics and the Lessons of Cyberlaw’, California Law Review, vol. 103, no. 3, 2015 [Online]. Available: https://www.jstor.org/stable/24758483?seq=1#metadata_info_tab_contents
[116]
Balkin, Jack M., ‘The Path of Robotics Law’ [Online]. Available: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2586570