‘A Declaration of the Independence of Cyberspace | Electronic Frontier Foundation’ <https://www.eff.org/cyberspace-independence>
‘A Multi-Dimensional Approach to Disinformation : Report of the Independent High Level Group on Fake News and Online Disinformation.’ <https://publications.europa.eu/en/publication-detail/-/publication/6ef4df8b-4cea-11e8-be1d-01aa75ed71a1>
‘Addressing the Harm of Total Surveillance: A Reply to Professor Neil Richards - Harvard Law Review’ <https://harvardlawreview.org/2013/06/addressing-the-harm-of-total-surveillance-a-reply-to-professor-neil-richards/>
Angelopoulos, Christina, ‘Sketching the Outline of a Ghost: The Fair Balance between Copyright and Fundamental Rights in Intermediary Third Party Liability’, Info, 17.6 (2015), 72–96 <https://doi.org/10.1108/info-05-2015-0028>
Arnot, J. A., ‘Navigating Cybersquatting Enforcement in the Expanding Internet’, John Marshall Review of Intellectual Property Law, <http://heinonline.org/HOL/Page?public=false&amp;handle=hein.journals/johnmars13&amp;id=329>
‘Artificial Intelligence Committee, AI in the UK: Ready, Willing and Able? (HL 2018 - 100)’ <https://publications.parliament.uk/pa/ld201719/ldselect/ldai/100/100.pdf>
Balkin, J. M., ‘Digital Speech and Democratic Culture: A Theory of Freedom of Expression for the Information Society’, New York University Law Review, <http://heinonline.org/HOL/Page?public=false&amp;handle=hein.journals/nylr79&amp;id=15>
Balkin, Jack M., ‘The Path of Robotics Law’ <https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2586570>
Barendt, E. M., Freedom of Speech, 2nd ed (Oxford: Oxford University Press, 2009)
Barfield, Woodrow, and Ugo Pagallo, eds., Research Handbook on the Law of Artificial Intelligence (Cheltenham, UK: Edward Elgar Publishing, 2018) <https://www.elgaronline.com/view/edcoll/9781786439048/9781786439048.xml>
Bernd Justin Jütte*, ‘The Beginning of a (Happy?) Relationship: Copyright and Freedom of Expression in Europe’, European Intellectual Property Review, 38 (2016), 11–22 <http://signon.thomsonreuters.com/federation/UKF?entityID=https%3A%2F%2Fidp.bris.ac.uk%2Fshibboleth&returnto=https%3A%2F%2Fwestlawuk.thomsonreuters.co.uk%2FBrowse%2FHome%2FWestlawUK%3FskipAnonymous%3Dtrue>
Brown, Ian, and Christopher T. Marsden, Regulating Code: Good Governance and Better Regulation in the Information Age (Cambridge, Mass: The MIT Press)
Bryson, Joanna J., Mihailis E. Diamantis, and Thomas D. Grant, ‘Of, for, and by the People: The Legal Lacuna of Synthetic Persons’, Artificial Intelligence and Law, 25.3 (2017), 273–91 <https://doi.org/10.1007/s10506-017-9214-9>
Calderoni, Francesco, ‘The European Legal Framework on Cybercrime: Striving for an Effective Implementation’, Crime, Law and Social Change, 54.5 (2010), 339–57 <https://doi.org/10.1007/s10611-010-9261-6>
Cameron, Iain, ‘A. Court of Justice Balancing Data Protection and Law Enforcement Needs: Tele2 Sverige and Watson’, Common Market Law Review, 54.5, 1467–95 <http://www.kluwerlawonline.com/abstract.php?area=Journals&amp;id=COLA2017119>
Cate, F. H., and V. Mayer-Schonberger, ‘Notice and Consent in a World of Big Data’, International Data Privacy Law, 3.2 (2013), 67–73 <https://doi.org/10.1093/idpl/ipt005>
‘Centre for Information Policy Leadership, “The Central Role of Organisational Accountability in Data Protection”’ <https://www.informationpolicycentre.com/uploads/5/7/1/0/57104281/cipl_accountability_paper_1_-_the_case_for_accountability_-_how_it_enables_effective_data_protection_and_trust_in_the_digital_society.pdf>
Chesney, R.; Citron, D., ‘Deepfakes and the New Disinformation War: The Coming Age of Post-Truth Geopolitics’, Foreign Affairs, <http://heinonline.org/HOL/Page?public=false&amp;handle=hein.journals/fora98&amp;id=1>
Clough, Jonathan, Principles of Cybercrime (Cambridge: Cambridge University Press, 2015) <https://doi.org/10.1017/CBO9781139540803>
‘Code of Practice on Disinformation’ <https://ec.europa.eu/digital-single-market/en/news/code-practice-disinformation>
Cohen, Julie E., Configuring the Networked Self: Law, Code, and the Play of Everyday Practice (New Haven [Conn.]: Yale University Press)
Davies, Gemma, ‘Court of Appeal High Court’, The Journal of Criminal Law, 82.4 (2018), 296–300 <https://doi.org/10.1177/0022018318791670>
‘• E Laidlaw and H Young, Internet Intermediary Liability in Defamation: Proposals For Statutory Reform: Defamation Law in the Internet Age (2017)’ <http://www.lco-cdo.org/wp-content/uploads/2017/07/DIA-Commissioned-Paper-Laidlaw-and-Young.pdf>
Edwards, Lilian, ed., Law, Policy, and the Internet (Oxford, UK: Hart Publishing, 2019)
———, ed., Law, Policy, and the Internet (Oxford, UK: Hart Publishing, 2019)
———, ed., Law, Policy, and the Internet (Oxford, UK: Hart Publishing, 2019)
———, ed., Law, Policy, and the Internet (Oxford, UK: Hart Publishing, 2019)
‘• European Parliament Committee on Legal Affairs, “Report with Recommendations to the Commission on Civil Law Rules on Robotics” (2015/2103(INL)) A8-0005/27 January 2017’ <http://www.europarl.europa.eu/doceo/document/A-8-2017-0005_EN.html>
Fafinski, Stefan, Computer Misuse: Response, Regulation, and the Law (Cullompton, Devon: Willan Pub, 2009)
———, Computer Misuse: Response, Regulation, and the Law (Cullompton, Devon: Willan Pub, 2009)
———, ‘Computer Misuse: The Implications of the Police and Justice Act 2006’, The Journal of Criminal Law, 72.1 (2008), 53–66 <https://doi.org/10.1350/jcla.2008.72.1.477>
Ferretti, Federico, ‘Data Protection and the Legitimate Interest of Data Controllers: Much Ado about Nothing or the Winter of Rights?’, Common Market Law Review, 51.3, 843–68 <http://www.kluwerlawonline.com/abstract.php?area=Journals&amp;id=COLA2014063>
Geiger, C.; Izyumenko, E., ‘The Role of Human Rights in Copyright Enforcement Online: Elaborating a Legal Framework for Website Blocking’, American University International Law Review, <http://heinonline.org/HOL/Page?public=false&amp;handle=hein.journals/amuilr32&amp;id=1>
Geist, M., ‘Fair.Com: An Examination of the Allegations of Systemic Unfairness in the ICANN UDRP’, Brooklyn Journal of International Law, <http://heinonline.org/HOL/Page?public=false&amp;handle=hein.journals/bjil27&amp;id=915>
Gillespie, Alisdair A., Cybercrime: Key Issues and Debates, 2nd ed (Milton: Routledge, 2019)
Goldberg, D., ‘Responding to Fake News: Is There an Alternative to Law and Regulation’, Southwestern Law Review, <http://heinonline.org/HOL/Page?public=false&amp;handle=hein.journals/swulr47&amp;id=1>
Guihot, M.; Matthew, A. F.; Suzor, N. P., ‘Nudging Robots: Innovative Solutions to Regulate Artificial Intelligence’, Vanderbilt Journal of Entertainment & Technology Law, <http://heinonline.org/HOL/Page?public=false&amp;handle=hein.journals/vanep20&amp;id=1>
Holstein-Childress, V., ‘Lex Cyberus: The UDRP as a Gatekeeper to Judicial Resolution of Competing Rights to Domain Names’, Penn State Law Review, <http://heinonline.org/HOL/Page?public=false&amp;handle=hein.journals/dlr109&amp;id=575>
‘• House of Commons Digital, Culture, Media and Sport Committee, Disinformation and “Fake News”: Final Report HC 1791 Eighth Report of Session 2017–19’ <https://publications.parliament.uk/pa/cm201719/cmselect/cmcumeds/1791/1791.pdf>
Johnson, David R., and David Post, ‘Law and Borders: The Rise of Law in Cyberspace’, Stanford Law Review, 48.5 (1996) <https://doi.org/10.2307/1229390>
Klerman, D., ‘Forum Selling and Domain-Name Disputes’, Loyola University Chicago Law Journal, <http://heinonline.org/HOL/Page?public=false&amp;handle=hein.journals/luclj48&amp;id=1>
Koops, B.-J., ‘The Trouble with European Data Protection Law’, International Data Privacy Law, 4.4 (2014), 250–61 <https://doi.org/10.1093/idpl/ipu023>
Kouvakas, I., ‘The Watson Case: Another Missed Opportunity for Stricto Sensu Proportionality’, Cambridge Law Review, <http://heinonline.org/HOL/Page?public=false&amp;handle=hein.journals/cambrilv2&amp;id=181>
Kuner, Christopher, ‘Reality and Illusion in EU Data Transfer Regulation Post’, German Law Journal, 18.4 (2017), 881–918 <https://doi.org/10.1017/S2071832200022197>
Laidlaw, Emily B., Regulating Speech in Cyberspace (Cambridge: Cambridge University Press, 2015) <https://doi.org/10.1017/CBO9781107278721>
———, Regulating Speech in Cyberspace: Gatekeepers, Human Rights and Corporate Responsibility (Cambridge, United Kingdom: Cambridge University Press, 2015)
Lane, Julia, Victoria Stodden, Stefan Bender, and Helen Fay Nissenbaum, Privacy, Big Data, and the Public Good: Frameworks for Engagement (Cambridge: Cambridge University Press, 2014)
Lawrence, Lessig, ‘Code Version 2.0’ <http://codev2.cc/download+remix/Lessig-Codev2.pdf>
———, ‘Code Version 2.0’ <http://codev2.cc/download+remix/Lessig-Codev2.pdf>
Lazer, David M. J., ‘The Science of Fake News’, Science, 359.6380 (2018), 1094–96 <https://doi.org/10.1126/science.aao2998>
Lindsay, D., ‘Website Blocking Injunctions to Prevent Copyright Infringements: Proportionality and Effectiveness’, University of New South Wales Law Journal, <http://heinonline.org/HOL/Page?public=false&amp;handle=hein.journals/swales40&amp;id=1528>
Lodder, Arno R. and Puck Polter, ‘ISP Blocking and Filtering: On the Shallow Justification in Case Law Regarding Effectiveness of Measures’, European Journal of Law and Technology, 8.2 (2017) <http://ejlt.org/article/view/517>
Lynskey, Orla, The Foundations of EU Data Protection Law, First edition (Oxford, United Kingdom: Oxford University Press, 2015)
Mac Sithigh, D., ‘More than Words: The Introduction of Internationalised Domain Names and the Reform of Generic Top-Level Domains at ICANN’, International Journal of Law and Information Technology, 18.3 (2010), 274–300 <https://doi.org/10.1093/ijlit/eaq007>
Mangan, David, ‘Regulating for Responsibility: Reputation and Social Media’, International Review of Law, Computers & Technology, 29.1 (2015), 16–32 <https://doi.org/10.1080/13600869.2015.1008960>
Mangan, David, and Lorna E. Gillies, eds., ‘An Unwholesome Layer Cake: Intermediary Liability in English Defamation and Data Protection Law’, in The Legal Challenges of Social Media, 2017 <https://www.elgaronline.com/view/edcoll/9781785364501/9781785364501.00025.xml>
Mantelero, Alessandro, ‘The Future of Consumer Data Protection in the E.U. Re-Thinking the "notice and Consent” Paradigm in the New Era of Predictive Analytics’, Computer Law & Security Review, 30.6 (2014), 643–60 <https://doi.org/10.1016/j.clsr.2014.09.004>
Mayer-Schonberger, V., ‘Demystifying Lessig’, Wisconsin Law Review , <http://heinonline.org/HOL/Page?public=false&amp;handle=hein.journals/wlr2008&amp;id=725>
Mayer-Schonberger, V.; Padova, Y., ‘Regime Change: Enabling Big Data through Europe’s New Data Protection Regulation’, Columbia Science and Technology Law Review, <http://heinonline.org/HOL/Page?public=false&amp;handle=hein.journals/cstlr17&amp;id=1>
Mayer-Schönberger, Viktor, and Kenneth Cukier, Big Data: A Revolution That Will Transform How We Live, Work and Think (London: John Murray, 2013)
Michael, Williams, and Smith Rebecca, ‘‘Searching for the Silver Bullet: How Website Blocking Injunctions Are Changing Online IP Enforcement’, Australian Intellectual Property Journal, 25 (2014)
Mills, Alex, ‘The Law Applicable to Cross-Border Defamation on Social Media: Whose Law Governs Free Speech in “Facebookistan”?’, Journal of Media Law, 7.1 (2015), 1–35 <https://doi.org/10.1080/17577632.2015.1055942>
Murray, Andrew, Information Technology Law: The Law & Society, 4th edition (Oxford: Oxford University Press, 2019)
———, Information Technology Law: The Law & Society, 4th edition (Oxford: Oxford University Press, 2019)
———, Information Technology Law: The Law & Society, 4th edition (Oxford: Oxford University Press, 2019)
———, Information Technology Law: The Law & Society, 4th edition (Oxford: Oxford University Press, 2019)
———, Information Technology Law: The Law & Society, 4th edition (Oxford: Oxford University Press, 2019)
———, Information Technology Law: The Law & Society, 4th edition (Oxford: Oxford University Press, 2019)
———, Information Technology Law: The Law & Society, 4th edition (Oxford: Oxford University Press, 2019)
———, Information Technology Law: The Law & Society, 4th edition (Oxford: Oxford University Press, 2019)
———, Information Technology Law: The Law & Society, 4th edition (Oxford: Oxford University Press, 2019)
———, Information Technology Law: The Law & Society, 4th edition (Oxford: Oxford University Press, 2019)
———, Information Technology Law: The Law & Society, 4th edition (Oxford: Oxford University Press, 2019)
Napoli, P. M., ‘What If More Speech Is No Longer the Solution: First Amendment Theory Meets Fake News and the Filter Bubble’, Federal Communications Law Journal, <http://heinonline.org/HOL/Page?public=false&amp;handle=hein.journals/fedcom70&amp;id=67>
Ni Loideain, Nora, ‘EU Law and Mass Internet Metadata Surveillance in the Post-Snowden Era’, Media and Communication, 3.2 (2015) <https://doi.org/10.17645/mac.v3i2.297>
Nissenbaum, Helen Fay, Privacy in Context: Technology, Policy, and the Integrity of Social Life (Stanford, Calif: Stanford Law Books, 2010)
———, Privacy in Context: Technology, Policy, and the Integrity of Social Life (Stanford, Calif: Stanford Law Books, 2010)
Polański, Paul Przemysław, ‘Rethinking the Notion of Hosting in the Aftermath of Delfi: Shifting from Liability to Responsibility?’, Computer Law & Security Review, 34.4 (2018), 870–80 <https://doi.org/10.1016/j.clsr.2018.05.034>
Polonetsky, J.; Tene, O., ‘Privacy and Big Data: Making Ends Meet’, Stanford Law Review Online, <http://heinonline.org/HOL/Page?public=false&amp;handle=hein.journals/slro66&amp;id=25>
Post, David G., ‘What Larry Doesn’t Get: Code, Law, and Liberty in Cyberspace’, Stanford Law Review, 52.5 (2000) <https://doi.org/10.2307/1229518>
Poullet, Yves, ‘Is the General Data Protection Regulation the Solution?’, Computer Law & Security Review, 34.4 (2018), 773–78 <https://doi.org/10.1016/j.clsr.2018.05.021>
Powles, J., ‘The Case That Won’t Be Forgotten’, Loyola University Chicago Law Journal, <http://heinonline.org/HOL/Page?public=false&amp;handle=hein.journals/luclj47&amp;id=1>
Raab, Charles, and Ivan Szekely, ‘Data Protection Authorities and Information Technology’, Computer Law & Security Review, 33.4 (2017), 421–33 <https://doi.org/10.1016/j.clsr.2017.05.002>
Reed, Chris, ‘How Should We Regulate Artificial Intelligence?’, Philosophical Transactions. Series A, Mathematical, Physical, and Engineering Sciences, 376.2128 (2018) <https://royalsocietypublishing.org/doi/full/10.1098/rsta.2017.0360>
———, Making Laws for Cyberspace, 1st ed (Oxford, U.K.: Oxford University Press, 2012)
Reidenberg, J. R., ‘Lex Informatica:  The Formulation of Information Policy Rules through Technology’, Texas Law Review, <http://heinonline.org/HOL/Page?public=false&amp;handle=hein.journals/tlr76&amp;id=571>
Richards, Neil M.1 (AUTHOR), ‘THE DANGERS OF SURVEILLANCE.’, Harvard Law Review, 126.Issue 7 (2013), 1934–65 <http://search.ebscohost.com/login.aspx?direct=true&amp;db=bth&amp;AN=87598612&amp;site=ehost-live>
Rowland, Diane, and et al., eds., Information Technology Law, Fifth edition (Abingdon: Routledge, 2017) <https://doi.org/10.4324/9780203798522>
Rowland, Diane, Uta Kohl, and Andrew Charlesworth, Information Technology Law, Fifth edition (Abingdon, Oxon: Routledge, 2017)
———, Information Technology Law, Fifth edition (Abingdon, Oxon: Routledge, 2017)
———, Information Technology Law, Fifth edition (Abingdon, Oxon: Routledge, 2017)
———, Information Technology Law, Fifth edition (Abingdon, Oxon: Routledge, 2017)
———, Information Technology Law, Fifth edition (Abingdon, Oxon: Routledge, 2017)
———, Information Technology Law, Fifth edition (Abingdon, Oxon: Routledge, 2017)
———, Information Technology Law, Fifth edition (Abingdon, Oxon: Routledge, 2017)
———, Information Technology Law, Fifth edition (Abingdon, Oxon: Routledge, 2017)
———, Information Technology Law, Fifth edition (Abingdon, Oxon: Routledge, 2017)
———, Information Technology Law, Fifth edition (Abingdon, Oxon: Routledge, 2017)
Rubinstein, I. S., ‘Big Data: The End of Privacy or a New Beginning?’, International Data Privacy Law, 3.2 (2013), 74–87 <https://doi.org/10.1093/idpl/ips036>
Ryan Calo, ‘Robotics and the Lessons of Cyberlaw’, California Law Review, 103.3 (2015) <https://www.jstor.org/stable/24758483?seq=1#metadata_info_tab_contents>
‘Science and Technology Committee, Robotics and Artificial Intelligence (HC 2016-145)’ <https://publications.parliament.uk/pa/cm201617/cmselect/cmsctech/145/14502.htm>
Solove, D. J., ‘I’ve Got Nothing to Hide and Other Misunderstandings of Privacy’, San Diego Law Review, <http://heinonline.org/HOL/Page?public=false&amp;handle=hein.journals/sanlr44&amp;id=1>
Synodinou, Tatiana-Eleni, ‘Intermediaries’ Liability for Online Copyright Infringement in the EU: Evolutions and Confusions’, Computer Law & Security Review, 31.1 (2015), 57–67 <https://doi.org/10.1016/j.clsr.2014.11.010>
‘The EU-US Privacy Shield’ <https://iapp.org/media/pdf/resource_center/eu_us_privacy_shield_full_text.pdf.pdf>
Thompson, M., ‘Beyond Gatekeeping: The Normative Responsibility of Internet Intermediaries’, Vanderbilt Journal of Entertainment & Technology Law, <http://heinonline.org/HOL/Page?public=false&amp;handle=hein.journals/vanep18&amp;id=807>
‘UK ICO, “Big Data, Artificial Intelligence, Machine Learning and Data Protection” (2017)’ <https://ico.org.uk/media/for-organisations/documents/2013559/big-data-ai-ml-and-data-protection.pdf>
‘———’ <https://ico.org.uk/media/for-organisations/documents/2013559/big-data-ai-ml-and-data-protection.pdf>
‘Uniform Domain-Name Dispute-Resolution Policy - ICANN’ <https://www.icann.org/resources/pages/help/dndr/udrp-en>
van der Sloot, B.; van Schendel, S., ‘Ten Questions for Future Regulation of Big Data: A Comparative and Empirical Legal Study’, Journal of Intellectual Property, Information Technology and Electronic Commerce Law, <http://heinonline.org/HOL/Page?public=false&amp;handle=hein.journals/jipitec7&amp;id=116>
Veale, Michael, Reuben Binns, and Jef Ausloos, ‘When Data Protection by Design and Data Subject Rights Clash’, International Data Privacy Law, 8.2 (2018), 105–23 <https://doi.org/10.1093/idpl/ipy002>
Vranaki, A. A., ‘Learning Lessons from Cloud Investigations in Europe: Bargaining Enforcement and Multiple Centers of Regulation in Data Protection’, University of Illinois Journal of Law, Technology & Policy, <http://heinonline.org/HOL/Page?public=false&amp;handle=hein.journals/jltp2016&amp;id=1>
———, ‘Regulating Social Networking Sites: Facebook, Online Behavioral Advertising, Data Protection Laws and Powe’, Rutgers Computer and Technology Law Journal, <http://heinonline.org/HOL/Page?public=false&amp;handle=hein.journals/rutcomt43&amp;id=1>
———, ‘Regulating Social Networking Sites: Facebook, Online Behavioral Advertising, Data Protection Laws and Powe’, Rutgers Computer and Technology Law Journal, <http://heinonline.org/HOL/Page?public=false&amp;handle=hein.journals/rutcomt43&amp;id=1>
Vranaki, Asma A.I., ‘Cloud Investigations by European Data Protection Authorities: An Empirical Account’, in Research Handbook on Electronic Commercelaw, ed. by John A. Rothchild, 2016 <https://www.elgaronline.com/view/edcoll/9781783479917/9781783479917.00045.xml>
Wachter, S.; Mittelstadt, B., ‘A Right to Reasonable Inferences: Re-Thinking Data Protection Law in the Age of Big Data and AI’, Columbia Business Law Review, <http://heinonline.org/HOL/Page?public=false&amp;handle=hein.journals/colb2019&amp;id=1>
Walden, Ian, Computer Crimes and Digital Investigations, 2nd edition (Oxford: Oxford University Press, 2016)