Academic and related sources
Agre, P. and Rotenberg, M. 1997. Technology and Privacy: The New Landscape. Cambridge, MA, MIT Press.
Allen, A. L. 2003. Why Privacy Isn’t Everything: Feminist Reflections on Personal Accountability. Lanham, MD, Rowman & Littlefield.
Allen, A. L. and Mack, E. 1991. How Privacy Got Its Gender. Northern Illinois Law Review 10: 441–71.
Ayres, I. 2007. Super Crunchers: How Anything Can Be Predicted. London, John Murray.
Bell, C. G. and Gemmell, J. 2009. Total Recall: How the E-Memory Revolution Will Change Everything. New York, Dutton.
Bernal, P. 2010a. Collaborative Consent: Harnessing the Strengths of the Internet for Consent in the Online Environment. International Review of Law, Computers & Technology 24: 287–98.
Bernal, P. 2010b. Web 2.5: The Symbiotic Web. International Review of Law, Computers & Technology 24: 25–37.
Bernal, P. 2011b. Rise and Phall: Lessons from the Phorm Saga, in S. Gutwirth, Y. Poullet, P. De Hert and R. Leenes (eds.) Computers, Privacy and Data Protection: An Element of Choice. Dordrecht, Springer: 269–83.
Bernal, P. 2014. The EU, the US and the Right to be Forgotten, in S. Gutwirth, P. De Hert and R. Leenes (eds.) Computers, Privacy and Data Protection – Reloading Data Protection. Dordrecht, Springer: 61–77.
Berners-Lee, T. and Fischetti, M. 2000. Weaving the Web: The Original Design and Ultimate Destiny of the World Wide Web by its Inventor. New York, HarperCollins Publishers.
Brin, D. 1998. The Transparent Society: Will Technology Force Us to Choose Between Privacy and Freedom?Reading, MA, Addison-Wesley.
Brown, I. 2010. Communications Data Retention in an Evolving Internet. International Journal of Law and Information Technology 19.
Brown, I. 2012. Government Access to Private-Sector Data in the United Kingdom. International Data Privacy Law 2: 9.
Burghardt, T., Böhm, K., Buchmann, E., Kühling, J. and Sivridis, A. 2010. A Study on the Lack of Enforcement of Data Protection Acts, in A. B. Sideridis and C. Z. Patrikakis (eds.) Next Generation Society. Technological and Legal Issues. Berlin, Springer, pp. 3–12.
Cate, F. H. 1997. Privacy in the Information Age. Washington, DC, Brookings Institution Press.
Clark, A. and Chalmers, D. J. 1998. The Extended Mind. Analysis 58: 10–23.
Cochrane, A. 2007. Animal Rights and Animal Experiments: An Interest-Based Approach. Res Publica 13: 26.
Cohen, J. E. 2012. Configuring the Networked Self: Law, Code, and The Play of Everyday Practice. New Haven, CT., Yale University Press.
Crisp, R. 1987. Persuasive Advertising, Autonomy, and the Creation of Desire. Journal of Business Ethics 6: 413–18.
Dahl, J. Y. and Sætnan, A. R. 2009. ‘It All Happened So Slowly’ – On Controlling Function Creep in Forensic DNA Databases. International Journal of Law, Crime and Justice 37: 83–103.
Davies, S. G. 1997. Re-engineering the Right to Privacy: How Privacy Has Been Transformed from a Right to a Commodity, in P. Agre and M. Rotenberg (eds.) Technology and Privacy: The New Landscape. Cambridge, MA, MIT Press, pp. 143–65.
Edwards, L. and Waelde, C. 2000. Law and the Internet: A Framework for Electronic Commerce. Oxford, Hart.
Fearon, J. D. 1999. What is Identity (as We Now Use the Word)?Mimeo, Inc., Stanford University.
Franklin, B. and Franklin, W. T. 1818. Memoirs of the Life and Writings of Benjamin Franklin. London, Henry Colburn.
Fura, E. and Klamberg, M. 2012. The Chilling Effect of Counter-Terrorism Measures: A Comparative Analysis of Electronic Surveillance Laws in Europe and the USA, in J. Casadevall, E. Myjer, and M. O’Boyle (eds.) Freedom of Expression – Essays in Honour of Nicolas Bratza – President of the European Court of Human Rights. Oisterwijk, Wolf Legal Publishers, pp. 463–81.
Gandy, O. H. 1993. The Panoptic Sort: A Political Economy of Personal Information, Boulder, CO, Westview.
Gearty, C. A. 2006. Can Human Rights Survive?Cambridge University Press.
Gewirth, A. 1982. Human Rights: Essays on Justification and Applications. London, University of Chicago Press.
Ginsberg, J., Mohebbi, M. H., Patel, R. S., Brammer, L., Smolinski, M. S. and Brilliant, L. 2009. Detecting Influenza Epidemics Using Search Engine Query Data. Nature 457: 1012–14.
Greenleaf, G. 2008. Function Creep – Defined and Still Dangerous in Australia’s Revised ID Card Bill. Computer Law & Security Report 24: 56–65.
Hart, H. L. A. 1955. Are There Any Natural Rights?Philosophical Review 64: 175–91.
Hunter, D. 2001. Philippic.com. California Law Review 90: 70.
Jackson, E. 2001. Regulating Reproduction: Law, Technology and Autonomy. Oxford, Hart.
Kelly, P. J. 1990. Utilitarianism and Distributive Justice: Jeremy Bentham and the Civil Law. Oxford, Clarendon.
Klamberg, M. 2010. FRA and the European Convention on Human Rights – A Paradigm Shift in Swedish Electronic Surveillance Law, in D. W. Schartaum (ed.) Nordic Yearbook of Law and Information Technology. Bergen, Fagforlaget, pp. 96–134.
Klug, F. 2000. Values for a Godless Age: The Story of the UK’s New Bill of Rights. London, Penguin.
Kosinski, M.,
Stillwell, D. and
Graepel, T. 2013.
Private Traits and Attributes Are Predictable from Digital Records of Human Behavior.
Proceedings of the National Academy of Sciences of the United States of America 110:
5802–5. Available at
www.pnas.org/content/early/2013/03/06/1218772110.full.pdf.
Kosta, E. 2013. The Way to Luxembourg: National Court Decisions on the Compatibility of the Data Retention Directive with the Rights to Privacy and Data Protection. SCRIPTed 10: 24.
Landau, S. 2011. Surveillance or Security? The Real Risks Posed by New Wiretapping Technologies. Cambridge, MA, The MIT Press.
Lessig, L. 2006. Code: Version 2.0. New York, Basic Books.
MacIntyre, A. 1981. After Virtue: A Study in Moral Theory. London, Duckworth.
McIntyre, T. J. and Scott, C. D. 2008. Internet Filtering: Rhetoric, Legitimacy, Accountability and Responsibility, in R. Brownsword and K. Yeung (eds.) Regulating Technologies. Oxford, Hart Publishing, pp. 109–24.
Mayer-Schönberger, V. 2009. Delete: The Virtue of Forgetting in the Digital Age. Princeton University Press.
Mill, J. S. and Himmelfarb, G. 1982. On Liberty. Harmondsworth, Penguin.
Mossberger, K., Tolbert, C. J. and Stansbury, M. 2003. Virtual Inequality: Beyond the Digital Divide. Washington, DC, Georgetown University Press.
Murray, A. D. 2004. Should States Have a Right to Informational Privacy? In A. D. Murray and M. Klang (eds.) Human Rights in the Digital Age. London, The Glasshouse Press, pp. 191–202.
Murray, A. D. 2006. The Regulation of Cyberspace: Control in the Online Environment, Milton Park, Abingdon, UK, and New York, Routledge-Cavendish.
Murray, A. D. 2011. Transparency, Scrutiny and Responsiveness: Fashioning a Private Space. Political Quarterly 83: 509–14.
Murray, A. D. 2013. Information Technology Law: The Law and Society, 2nd ed., Oxford University Press.
Narayanan, A. and Shmatikov, V. 2008. Robust De-anonymization of Large Sparse Datasets. IEEE Symposium on Security and Privacy.
Nissenbaum, H. F. 2010. Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford, CA, Stanford Law Books.
Norris, P. 2001. Digital Divide: Civic Engagement, Information Poverty, and the Internet Worldwide. Cambridge University Press.
Ohm, P. 2010. Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization. UCLA Law Review 57: 1701–78.
Paine, T. and Burke, E. 1791. Rights of Man: Being an Answer to Mr. Burke’s Attack on the French Revolution. Dublin, s.n.
Pariser, E. 2011. The Filter Bubble: What the Internet is Hiding From You. London, Viking.
Posner, R. A. 1998. Economic Analysis of Law, Boston, MA, Aspen Law & Business.
Poynter, K. 2008. Review of Information Security at HM Revenue and Customs. London, HMSO.
Rawls, J. and Freeman, S. R. 1999. Collected Papers. Cambridge, MA, Harvard University Press.
Raz, J. 1986. The Morality of Freedom. Oxford, Clarendon.
Reed, C. 2004. Internet Law: Text and Materials. Cambridge University Press.
Reed, C. 2010. Think Global, Act Local: Extraterritoriality in Cyberspace. Working Paper Series, Queen Mary University of London School of Law.
Reed, C. 2012. Making Laws for Cyberspace. Oxford University Press.
Ricoeur, P. 2005. The Course of Recognition. Cambridge, MA, Harvard University Press.
Rorty, R. 1993. Human Rights, Rationality and Sentimentality, in S. Shute and S. L. Hurley (eds.) On Human Rights: Oxford Amnesty Lectures. Oxford: BasicBooks: 167–85.
Rosen, J. 2012. The Right to be Forgotten. Stanford Law Review Online, 64.
Samuelson, P. 2000. Privacy as Intellectual Property. Stanford Law Review 52: 1125–75.
Smartt, U. 2012. Safety First: the Ryan Giggs Superinjunction Part 2 of March 2012. Communications Law 17: 3.
Solove, D. J. 2007. ‘I’ve Got Nothing to Hide’ and Other Misunderstandings of Privacy. San Diego Law Review 44: 745–72.
Solove, D. J. 2011. Nothing to Hide: The False Tradeoff Between Privacy and Security. New Haven, CT, Yale University Press.
Sunstein, C. R. 2007. Republic.com 2.0. Princeton University Press.
Sweeney, L. 1997. Weaving Technology and Policy Together To Maintain Confidentiality. Journal of Law, Medicine and Ethics 25: 98–110.
Taylor, C. 1992. The Ethics of Authenticity. Cambridge, MA, Harvard University Press.
Teff, H. 1994. Reasonable Care: Legal Perspectives on the Doctor–Patient Relationship. Oxford, Clarendon Press;New York, Oxford University Press.
Tene, O. 2013. Me, Myself and I: Aggregated and Disaggregated Identities on Social Networking Services. Journal of International Commercial Law and Technology 8: 118–33.
Tene, O. and Wolf, C. 2013. The Draft EU General Data Protection Regulation: Costs and Paradoxes of Explicit Consent. Washington, DC, Future of Privacy Forum.
Thomas, R. and Walport, M. 2008. Data Sharing Review Report. London, Ministry of Justice.
Thomas, T. 2008. The Sex Offender ‘Register’: A Case Study in Function Creep. The Howard Journal 47: 227–37.
Turkle, S. 1996. Life on the Screen: Identity in the Age of the Internet. London, Weidenfeld & Nicolson.
Turow, J., King, J., Hoofnagle, C. J., Bleakley, A. and Hennessy, M. 2009. Americans Reject Tailored Advertising. Annenberg, University of Pennsylvania.
Vaidhyanathan, S. 2011. The Googlization of Everything: (And Why We Should Worry), Berkeley, University of California Press.
Van den Poel, D. and Buckinx, W. 2005. Predicting Online-Purchasing Behaviour. European Journal of Operational Research 166: 557–75.
Walker, C. 2009. Data Retention in the UK: Pragmatic and Proportionate, or a Step too Far?Computer Law & Security Review 25: 325–34.
Warren, S. and Brandeis, L. D. 1890. The Right to Privacy. Harvard Law Review 4: 193–220.