A Sexy Guide to Digital Security. (2016). Coding Rights. Retrieved from https://www.codingrights.org/wp-content/uploads/2016/09/zine_ingles_lado2.pdf
Abdullaev, Nabi (2016) Why Russia's LinkedIn Ban Is Not About Internet Freedoms, Forbes https://www.forbes.com/sites/riskmap/2016/12/08/why-russias-linkedin-ban-is-not-about-internet-freedoms/#32203402a78e
Ackerman, S. (2013, July 30). Justice Department to declassify key Yahoo surveillance orders. Retrieved from The Guardian: https://www.theguardian.com/world/2013/jul/30/justice-department-declassify-yahoo-surveillance-orders
Advent International. (2014). “Nets to be acquired by Advent International, ATP and Bain Capital”. Published online 24 March 2017. Copenhagen: Advent International.
Aïmeur, E., Lawani, O., & Dalkir, K. (2016, May). When changing the look of privacy policies affects user trust: An experimental study. Computers in Human Behavior, 58, 368-379. https://doi.org/10.1016/j.chb.2015.11.014
Alsabah Nabil (2017) China’s new Cybersecurity Law, MERICS https://www.merics.org/en/media-contact/press-releases/chinas-new-cybersecurity-law/
Amazon. (2017). https://d0.awsstatic.com/certifications/Information_Request_Report_June_2017.pdf. Retrieved from https://d0.awsstatic.com/certifications/Information_Request_Report_June_2017.pdf
Amnesty International (2017), Russia: VPN ban is a major blow to internet freedom https://www.amnesty.org/en/latest/news/2017/07/russia-vpn-ban-is-a-major-blow-to-internet-freedom/
AOL, Apple, Facebook, Google, LinkedIn, Microsoft, et al. (2017). Reform Government Surveillance. Retrieved from https://www.reformgovernmentsurveillance.com/#may-19.
Apple. (2017). Report on Government and Private Party Requests for Customer Information. Retrieved from https://images.apple.com/legal/privacy/transparency/requests-2017-H1-en.pdf
Bagley, J. (2016, September 18). What is Blockchain Technology? A Step-by-Step Guide For Beginners. Retrieved October 28, 2017, from https://blockgeeks.com/guides/what-is-blockchain-technology/
Ballon, P. (2017, September 1). Why privacy matters in push for smart nations. todayonline.com. Retrieved from http://www.todayonline.com/commentary/why-privacy-matters-push-smart-nations
Bartolini, C. and Siry, L. (2016). The right to be forgotten in the light of the consent of the data subject. Computer Law & Security Review, 32(2), pp.218-237.
Bates, S. (2012). The Prostitute, the Prodigy, and the Private Past. Communication Law and Policy, 17(2), pp.175-233.
Bennet, A. (2016, March 2). Actually, British voters don’t mind mass surveillance. Retrieved from http://www.telegraph.co.uk/news/uknews/terrorism-in-the-uk/12179248/Actually-British-voters-dont-mind-mass-surveillance.html
Bennett, A. (2016). Actually, British voters don’t mind mass surveillance. The Telegraph. Retrieved from: http://www.telegraph.co.uk/news/uknews/terrorism-in-the-uk/12179248/Actually-British-voters-dont-mind-mass-surveillance.html
Berenson, T. (2016, November 3). Melania Trump Says She'll Fight Cyber-Bullying. Time. Retrieved from http://time.com/4556902/melania-trump-donald-first-lady-social-media/
Biagio, S. (2017, October 20). Terrorismo, i big hi-tech al G7: così contrasteremo la cyberpropaganda. Il Sole 24 ORE. Retrieved from http://www.ilsole24ore.com/art/tecnologie/2017-10-20/terrorismo-big-hi-tech-g7-cosi-contrasteremo-cyberpropaganda-163932.shtml?uuid=AEFcJisC
Blaze, M. (2015, December 15). A key under the doormat isn’t safe. Neither is an encryption backdoor. Retrieved from The Washington Post: https://www.washingtonpost.com/news/in-theory/wp/2015/12/15/how-the-nsa-tried-to-build-safe-encryption-but-failed/?utm_term=.7be8fe3fd37e.
Bodoni, S., White, A., & Hodges, J. (2015, January 20). Microsoft Gave Data on Charlie Hebdo Probe to FBI in 45 Minutes. Bloomberg.Com. Retrieved from https://www.bloomberg.com/news/articles/2015-01-20/microsoft-fights-unregulated-snooping-amid-terrorist-threat
Bora, K. (2017). “Sweden's national security at risk after huge leak of confidential data: Why it's a wake-up call for India”. Published 25 July 2017. International Business Times.
Bouie, J. (2013, June 11). Why the Public Doesn't Care about Surveillance. The American Prospect. Retrieved from http://prospect.org/article/why-public-doesnt-care-about-surveillance
Bowcott, O. (2017, September 11). Turks detained for using encrypted app 'had human rights breached'. Retrieved November 05, 2017, from: https://www.theguardian.com/world/2017/sep/11/turks-detained-encrypted-bylock-messaging-app-human-rights-breached
Bowman, C. (2017) Data Localization Laws: an Emerging Global Trend; Jurist http://www.jurist.org/hotline/2017/01/Courtney-Bowman-data-localization.php
Boyer, P. (2017, October 1). Si tu ne viens pas aux GAFAM, les GAFAM iront à toi. (If you do not come to the GAFAM, the GAFAM will come to you). La Tribune.
Brunette, Robert A. (1972) Rehabilitation, Privacy and Freedom of the Press—Striking a New Balance: Briscoe v. Reader’s Digest Association, 5 Loy. L. A. L. Rev. 544, 588.
Brygier, C. (2014, December 7). Google, Facebook, Twitter et cie... Service gratuit contre utilisation de nos données : comment trouver l'équilibre raisonnable. (Google, Facebook, Twitter and co. Free services against the use of our data: how to find the proper balance). Atlantico.
Cann, Y. (2015, April 13). Loi de renseignement : 63% des Français favorables à une limitation des libertés individuelles pour lutter contre le terrorisme . Atlantico. Retrieved from http://www.atlantico.fr/decryptage/63-francais-favorables-limitation-libertes-individuelles-pour-lutter-contre-terrorisme-yves-marie-cann-2089085.html
Cavelty, M. D. (2014). Breaking the Cyber-Security Dilemma: Aligning Security Needs and Removing Vulnerabilities. Science and Engineering Ethics, 20(3), 701-715. Retrieved from: https://www.ncbi.nlm.nih.gov/pubmed/24781874
Center for Democracy & Technology. (2013). Law Enforcement Standards by Country. Retrieved from https://govaccess.cdt.info/standards-le-country.php
Center for Democracy & Technology. (2014). Neither warrants nor subpoenas should reach data stored outside the US. Washington: CDT.
Chander, A., & Le, U. P. (2014). Breaking the Web: Data Localization vs. the Global Internet.
Chandler, A. (2015, April 6) What It Takes to Make People Care About NSA Surveillance. The Atlantic. Retrieved from: https://www.theatlantic.com/national/archive/2015/04/naked-selfies-and-the-nsa/389778/
China Is Building The Mother Of All Reputation Systems To Monitor Citizen Behavior. (2017). Fast Company. Retrieved 11 November 2017, from https://www.fastcompany.com/3050606/china-is-building-the-mother-of-all-reputation-systems-to-monitor-citizen-behavior
China Tells Carriers to Block Access to Personal VPNs by February. (2017). Bloomberg.com. Retrieved 8 November 2017, from https://www.bloomberg.com/news/articles/2017-07-10/china-is-said-to-order-carriers-to-bar-personal-vpns-by-februar
China’s plan to organize its society relies on ‘big data’ to rate everyone. (2017). Washington Post. Retrieved 11 November 2017, from https://www.washingtonpost.com/world/asia_pacific/chinas-plan-to-organize-its-whole-society-around-big-data-a-rating-for-everyone/2016/10/20/1cd0dd9c-9516-11e6-ae9d-0030ac1899cd_story.html?utm_term=.09ff36577867
Clark, I. (2016, March) The digital divide in the post-Snowden era. Journal of Radical Librarianship, [S.l.], v. 2. Available at: https://journal.radicallibrarianship.org/index.php/journal/article/view/12
CNIL (2017) “SNDS : Système National des Données de Santé”. Published online on April 18th 2017.
Cornevin, C. (2017). 57% des Français sont favorables au projet de loi antiterroriste. Le Figaro. Retrieved from: http://www.lefigaro.fr/actualite-france/2017/09/26/01016-20170926ARTFIG00258-57-des-francais-sont-favorables-au-projet-de-loi-antiterroriste.php
Cory, N. (2017). The Worst Innovation Mercantilist Policies of 2016. Information Technology and Innovation Foundation. Retrieved from https://itif.org/publications/2017/01/09/worst-innovation-mercantilist-policies-2016
Das, S. (2017, October 27). Bitcoin Banned as a Payment Method in Indonesia, Adopters Will Be “Dealt With.” CryptoCoinsNews. Retrieved from https://www.cryptocoinsnews.com/bitcoin-banned-payment-method-adopters-will-dealt-indonesian-central-bank/
DeNardis, L. (2010). ‘The Emerging Field of Internet Governance’. Yale Information Society Project Working Paper Series. Retrieved from https://papers.ssrn.com/sol3/papers.cfm?abstract_id=1678343.
Dencik, L. Cable, J. (2017). Digital Citizenship and Surveillance. The Advent of Surveillance Realism: Public Opinion and Activist Responses to the Snowden Leaks. International Journal of Communication, 763–781.
Denyer, S. (2016). “China wants to give all of its citizens a score – and their rating could affect every area of their lives”. Published 22 October 2016. UK: The Independent.
Denyer, S. (2017). China wants to give all of its citizens a score – and those who fall short will be denied basic privileges. The Independent. Retrieved 11 November 2017, fromhttps://www.independent.co.uk/news/world/asia/china-surveillance-big-data-score-censorship-a7375221.html
DIEHL, Kevin A. (2017) Can the U.S. government legally monitor private communications? If so, given the U.S.'s significant protection of privacy rights, what government cannot? Journal of Public Affairs, v. 17, n. 3.
DIY Cybersecurity for Domestic Violence. (2016). Hack*Blossom. Retrieved from https://hackblossom.org/domestic-violence/index.html#threats
Dummett, B. (2017). “Nets A/S sold to private equity for $5.3 billion”. Published 25 September 2017. Market Watch.
Duportail, J. (2017, September 26). I asked Tinder for my data. It sent me 800 pages of my deepest, darkest secrets. The Guardian. Retrieved from https://www.theguardian.com/technology/2017/sep/26/tinder-personal-data-dating-app-messages-hacked-sold
Eckel, M. (2015) New Russian Internet Data Law Raises Questions About Privacy And Compliance RFERL https://www.rferl.org/a/russia-internet-data-law-privacy-compliance/27222557.html
Editorial Board. (2015, November 17). Opinion | Mass Surveillance Isn't the Answer to Fighting Terrorism. Retrieved October 22, 2017, from: https://www.nytimes.com/2015/11/18/opinion/mass-surveillance-isnt-the-answer-to-fighting-terrorism.html
Erlanger, S. & Ewing J. (2013, June 14). Differing Views on Privacy Shape Europe’s Response to U.S. Surveillance Program. New York Times. Retrieved from: http://www.nytimes.com/2013/06/15/world/europe/differences-on-privacy-shape-europes-response-to-us-surveillance.html
Ermoshina, K., & Musiani, F. (2017). Migrating servers, elusive users: Reconfigurations of the Russian Internet in the post-Snowden era. Media and Communication, 5(1)
Ermoshina, K., Halpin, H., & Musiani, F. (2017). Can Johnny build a protocol? Co-ordinating developer and user intentions for privacy-enhanced secure messaging protocols. Presented at the European Workshop on Usable Security, Internet Society. https://doi.org/10.14722/eurousec.2017.23016
Eugène Pirou. (2017). Who’s Who of Victorian Cinema. Retrieved from http://www.victorian-cinema.net/pirou
Eustache, S., Trochet, J. (2017, October 1). Infotainment sites only in it for the clicks. Le Monde Diplomatique (English edition).
Exploring the Potential of Mobile Money Transactions to Inform Policy. (2016). Retrieved from https://www.unglobalpulse.org/projects/exploring-potential-mobile-money-transactions-inform-policy
Facebook. (2017). Government Requests Report. Retrieved from https://govtrequests.facebook.com
Facebook. (2017). Information for Law Enforcement Authorities. Retrieved from Safety: https://www.facebook.com/safety/groups/law/guidelines/.
Ferenstein, G. (2013, November 5). Poll: Public Supports NSA Spying On Their Email, Neighbors And Foreign Leaders. Retrieved from Tech Crunch: https://techcrunch.com/2013/11/05/poll-public-supports-nsa-spying-on-their-email-neighbors-and-foreign-leaders/
Ferenstein, G. (2013). Public supports NSA spying on their email, neighbours and foreign leaders. Tech Crunch. Retrieved from : https://techcrunch.com/2013/11/05/poll-public-supports-nsa-spying-on-their-email-neighbors-and-foreign-leaders/
Frantziou, Eleni. (2014) Further Developments in the Right to be Forgotten: The European Court of Justice’s Judgement in Case C-131/12, Google Spain, SL, Google Inc v Agencia Espanola de Proteccion de Datos. Human Rights Law Review, 14, 761-777.
Freedom House (2016); Freedom of the Net 2016 https://freedomhouse.org/report/freedom-net/2016/russia
Gao, G. (2015, May 29). What Americans think about NSA surveillance, national security and privacy. Pew Research Center. Retrieved from http://www.pewresearch.org/fact-tank/2015/05/29/what-americans-think-about-nsa-surveillance-national-security-and-privacy/
Gibbs, Samuel. (2015) Landmark ECJ data protection ruling could impact Facebook and Google. The Guardian. Retrieved from https://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo
Goel V. (2015, October 26). Facebook's Web Access for All Has Been a Tough Sell in India. The New York Times.
Goodwin, B. (2016, September 29). NGOs challenge UK and US mass surveillance in human rights court. Retrieved November 07, 2017, from: http://www.computerweekly.com/news/=450400044/NGOs-challenge-UK-and-US-mass-surveillance-in-human-rights-court
Google. (2017). Legal process for user data requests FAQs. Retrieved from Transparency Report Help Center: https://support.google.com/transparencyreport/answer/7381738?hl=en.
Google. (2017). Requests for User information. Retrieved from Transparency Report: https://transparency report.google.com/user-data/overview
Greenberg, K. J. (2016). Counter-radicalization via the Internet. SAGE journals. Retrieved from: http://journals.sagepub.com/doi/abs/10.1177/0002716216672635?journalCode=anna
Greenwald, G., & MacAskill, E. (2016, June 7). NSA Prism program taps in to user data of Apple, Google and others. Retrieved from The Guardian: https://www.theguardian.com/world/2013/jun/06/us-tech-giants-nsa-data
Gressin, Seena. (2017) The Equifax Data Breach: What to do. Federal Trade Commission. Retrieved from https://www.consumer.ftc.gov/blog/2017/09/equifax-data-breach-what-do
Gurumurthy, A. (2017, April 3). Big brother getting bigger? The privacy issues surrounding Aadhaar are worrying. firstpost.com. Retrieved from http://www.firstpost.com/tech/news-analysis/big-brother-getting-bigger-the-privacy-issues-surrounding-aadhaar-are-worrying-3700365.html
Guruswamy, M. (2017). India's judges rule for freedom, September 10, 2017, The New York Times.
Haas, B. (2017). China moves to block internet VPNs from 2018. the Guardian. https://www.theguardian.com/world/2017/jul/11/china-moves-to-block-internet-vpns-from-2018
Hamon, B, Mamère, N, Romagnan, B. (2017). Contre la loi de sécurité intérieure. Libération. Retrieved from: http://www.liberation.fr/debats/2017/09/28/contre-la-loi-de-securite-interieure_1599615
Hansen, J. S. (2014). ”Exclusive: Danish magazine's surveillance scandal creates new uproar over data privacy” Occupy.com.
Hare, F. (2009). Borders in Cyberspace: Can Sovereignty Adapt to the Challenges of Cyber Security?, 3, 88–105. https://doi.org/10.3233/978-1-60750-060-5-88
Hare, S. (2016, October). For your eyes only: U.S. technology companies, sovereign states, and the battle over data protection. Business Horizons, 59, 549-561. https://doi.org/10.1016/j.bushor.2016.04.002
Hare, S. (2016). For your eyes only: U.S. technology companies, sovereign states, and the battle over data protection. Business Horizons , 59 (5), pp. 549-561.
Herlihy, P. (2013). “Government as a data model' : what I learned in Estonia”. Online article published 31 October 2013. Gov.uk.
Hern, A. (2015, December 30). Facebook is making more and more money from you. Should you be paid for it? The Guardian.
Hern, A. (2016, November 8). Facebook 'pauses' WhatsApp data sharing after ICO
Hern, A. (2017, March 29). UK government can force encryption removal, but fears losing, experts say. Retrieved November 05, 2017, from: https://www.theguardian.com/technology/2017/mar/29/uk-government-encryption-whatsapp-investigatory-powers-act
Higgins, S. (2017, September 28). Russia Likely to Ban Bitcoin Payments, Deputy Finance Minister Says. CoinDesk. Retrieved from https://www.coindesk.com/russia-likely-ban-bitcoin-payments-deputy-finance-minister-says/
Hill, J. F. (2014). The growth of data localization post-snowden: Analysis and recommendations for us policymakers and business leaders.
Hill, K. (2013, June 10). How Americans' Views On Surveillance Have Changed Over The Last Decade (Or Rather Not Changed). Forbes. doi:https://www.forbes.com/sites/kashmirhill/2013/06/10/how-americans-views-on-surveillance-have-changed-over-the-last-decade-or-rather-not-changed/#7c94a25f4f3c
Hinduja S. and Patchin J. (2010, July 22). Bullying, Cyberbullying, and Suicide. Archives of Suicide Research. Retrieved from http://www.tandfonline.com/doi/abs/10.1080/13811118.2010.494133
Hintz, A. & Dencik, L. (2016). The politics of surveillance policy: UK regulatory dynamics after Snowden. Internet Policy Review, 5(3).
Hobbes, T., & Gaskin, J. C. A. (1998). Leviathan. Oxford: Oxford University Press.
Horowitz, Julia. (2017) Massachusetts will hit Equifax with first state lawsuit over data breach. Retrieved from http://money.cnn.com/2017/09/12/news/equifax-lawsuit-massachusetts/index.html
Horsburgh, S; Goldfinch, S and Gauld, R. (2011) “Is Public Trust in Government Associated With Trust in E-Government?” Social Science Computer Review.
Human rights watch (2017) https://www.hrw.org/news/2017/08/01/russia-new-legislation-attacks-internet-anonymity
Humans Rights Watch, Perils of Back Door Encryption Mandates. (2017, June 26). Retrieved November 05, 2017, from: https://www.hrw.org/news/2017/06/26/perils-back-door-encryption-mandates
Humer C. and Finkle J. (2014, September 24). Your medical record is worth more to hackers than your credit card. Reuters. Hurricane Odile. (2016). Retrieved from https://www.bbvadata.com/odile/ Inferring Commuting Statistics in the Greater Jakarta Area with Twitter. (2016). Retrieved from: https://www.unglobalpulse.org/projects/inferring-commuting-statistics-greater-jakarta-area-twitter
Humer, C. and Finkle, J. (2014). ”Your medical record is worth more to hackers than your credit card”. Published online 24 September 2014. Reuters.
Ievdokymova, Iryna. (2013) ACTA and the Enforcement of Copyright in Cyberspace: the Impact on Privacy. European Law Journal, v. 19, n. 6, p. 759-778.
Independent (2017) Russia threatens to block facebook if it refuses to store data in Russia http://www.independent.co.uk/life-style/gadgets-and-tech/russia-facebook-ban-putin-data-local-storage-threat-a7968711.html
Ingram, David. NSA sued by Wikimedia, rights groups over mass surveillance. Reuters. Retrieved from https://www.reuters.com/article/us-usa-nsa-wikipedia/nsa-sued-by-wikimedia-rights-groups-over-mass-surveillance-idUSKBN0M60YA20150310
Internet Abuse and Sexual Consent Lawyers. (2017). C.A. Goldberg, PLLC. Retrieved from http://www.cagoldberglaw.com/
intervention. The Guardian.
Jaffe, E. (2016). “How Estonia became a global model for e-government” Published 20 April 2016. Side Walk Talk.
Jahanzaib H. (2013). How technology in Pakistan should be used safely. The Express Tribune Blogs. Retrieved from https://blogs.tribune.com.pk/story/20349/if-you-love-me-youll-send-me-a-sexy-photo-of-you/
Jensen, E. (2014). Cyber Sovereignty: The Way Ahead. Texas International Law Journal 50, 275–304.
Joergensen, R.F. (2014, October 21). The unbearable lightness of user consent. Internet Policy Review, 3. DOI:10.14763/2014.4.330
Join The Team. (2015, September 13). Retrieved October 28, 2017, from https://bitnation.co/join-the-team/
Kelly, S. (2015, April 7). Invisible surveillance and indifference: We’re being watched, but does anybody care? The Monthly. Retrieved from https://www.themonthly.com.au/today/sean-kelly/2015/07/2015/1428374986/invisible-surveillance-and-indifference
Kerr, Orin. (2017) Supreme Court agrees to hear ‘Carpenter v. United States’, the Fourth Amendment historical cell-site case. The Washington Post. Retrieved from https://www.washingtonpost.com/news/volokh-conspiracy/wp/2017/06/05/supreme-court-agrees-to-hear-carpenter-v-united-states-the-fourth-amendment-historical-cell-site-case/?utm_term=.1da61a20e41c
Kharpal, Arjun. (2016) Apple vs FBI: All you need to know. CNBC. Retrieved from https://www.cnbc.com/2016/03/29/apple-vs-fbi-all-you-need-to-know.html
Kleinrock, L. (2008). History of the Internet and its flexible future. IEEE Wireless Communications, 15(1), 8–18. https://doi.org/10.1109/MWC.2008.4454699
Krasner, S. D. (2001). Abiding Sovereignty. International Political Science Review / Revue Internationale de Science Politique, 22(3), 229–251.
Legifrance. LOI n° 2016-41 du 26 janvier 2016 de modernisation de notre système de santé
Lessig, L. (2006). Code: Version 2.0. Basic Books. Retrieved from http://codev2.cc/download
Li, Q. (2006, May 1). Cyberbullying in Schools A Research of Gender Differences. Social Psychology International. Retrieved from http://journals.sagepub.com/doi/abs/10.1177/0143034306064547
Lomas, N. (2016, August 24). Encryption under fire in Europe as France and Germany call for decrypt law. Retrieved November 05, 2017, from: https://techcrunch.com/2016/08/24/encryption-under-fire-in-europe-as-france-and-germany-call-for-decrypt-law/
Madden, M. (2014, November 2014). Public Perceptions of Privacy and Security in the Post-Snowden Era. Pew Research Center. Retrieved from http://www.pewinternet.org/2014/11/12/public-privacy-perceptions/
Mangoli, D. (2017, October 23). ICO Ban in Japan a “Definite Possibility.” CryptoCoinsNews. Retrieved from https://www.cryptocoinsnews.com/japan-may-no-longer-be-a-safe-haven-for-icos/
Mantalero, Alessandro. (2013) The EU Proposal for a General Data Protection Regulation and the roots of the ‘right to be forgotten’. Computer Law & Security Review, v. 29, n. 3, p. 229-235.
Maras, M-H. (2012). The social consequences of a mass surveillance measure: What happens when we become the 'others'?. International Journal of Law, Crime and Justice, 65-80. Retrieved from: http://www.sciencedirect.com/science/journal/17560616/40/2?sdc=1
Marc. (2017, August 9). The Potential of IoT Technologies for People with Disabilities. IoTBusinessNews. Retrieved from https://iotbusinessnews.com/2017/08/09/69793-potential-iot-technologies-people-disabilities/
Maréchal, N. (2017). Networked authoritarianism and the geopolitics of information: Understanding Russian Internet policy. Media and Communication, 5(1).
McQueen, University of Stirling. (2017, October 20). Inside Emmanuel Macron's draconian anti-terrorism law. Retrieved October 22, 2017, from: https://theconversation.com/inside-emmanuel-macrons-draconian-anti-terrorism-law-83834
McQueeney, R. (2015, November 3). Snapchat and Instagram: How Their Advertising Technique is Changing the Game. Zacks Investment Research.
Meillassoux, M. (Director). (2016, October). Nothing to Hide [Motion picture]. France.
Microsoft. (2017). Law Enforcement Requests Report. Retrieved from Corporate Social Responsibility: https://www.microsoft.com/en-us/about/corporate-responsibility/lerr.
Moe, C. (2017). “Editorial for EJEG Volume 15 Issue 2” The Electronic Journal of e-Government Volume 15(2):57-58.
Moreno, J., Serrano, M. And Fernández-Medina. (2016). “Main Issues in Big Data Security” . Future Internet 8(44):2-16
Moser, F. (Producer & Director). The Maze [Motion Picture]. Austria.
Murgia, M and Neville, S. (2017). “NHS was an easy target in global hacking attack” Published online 13 May 2017. Financial Times.
My Sex Life is Being Used Against Me. (2016). Hack*Blossom. Retrieved from https://hackblossom.org/domestic-violence/threats/sexual-content.html
Naughton, J. (2013, October 20). Edward Snowden: public indifference is the real enemy in the NSA affair. The Guardian. Retrieved from https://www.theguardian.com/world/2013/oct/20/public-indifference-nsa-snowden-affair
Naughton, J. (2013, October 20). Edward Snowden: public indifference is the real enemy in the NSA affair. Retrieved from The Guardian: https://www.theguardian.com/world/2013/oct/20/public-indifference-nsa-snowden-affair
Nocetti, J. (2011). “Digital Kremlin”: power and the internet in Russia. Russie. Nei. Visions, (59), 5.
Nocetti, J. (2015). Russia's 'dictatorship-of-the-law' approach to internet policy. Internet Policy Review, 4(4). DOI: 10.14763/2015.4.380
O’Brien, Kevin. (2012) Law Students in Austria Challenge Facebook Privacy Policy. The New York Times. Retrieved from http://www.nytimes.com/2012/12/05/technology/austrian-group-plans-court-challenge-to-facebooks-privacy-policies.html
Ojanen, Tuomas. (2012) Making the Essence of Fundamental Rights Real: The Court of Justice of the European Union Clarifies the Structure of Fundamental Rights under the Charter. European Constitutional Law Review, 12, p. 318-329.
Oliver, J. (2015, April 5). Government Surveillance: Last Week Tonight with John Oliver (HBO). Retrieved from Youtube: https://www.youtube.com/watch?v=XEVlyP4_11M.
Panday, C (2017) Rising Demands for Data Localization a Response to Weak Data Protection Mechanisms Electronic Frontier Foundation https://www.eff.org/deeplinks/2017/08/rising-demands-data-localization-response-weak-data-protection-mechanisms
Paulson, Michelle. (2015) ROGERS, Jacob. Victory in Germany: court rules in favor of the Wikimedia Foundation. Wikimedia. Retrieved from https://blog.wikimedia.org/2015/11/24/victory-germany-court-ruling/
Pohle, J. (2016). ‘Multistakeholder governance processes as production sites: enhanced cooperation "in the making"’. Internet Policy Review, 5(3).
Pohle, J. and Leo Van Audenhove (2017) Post-Snowden Internet Policy: Between Public Outrage, Resistance and Policy Change Media and Communication - Volume 5, Issue 1
Polatin-Reuben, D., & Wright, J. (2014). An Internet with BRICS Characteristics: Data Sovereignty and the Balkanisation of the Internet. Presented at the 4th Workshop on Free and Open Communications on the Internet, San Diego (CA). Retrieved from https://www.usenix.org/conference/foci14/workshop-program/presentation/polatin-reuben
Powles, J. (2017). “Why are we giving away our most sensitive health data to Google?” Published online 5 July 2017. UK: The Guardian.
Prasad, S. K. (2016). Digitisation of Health / Medical Records: Is the law keeping up? Published online 7 December 2016. Delhi: Legally India.
Pufong, M. G. (2001). State Obligation, Sovereignty, and Theories of International Law. Politics & Policy, 29(3), 478–519. https://doi.org/10.1111/j.1747-1346.2001.tb00600.x
Raytheon I Websense (2015) 2015 Industry Drill-Down Report: Healthcare. Raytheon Company. Retreived online 22 October 2017.
Registrar of the Court. (2014) European Court of Human Rights – Press Release. French crime database system in breach of Convention for storing information on individuals against whom proceedings have been dropped. Retrieved from http://www.statewatch.org/news/2014/sep/echr-france-judgment-brunet-v-France-storage-of-information-on-crime-database.pdf.
Registration for all in India: The Economist. (2017, April 15). Aadhaar: Digital Dawn. Government Information Quarterly.
Reporters without borders (2014), Enemies of the Internet : entities at the heart of censorship and surveillance http://12mars.rsf.org/2014-en/#slide2
Reuters. (2017). “Plague kills 124 in Madagascar, cities most affected: report”. Published online on October 25th 2017.
Revenge Porn and Internet Privacy. (2017). C.A. Goldberg, PLLC. Retrieved from http://www.cagoldberglaw.com/revenge-porn-and-internet-privacy/?non-consensualdistributionofsexualimagesandorvideosierevengeporn
Rieff, D. (2013, August 22). Why Nobody Cares About the Surveillance State. Foreign Policy. Retrieved from http://foreignpolicy.com/2013/08/22/why-nobody-cares-about-the-surveillance-state/
Rodriguez, K. (2015, June 17). Strong Encryption and Anonymity Are The Guardians Of Free Expression. Retrieved November 05, 2017, from: https://www.eff.org/deeplinks/2015/06/strong-encryption-and-anonymity-are-guardians-free-expression
Rosen, Rebecca, C. (2013, June 11). Why Should We Even Care if the Government is Collecting our Data? The Atlantic. Retrieved from:https://www.theatlantic.com/technology/archive/2013/06/why-should-we-even-care-if-the-government-is-collecting-our-data/276732/
Rubinstein, I. S., Nojeim, G. T., & Lee, R. D. (2014). Systematic government access to personal data: a comparative analysis. International Data Privacy Law, 4(2), 96-119.
Rubinstein, I., Nojeim, G., & Lee Ronald. (2014). Systematic government access to private data: a comparative analysis. International Data Privacy Law, 4 (2), 96-119.
Russia tells Facebook to localize user data or be blocked (2017) Reuters https://www.reuters.com/article/us-russia-facebook/russia-tells-facebook-to-localize-user-data-or-be-blocked-idUSKCN1C11R5
Russians Selectively Blocking (2013) Russians Selectively Blocking Internet, New York Times http://www.nytimes.com/2013/04/01/technology/russia-begins-selectively-blocking-internet-content.html
S., M. (2013, June 11). Should the government know less than Google? The Economist. Retrieved from https://www.economist.com/blogs/democracyinamerica/2013/06/surveillance-0
S.S. Lotus - France v. Turkey (P.C.I.J. September 7, 1927). Retrieved from http://www.worldcourts.com/pcij/eng/decisions/1927.09.07_lotus.htm
Safer Nudes. (2016). Coding Rights. Retrived from https://www.codingrights.org/safernudes/
Safi, Michael. (2017) Indian court rules privacy a ‘fundamental right’ in battle over national ID cards. The Guardian: 2017. Retrieved from https://www.theguardian.com/world/2017/aug/24/indian-court-rules-privacy-a-fundamental-right-in-battle-over-national-id-cards
Sales, N. (2017, May 8). 13 Reasons Why is being devoured by teenagers. The Guardian. Retrieved from https://www.theguardian.com/commentisfree/2017/may/08/13-reasons-why-devoured-teenagers-understand-why
Sargsyan, T. (2016, December 16). The privacy role of information intermediaries through self-regulation. Internet Policy Review , 5 (4).
Senese, A., Mossé, M., Kent, G., & Sacquet, M. (2017, October 9). The Internet, private actors and security challenges. Sciences Po, Paris, France.
Shearman S. (2017, March 30). Cyberbullying in the workplace. The Guardian. Retrieved from https://www.theguardian.com/careers/2017/mar/30/cyberbullying-in-the-workplace-i-became-paranoid
Shen, Y. (2016). Cyber Sovereignty and the Governance of Global Cyberspace. Chinese Political Science Review, 1(1), 81–93. https://doi.org/10.1007/s41111-016-0002-6
Shepard, C. (2017) China quietly releases draft of tough new intelligence law, Reuters. http://www.reuters.com/article/us-china-security-lawmaking/china-quietly-releases-draft-of-tough-new-intelligence-law-idUSKCN18C0UX
Smith, C. (2016, September 20). The Snowden effect: Three years after Edward Snowden’s mass-surveillance leaks, does the public care how they are watched. Index on Censorship, 45, 48-50. doi:10.1177/0306422016670343
Smith, C. (2016). The Snowden effect: Three years after Edward Snowden’s mass-surveillance leaks, does the public care how they are watched?. SAGE journals. Retrieved from: http://journals.sagepub.com/doi/abs/10.1177/0306422016670343
Smith, P. et. al. (2008, March 19). Cyberbullying: its nature and impact in secondary school pupils. The Journal of Child Psychology and Psychiatry. Retrieved from http://onlinelibrary.wiley.com/doi/10.1111/j.1469-7610.2007.01846.x/abstract
Snowden, E. (2015, June 4). Edward Snowden: The World Says No to Surveillance. Retrieved from The New York Times: https://www.nytimes.com/2015/06/05/opinion/edward-snowden-the-world-says-no-to-surveillance.html
Social Media Safety Guides. (2017). HeartMob. Retrieved from https://iheartmob.org/resources/safety_guides
Solon, O. (2017, March 7). With the latest WikiLeaks revelations about the CIA – is privacy really dead?. Retrieved from The Guardian: https://www.theguardian.com/world/2017/mar/09/with-the-latest-wikileaks-revelations-about-the-cia-is-privacy-really-dead.
Solon, O. (2017). US consumers lose privacy protections for their web browsing history, The Guardian.
Solove, D.J. (2011, May 15). Why privacy matters even if you have ‘nothing to hide’. The Chronicle of Higher Education. Retrieved from http://www.chronicle.com/article/Why-Privacy-Matters-Even-if/127461/
Spice, B. (2017, September 15). To Improve Smartphone Privacy, Control Access to Third-Party Libraries. Carnegie Mellon University.
Stacey, Kiran. (2017) India supreme court deals blow to biometric ID system. Financial Times. Retrieved from https://www.ft.com/content/473c8532-888f-11e7-bf50-e1c239b45787?mhq5j=e5
Stark, L. (2015, December 2015). The emotional context of information privacy. The Information Society, 32, 14-27. http://dx.doi.org/10.1080/01972243.2015.1107167
Stoycheff, E. (2016). Under Surveillance: Examining Facebook’s Spiral of Silence Effects in the Wake of NSA Internet Monitoring. Journalism & Mass Communication Quarterly , 93 (2), pp. 296– 311.
Stoycheff, E., Wibowo, K. A., Liu J., & Xu K. (2017). Online Surveillance’s Effect on Support for Other Extraordinary Measures to Prevent Terrorism. Mass Communication and Society, 1-16. Retrieved from: http://dx.doi.org/10.1080/15205436.2017.1350278
Strielkowski, W.; Gryshova, I.; Kalyugina, S. (2017). Modern Technologies in Public Administration Management: A Comparison of Estonia, India and United Kingdom. Administratie si Management Public, (28): 174-185.
Tewari, S. (2015, October 6). Facebook: Social Media or Paid Media? Afaqs!
The Economist. (2017). “India’s biometric identity scheme should not be compulsory”. Leader published 15 April 2017. London: The Economist.
The Guardian. (2017) “The Guardian view on a Swedish scandal: the precedence of privacy.” Editorial published 31 July 2017. London: The Guardian.
The world’s most valuable resource is no longer oil, but data. (2017, May 6). The Economist. Retrieved from https://www.economist.com/news/leaders/21721656-data-economy-demands-new-approach-antitrust-rules-worlds-most-valuable-resource
Thielman, S. (2017, January 10). Your private medical data is for sale – and it's driving a business worth billions. The Guardian.
Thompson, M. and Jethro, M. (2017). “World’s biggest cyberattack sends countries into ‘disaster recovery mode’” Published online 14 May 2017. Washington: CNN.
Tokunaga R. (2010, May). Following you home from school: A critical review and synthesis of research on cyberbullying victimization. Science Direct. Retrieved from http://www.sciencedirect.com/science/article/pii/S074756320900185X
Tolbert, C. J. and Mossberger, K. (2006). “The Effects of E-Government on Trust and Confidence in Government”. Public Administration Review 66(3): 354-369.
Topak, Özgün E. 2017. The Making of a Totalitarian Surveillance Machine: Surveillance in Turkey Under AKP Rule. Surveillance & Society 15(3/4): 535-542. Retrieved from: https://ojs.library.queensu.ca/index.php/surveillance-and-society/article/view/6614
Tréguer, F. (2017). Intelligence Reform and the Snowden Paradox: The Case of France. Media and Communication, 5(1). Retrieved from: https://www.wethenet.eu/wp-content/uploads/Tr%C3%A9guer-Intelligence-Reform-and-the-Snowden-Paradox-final.pdf
United Nations Global Pulse About. (2016). Retrieved from https://www.unglobalpulse.org/about-new
United Nations. (2016). “United Nations E-Government survey 2016”. New York: United Nations.
Walker, Robert Kirk. (2012) The Right to be Forgotten, Hastings Law Journal, v. 64, p. 257.
Walker, S. (2016, November 17). Russia blocks access to LinkedIn over foreign-held data. The Guardian. Retrieved from http://www.theguardian.com/world/2016/nov/17/russia-blocks-access-to-linkedin-over-foreign-held-data
Watt, E. (2017). ‘The right to privacy and the future of mass surveillance’. The International Journal of Human Rights , 21(7). Retrieved from: http://www.tandfonline.com/doi/abs/10.1080/13642987.2017.1298091
Watt, E. (2017). ‘The right to privacy and the future of mass surveillance’. The International Journal of Human Rights , 21 (7), pp. 773-799
Weber, M. (1965). Politics as a Vocation. Fortress Press Philadelphia, PA.
Willsher, K. (2015, January 21). France boosts anti-terror measures in wake of Paris attacks. The Guardian. Retrieved from: https://www.theguardian.com/world/2015/jan/21/france-anti-terror-measures-paris-attacks-manuel-valls
Willsher, K. (2015, July 24). France approves 'Big Brother' surveillance powers despite UN concern. Retrieved October 22, 2017, from: https://www.theguardian.com/world/2015/jul/24/france-big-brother-surveillance-powers
Withers, I. (2017, September 16). The big data revolution: the high price of a force for good. The Telegraph.
Withers, I. (2017). ”The big data revolution: the high price of a force for good”. Published online 16 September 2017. UK: The Telegraph.
Wong, C. (2017, July 2). The dangers of surveillance in the age of populism. Retrieved from Newsweek: http://www.newsweek.com/state-surveillance-europe-populism-cctv-citizens-553857.
Wood, M. and Schwab, K. (2017, September 20). We might not see the effects of the Equifax breach for years. whqr.org. Retrieved from http://whqr.org/post/we-might-not-see-effects-equifax-breach-years#stream/0
Woolf, N. (2016, August 26). Stingray documents offer rare insight into police and FBI surveillance. Retrieved October 22, 2017, from: https://www.theguardian.com/us-news/2016/aug/26/stingray-oakland-police-fbi-surveillance
Yahoo. (2017). Yahoo! Inc. Law Enforcement Response Guidelines. Retrieved from Transparency Report: https://transparency.yahoo.com/law-enforcement-guidelines/us.
Zalaquett C. and Chatters S. (2014). Cyberbullying in College: Frequency, Characteristics, and Practical Implications. SAGE Open. http://journals.sagepub.com/doi/pdf/10.1177/2158244014526721
Zetter, K. (2013, August 30). Google, Microsoft Press Lawsuits for Right to Release More Surveillance Data. Retrieved from Wired: https://www.wired.com/2013/08/google-and-microsoft-sue-gov/