Bibliography



  • A Sexy Guide to Digital Security. (2016). Coding Rights. Retrieved from https://www.codingrights.org/wp-content/uploads/2016/09/zine_ingles_lado2.pdf
  • Abdullaev, Nabi (2016) Why Russia's LinkedIn Ban Is Not About Internet Freedoms, Forbes https://www.forbes.com/sites/riskmap/2016/12/08/why-russias-linkedin-ban-is-not-about-internet-freedoms/#32203402a78e
  • Ackerman, S. (2013, July 30). Justice Department to declassify key Yahoo surveillance orders. Retrieved from The Guardian: https://www.theguardian.com/world/2013/jul/30/justice-department-declassify-yahoo-surveillance-orders
  • Advent International. (2014). “Nets to be acquired by Advent International, ATP and Bain Capital”. Published online 24 March 2017. Copenhagen: Advent International.
  • Aïmeur, E., Lawani, O., & Dalkir, K. (2016, May). When changing the look of privacy policies affects user trust: An experimental study. Computers in Human Behavior, 58, 368-379. https://doi.org/10.1016/j.chb.2015.11.014
  • Alsabah Nabil (2017) China’s new Cybersecurity Law, MERICS https://www.merics.org/en/media-contact/press-releases/chinas-new-cybersecurity-law/
  • Amazon. (2017). https://d0.awsstatic.com/certifications/Information_Request_Report_June_2017.pdf. Retrieved from https://d0.awsstatic.com/certifications/Information_Request_Report_June_2017.pdf
  • Amnesty International (2017), Russia: VPN ban is a major blow to internet freedom https://www.amnesty.org/en/latest/news/2017/07/russia-vpn-ban-is-a-major-blow-to-internet-freedom/
  • AOL, Apple, Facebook, Google, LinkedIn, Microsoft, et al. (2017). Reform Government Surveillance. Retrieved from https://www.reformgovernmentsurveillance.com/#may-19.
  • Apple. (2017). Report on Government and Private Party Requests for Customer Information. Retrieved from https://images.apple.com/legal/privacy/transparency/requests-2017-H1-en.pdf
  • Bagley, J. (2016, September 18). What is Blockchain Technology? A Step-by-Step Guide For Beginners. Retrieved October 28, 2017, from https://blockgeeks.com/guides/what-is-blockchain-technology/
  • Ballon, P. (2017, September 1). Why privacy matters in push for smart nations. todayonline.com. Retrieved from http://www.todayonline.com/commentary/why-privacy-matters-push-smart-nations
  • Bartolini, C. and Siry, L. (2016). The right to be forgotten in the light of the consent of the data subject. Computer Law & Security Review, 32(2), pp.218-237.
  • Bates, S. (2012). The Prostitute, the Prodigy, and the Private Past. Communication Law and Policy, 17(2), pp.175-233.
  • Bennet, A. (2016, March 2). Actually, British voters don’t mind mass surveillance. Retrieved from http://www.telegraph.co.uk/news/uknews/terrorism-in-the-uk/12179248/Actually-British-voters-dont-mind-mass-surveillance.html
  • Bennett, A. (2016). Actually, British voters don’t mind mass surveillance. The Telegraph. Retrieved from: http://www.telegraph.co.uk/news/uknews/terrorism-in-the-uk/12179248/Actually-British-voters-dont-mind-mass-surveillance.html
  • Berenson, T. (2016, November 3). Melania Trump Says She'll Fight Cyber-Bullying. Time. Retrieved from http://time.com/4556902/melania-trump-donald-first-lady-social-media/
  • Biagio, S. (2017, October 20). Terrorismo, i big hi-tech al G7: così contrasteremo la cyberpropaganda. Il Sole 24 ORE. Retrieved from http://www.ilsole24ore.com/art/tecnologie/2017-10-20/terrorismo-big-hi-tech-g7-cosi-contrasteremo-cyberpropaganda-163932.shtml?uuid=AEFcJisC
  • Blaze, M. (2015, December 15). A key under the doormat isn’t safe. Neither is an encryption backdoor. Retrieved from The Washington Post: https://www.washingtonpost.com/news/in-theory/wp/2015/12/15/how-the-nsa-tried-to-build-safe-encryption-but-failed/?utm_term=.7be8fe3fd37e.
  • Bodoni, S., White, A., & Hodges, J. (2015, January 20). Microsoft Gave Data on Charlie Hebdo Probe to FBI in 45 Minutes. Bloomberg.Com. Retrieved from https://www.bloomberg.com/news/articles/2015-01-20/microsoft-fights-unregulated-snooping-amid-terrorist-threat
  • Bora, K. (2017). “Sweden's national security at risk after huge leak of confidential data: Why it's a wake-up call for India”. Published 25 July 2017. International Business Times.
  • Bouie, J. (2013, June 11). Why the Public Doesn't Care about Surveillance. The American Prospect. Retrieved from http://prospect.org/article/why-public-doesnt-care-about-surveillance
  • Bowcott, O. (2017, September 11). Turks detained for using encrypted app 'had human rights breached'. Retrieved November 05, 2017, from: https://www.theguardian.com/world/2017/sep/11/turks-detained-encrypted-bylock-messaging-app-human-rights-breached
  • Bowman, C. (2017) Data Localization Laws: an Emerging Global Trend; Jurist http://www.jurist.org/hotline/2017/01/Courtney-Bowman-data-localization.php
  • Boyer, P. (2017, October 1). Si tu ne viens pas aux GAFAM, les GAFAM iront à toi. (If you do not come to the GAFAM, the GAFAM will come to you). La Tribune.
  • Brunette, Robert A. (1972) Rehabilitation, Privacy and Freedom of the Press—Striking a New Balance: Briscoe v. Reader’s Digest Association, 5 Loy. L. A. L. Rev. 544, 588.
  • Brygier, C. (2014, December 7). Google, Facebook, Twitter et cie... Service gratuit contre utilisation de nos données : comment trouver l'équilibre raisonnable. (Google, Facebook, Twitter and co. Free services against the use of our data: how to find the proper balance). Atlantico.
  • Cann, Y. (2015, April 13). Loi de renseignement : 63% des Français favorables à une limitation des libertés individuelles pour lutter contre le terrorisme . Atlantico. Retrieved from http://www.atlantico.fr/decryptage/63-francais-favorables-limitation-libertes-individuelles-pour-lutter-contre-terrorisme-yves-marie-cann-2089085.html
  • Cavelty, M. D. (2014). Breaking the Cyber-Security Dilemma: Aligning Security Needs and Removing Vulnerabilities. Science and Engineering Ethics, 20(3), 701-715. Retrieved from: https://www.ncbi.nlm.nih.gov/pubmed/24781874
  • Center for Democracy & Technology. (2013). Law Enforcement Standards by Country. Retrieved from https://govaccess.cdt.info/standards-le-country.php
  • Center for Democracy & Technology. (2014). Neither warrants nor subpoenas should reach data stored outside the US. Washington: CDT.
  • Chander, A., & Le, U. P. (2014). Breaking the Web: Data Localization vs. the Global Internet.
  • Chandler, A. (2015, April 6) What It Takes to Make People Care About NSA Surveillance. The Atlantic. Retrieved from: https://www.theatlantic.com/national/archive/2015/04/naked-selfies-and-the-nsa/389778/
  • China Is Building The Mother Of All Reputation Systems To Monitor Citizen Behavior. (2017). Fast Company. Retrieved 11 November 2017, from https://www.fastcompany.com/3050606/china-is-building-the-mother-of-all-reputation-systems-to-monitor-citizen-behavior
  • China Tells Carriers to Block Access to Personal VPNs by February. (2017). Bloomberg.com. Retrieved 8 November 2017, from https://www.bloomberg.com/news/articles/2017-07-10/china-is-said-to-order-carriers-to-bar-personal-vpns-by-februar
  • China’s plan to organize its society relies on ‘big data’ to rate everyone. (2017). Washington Post. Retrieved 11 November 2017, from https://www.washingtonpost.com/world/asia_pacific/chinas-plan-to-organize-its-whole-society-around-big-data-a-rating-for-everyone/2016/10/20/1cd0dd9c-9516-11e6-ae9d-0030ac1899cd_story.html?utm_term=.09ff36577867
  • Clark, I. (2016, March) The digital divide in the post-Snowden era. Journal of Radical Librarianship, [S.l.], v. 2. Available at: https://journal.radicallibrarianship.org/index.php/journal/article/view/12
  • CNIL (2017) “SNDS : Système National des Données de Santé”. Published online on April 18th 2017.
  • Cornevin, C. (2017). 57% des Français sont favorables au projet de loi antiterroriste. Le Figaro. Retrieved from: http://www.lefigaro.fr/actualite-france/2017/09/26/01016-20170926ARTFIG00258-57-des-francais-sont-favorables-au-projet-de-loi-antiterroriste.php
  • Cory, N. (2017). The Worst Innovation Mercantilist Policies of 2016. Information Technology and Innovation Foundation. Retrieved from https://itif.org/publications/2017/01/09/worst-innovation-mercantilist-policies-2016
  • Das, S. (2017, October 27). Bitcoin Banned as a Payment Method in Indonesia, Adopters Will Be “Dealt With.” CryptoCoinsNews. Retrieved from https://www.cryptocoinsnews.com/bitcoin-banned-payment-method-adopters-will-dealt-indonesian-central-bank/
  • DeNardis, L. (2010). ‘The Emerging Field of Internet Governance’. Yale Information Society Project Working Paper Series. Retrieved from https://papers.ssrn.com/sol3/papers.cfm?abstract_id=1678343.
  • Dencik, L. Cable, J. (2017). Digital Citizenship and Surveillance. The Advent of Surveillance Realism: Public Opinion and Activist Responses to the Snowden Leaks. International Journal of Communication, 763–781.
  • Denyer, S. (2016). “China wants to give all of its citizens a score – and their rating could affect every area of their lives”. Published 22 October 2016. UK: The Independent.
  • Denyer, S. (2017). China wants to give all of its citizens a score – and those who fall short will be denied basic privileges. The Independent. Retrieved 11 November 2017, fromhttps://www.independent.co.uk/news/world/asia/china-surveillance-big-data-score-censorship-a7375221.html
  • DIEHL, Kevin A. (2017) Can the U.S. government legally monitor private communications? If so, given the U.S.'s significant protection of privacy rights, what government cannot? Journal of Public Affairs, v. 17, n. 3.
  • DIY Cybersecurity for Domestic Violence. (2016). Hack*Blossom. Retrieved from https://hackblossom.org/domestic-violence/index.html#threats
  • Dummett, B. (2017). “Nets A/S sold to private equity for $5.3 billion”. Published 25 September 2017. Market Watch.
  • Duportail, J. (2017, September 26). I asked Tinder for my data. It sent me 800 pages of my deepest, darkest secrets. The Guardian. Retrieved from https://www.theguardian.com/technology/2017/sep/26/tinder-personal-data-dating-app-messages-hacked-sold
  • Eckel, M. (2015) New Russian Internet Data Law Raises Questions About Privacy And Compliance RFERL https://www.rferl.org/a/russia-internet-data-law-privacy-compliance/27222557.html
  • Editorial Board. (2015, November 17). Opinion | Mass Surveillance Isn't the Answer to Fighting Terrorism. Retrieved October 22, 2017, from: https://www.nytimes.com/2015/11/18/opinion/mass-surveillance-isnt-the-answer-to-fighting-terrorism.html
  • Erlanger, S. & Ewing J. (2013, June 14). Differing Views on Privacy Shape Europe’s Response to U.S. Surveillance Program. New York Times. Retrieved from: http://www.nytimes.com/2013/06/15/world/europe/differences-on-privacy-shape-europes-response-to-us-surveillance.html
  • Ermoshina, K., & Musiani, F. (2017). Migrating servers, elusive users: Reconfigurations of the Russian Internet in the post-Snowden era. Media and Communication, 5(1)
  • Ermoshina, K., Halpin, H., & Musiani, F. (2017). Can Johnny build a protocol? Co-ordinating developer and user intentions for privacy-enhanced secure messaging protocols. Presented at the European Workshop on Usable Security, Internet Society. https://doi.org/10.14722/eurousec.2017.23016
  • Eugène Pirou. (2017). Who’s Who of Victorian Cinema. Retrieved from http://www.victorian-cinema.net/pirou
  • Eustache, S., Trochet, J. (2017, October 1). Infotainment sites only in it for the clicks. Le Monde Diplomatique (English edition).
  • Exploring the Potential of Mobile Money Transactions to Inform Policy. (2016). Retrieved from https://www.unglobalpulse.org/projects/exploring-potential-mobile-money-transactions-inform-policy
  • Facebook. (2017). Government Requests Report. Retrieved from https://govtrequests.facebook.com
  • Facebook. (2017). Information for Law Enforcement Authorities. Retrieved from Safety: https://www.facebook.com/safety/groups/law/guidelines/.
  • Ferenstein, G. (2013, November 5). Poll: Public Supports NSA Spying On Their Email, Neighbors And Foreign Leaders. Retrieved from Tech Crunch: https://techcrunch.com/2013/11/05/poll-public-supports-nsa-spying-on-their-email-neighbors-and-foreign-leaders/
  • Ferenstein, G. (2013). Public supports NSA spying on their email, neighbours and foreign leaders. Tech Crunch. Retrieved from : https://techcrunch.com/2013/11/05/poll-public-supports-nsa-spying-on-their-email-neighbors-and-foreign-leaders/
  • Frantziou, Eleni. (2014) Further Developments in the Right to be Forgotten: The European Court of Justice’s Judgement in Case C-131/12, Google Spain, SL, Google Inc v Agencia Espanola de Proteccion de Datos. Human Rights Law Review, 14, 761-777.
  • Freedom House (2016); Freedom of the Net 2016 https://freedomhouse.org/report/freedom-net/2016/russia
  • Gao, G. (2015, May 29). What Americans think about NSA surveillance, national security and privacy. Pew Research Center. Retrieved from http://www.pewresearch.org/fact-tank/2015/05/29/what-americans-think-about-nsa-surveillance-national-security-and-privacy/
  • Gibbs, Samuel. (2015) Landmark ECJ data protection ruling could impact Facebook and Google. The Guardian. Retrieved from https://www.theguardian.com/technology/2015/oct/02/landmark-ecj-data-protection-ruling-facebook-google-weltimmo
  • Goel V. (2015, October 26). Facebook's Web Access for All Has Been a Tough Sell in India. The New York Times.
  • Goodwin, B. (2016, September 29). NGOs challenge UK and US mass surveillance in human rights court. Retrieved November 07, 2017, from: http://www.computerweekly.com/news/=450400044/NGOs-challenge-UK-and-US-mass-surveillance-in-human-rights-court
  • Google. (2017). Legal process for user data requests FAQs. Retrieved from Transparency Report Help Center: https://support.google.com/transparencyreport/answer/7381738?hl=en.
  • Google. (2017). Requests for User information. Retrieved from Transparency Report: https://transparency report.google.com/user-data/overview
  • Greenberg, K. J. (2016). Counter-radicalization via the Internet. SAGE journals. Retrieved from: http://journals.sagepub.com/doi/abs/10.1177/0002716216672635?journalCode=anna
  • Greenwald, G., & MacAskill, E. (2016, June 7). NSA Prism program taps in to user data of Apple, Google and others. Retrieved from The Guardian: https://www.theguardian.com/world/2013/jun/06/us-tech-giants-nsa-data
  • Gressin, Seena. (2017) The Equifax Data Breach: What to do. Federal Trade Commission. Retrieved from https://www.consumer.ftc.gov/blog/2017/09/equifax-data-breach-what-do
  • Gurumurthy, A. (2017, April 3). Big brother getting bigger? The privacy issues surrounding Aadhaar are worrying. firstpost.com. Retrieved from http://www.firstpost.com/tech/news-analysis/big-brother-getting-bigger-the-privacy-issues-surrounding-aadhaar-are-worrying-3700365.html
  • Guruswamy, M. (2017). India's judges rule for freedom, September 10, 2017, The New York Times.
  • Haas, B. (2017). China moves to block internet VPNs from 2018. the Guardian. https://www.theguardian.com/world/2017/jul/11/china-moves-to-block-internet-vpns-from-2018
  • Hamon, B, Mamère, N, Romagnan, B. (2017). Contre la loi de sécurité intérieure. Libération. Retrieved from: http://www.liberation.fr/debats/2017/09/28/contre-la-loi-de-securite-interieure_1599615
  • Hansen, J. S. (2014). ”Exclusive: Danish magazine's surveillance scandal creates new uproar over data privacy” Occupy.com.
  • Hare, F. (2009). Borders in Cyberspace: Can Sovereignty Adapt to the Challenges of Cyber Security?, 3, 88–105. https://doi.org/10.3233/978-1-60750-060-5-88
  • Hare, S. (2016, October). For your eyes only: U.S. technology companies, sovereign states, and the battle over data protection. Business Horizons, 59, 549-561. https://doi.org/10.1016/j.bushor.2016.04.002
  • Hare, S. (2016). For your eyes only: U.S. technology companies, sovereign states, and the battle over data protection. Business Horizons , 59 (5), pp. 549-561.
  • Herlihy, P. (2013). “Government as a data model' : what I learned in Estonia”. Online article published 31 October 2013. Gov.uk.
  • Hern, A. (2015, December 30). Facebook is making more and more money from you. Should you be paid for it? The Guardian.
  • Hern, A. (2016, November 8). Facebook 'pauses' WhatsApp data sharing after ICO
  • Hern, A. (2017, March 29). UK government can force encryption removal, but fears losing, experts say. Retrieved November 05, 2017, from: https://www.theguardian.com/technology/2017/mar/29/uk-government-encryption-whatsapp-investigatory-powers-act
  • Higgins, S. (2017, September 28). Russia Likely to Ban Bitcoin Payments, Deputy Finance Minister Says. CoinDesk. Retrieved from https://www.coindesk.com/russia-likely-ban-bitcoin-payments-deputy-finance-minister-says/
  • Hill, J. F. (2014). The growth of data localization post-snowden: Analysis and recommendations for us policymakers and business leaders.
  • Hill, K. (2013, June 10). How Americans' Views On Surveillance Have Changed Over The Last Decade (Or Rather Not Changed). Forbes. doi:https://www.forbes.com/sites/kashmirhill/2013/06/10/how-americans-views-on-surveillance-have-changed-over-the-last-decade-or-rather-not-changed/#7c94a25f4f3c
  • Hinduja S. and Patchin J. (2010, July 22). Bullying, Cyberbullying, and Suicide. Archives of Suicide Research. Retrieved from http://www.tandfonline.com/doi/abs/10.1080/13811118.2010.494133
  • Hintz, A. & Dencik, L. (2016). The politics of surveillance policy: UK regulatory dynamics after Snowden. Internet Policy Review, 5(3).
  • Hobbes, T., & Gaskin, J. C. A. (1998). Leviathan. Oxford: Oxford University Press.
  • Horowitz, Julia. (2017) Massachusetts will hit Equifax with first state lawsuit over data breach. Retrieved from http://money.cnn.com/2017/09/12/news/equifax-lawsuit-massachusetts/index.html
  • Horsburgh, S; Goldfinch, S and Gauld, R. (2011) “Is Public Trust in Government Associated With Trust in E-Government?” Social Science Computer Review.
  • http://whqr.org/post/we-might-not-see-effects-equifax-breach-years#stream/0
  • Human rights watch (2017) https://www.hrw.org/news/2017/08/01/russia-new-legislation-attacks-internet-anonymity
  • Humans Rights Watch, Perils of Back Door Encryption Mandates. (2017, June 26). Retrieved November 05, 2017, from: https://www.hrw.org/news/2017/06/26/perils-back-door-encryption-mandates
  • Humer C. and Finkle J. (2014, September 24). Your medical record is worth more to hackers than your credit card. Reuters. Hurricane Odile. (2016). Retrieved from https://www.bbvadata.com/odile/ Inferring Commuting Statistics in the Greater Jakarta Area with Twitter. (2016). Retrieved from: https://www.unglobalpulse.org/projects/inferring-commuting-statistics-greater-jakarta-area-twitter
  • Humer, C. and Finkle, J. (2014). ”Your medical record is worth more to hackers than your credit card”. Published online 24 September 2014. Reuters.
  • Ievdokymova, Iryna. (2013) ACTA and the Enforcement of Copyright in Cyberspace: the Impact on Privacy. European Law Journal, v. 19, n. 6, p. 759-778.
  • Independent (2017) Russia threatens to block facebook if it refuses to store data in Russia http://www.independent.co.uk/life-style/gadgets-and-tech/russia-facebook-ban-putin-data-local-storage-threat-a7968711.html
  • Ingram, David. NSA sued by Wikimedia, rights groups over mass surveillance. Reuters. Retrieved from https://www.reuters.com/article/us-usa-nsa-wikipedia/nsa-sued-by-wikimedia-rights-groups-over-mass-surveillance-idUSKBN0M60YA20150310
  • Internet Abuse and Sexual Consent Lawyers. (2017). C.A. Goldberg, PLLC. Retrieved from http://www.cagoldberglaw.com/
  • intervention. The Guardian.
  • Jaffe, E. (2016). “How Estonia became a global model for e-government” Published 20 April 2016. Side Walk Talk.
  • Jahanzaib H. (2013). How technology in Pakistan should be used safely. The Express Tribune Blogs. Retrieved from https://blogs.tribune.com.pk/story/20349/if-you-love-me-youll-send-me-a-sexy-photo-of-you/
  • Jensen, E. (2014). Cyber Sovereignty: The Way Ahead. Texas International Law Journal 50, 275–304.
  • Joergensen, R.F. (2014, October 21). The unbearable lightness of user consent. Internet Policy Review, 3. DOI:10.14763/2014.4.330
  • Join The Team. (2015, September 13). Retrieved October 28, 2017, from https://bitnation.co/join-the-team/
  • Kelly, S. (2015, April 7). Invisible surveillance and indifference: We’re being watched, but does anybody care? The Monthly. Retrieved from https://www.themonthly.com.au/today/sean-kelly/2015/07/2015/1428374986/invisible-surveillance-and-indifference
  • Kerr, Orin. (2017) Supreme Court agrees to hear ‘Carpenter v. United States’, the Fourth Amendment historical cell-site case. The Washington Post. Retrieved from https://www.washingtonpost.com/news/volokh-conspiracy/wp/2017/06/05/supreme-court-agrees-to-hear-carpenter-v-united-states-the-fourth-amendment-historical-cell-site-case/?utm_term=.1da61a20e41c
  • Kharpal, Arjun. (2016) Apple vs FBI: All you need to know. CNBC. Retrieved from https://www.cnbc.com/2016/03/29/apple-vs-fbi-all-you-need-to-know.html
  • Kleinrock, L. (2008). History of the Internet and its flexible future. IEEE Wireless Communications, 15(1), 8–18. https://doi.org/10.1109/MWC.2008.4454699
  • Krasner, S. D. (2001). Abiding Sovereignty. International Political Science Review / Revue Internationale de Science Politique, 22(3), 229–251.
  • Legifrance. LOI n° 2016-41 du 26 janvier 2016 de modernisation de notre système de santé
  • Lessig, L. (2006). Code: Version 2.0. Basic Books. Retrieved from http://codev2.cc/download
  • Li, Q. (2006, May 1). Cyberbullying in Schools A Research of Gender Differences. Social Psychology International. Retrieved from http://journals.sagepub.com/doi/abs/10.1177/0143034306064547
  • Lomas, N. (2016, August 24). Encryption under fire in Europe as France and Germany call for decrypt law. Retrieved November 05, 2017, from: https://techcrunch.com/2016/08/24/encryption-under-fire-in-europe-as-france-and-germany-call-for-decrypt-law/
  • Madden, M. (2014, November 2014). Public Perceptions of Privacy and Security in the Post-Snowden Era. Pew Research Center. Retrieved from http://www.pewinternet.org/2014/11/12/public-privacy-perceptions/
  • Mangoli, D. (2017, October 23). ICO Ban in Japan a “Definite Possibility.” CryptoCoinsNews. Retrieved from https://www.cryptocoinsnews.com/japan-may-no-longer-be-a-safe-haven-for-icos/
  • Mantalero, Alessandro. (2013) The EU Proposal for a General Data Protection Regulation and the roots of the ‘right to be forgotten’. Computer Law & Security Review, v. 29, n. 3, p. 229-235.
  • Maras, M-H. (2012). The social consequences of a mass surveillance measure: What happens when we become the 'others'?. International Journal of Law, Crime and Justice, 65-80. Retrieved from: http://www.sciencedirect.com/science/journal/17560616/40/2?sdc=1
  • Marc. (2017, August 9). The Potential of IoT Technologies for People with Disabilities. IoTBusinessNews. Retrieved from https://iotbusinessnews.com/2017/08/09/69793-potential-iot-technologies-people-disabilities/
  • Maréchal, N. (2017). Networked authoritarianism and the geopolitics of information: Understanding Russian Internet policy. Media and Communication, 5(1).
  • McQueen, University of Stirling. (2017, October 20). Inside Emmanuel Macron's draconian anti-terrorism law. Retrieved October 22, 2017, from: https://theconversation.com/inside-emmanuel-macrons-draconian-anti-terrorism-law-83834
  • McQueeney, R. (2015, November 3). Snapchat and Instagram: How Their Advertising Technique is Changing the Game. Zacks Investment Research.
  • Meillassoux, M. (Director). (2016, October). Nothing to Hide [Motion picture]. France.
  • Microsoft. (2017). Law Enforcement Requests Report. Retrieved from Corporate Social Responsibility: https://www.microsoft.com/en-us/about/corporate-responsibility/lerr.
  • Moe, C. (2017). “Editorial for EJEG Volume 15 Issue 2” The Electronic Journal of e-Government Volume 15(2):57-58.
  • Moreno, J., Serrano, M. And Fernández-Medina. (2016). “Main Issues in Big Data Security”
. Future Internet 8(44):2-16
  • Moser, F. (Producer & Director). The Maze [Motion Picture]. Austria.
  • Murgia, M and Neville, S. (2017). “NHS was an easy target in global hacking attack” Published online 13 May 2017. Financial Times.
  • My Sex Life is Being Used Against Me. (2016). Hack*Blossom. Retrieved from https://hackblossom.org/domestic-violence/threats/sexual-content.html
  • Naughton, J. (2013, October 20). Edward Snowden: public indifference is the real enemy in the NSA affair. The Guardian. Retrieved from https://www.theguardian.com/world/2013/oct/20/public-indifference-nsa-snowden-affair
  • Naughton, J. (2013, October 20). Edward Snowden: public indifference is the real enemy in the NSA affair. Retrieved from The Guardian: https://www.theguardian.com/world/2013/oct/20/public-indifference-nsa-snowden-affair
  • Nocetti, J. (2011). “Digital Kremlin”: power and the internet in Russia. Russie. Nei. Visions, (59), 5.
  • Nocetti, J. (2015). Russia's 'dictatorship-of-the-law' approach to internet policy. Internet Policy Review, 4(4). DOI: 10.14763/2015.4.380
  • O’Brien, Kevin. (2012) Law Students in Austria Challenge Facebook Privacy Policy. The New York Times. Retrieved from http://www.nytimes.com/2012/12/05/technology/austrian-group-plans-court-challenge-to-facebooks-privacy-policies.html
  • Ojanen, Tuomas. (2012) Making the Essence of Fundamental Rights Real: The Court of Justice of the European Union Clarifies the Structure of Fundamental Rights under the Charter. European Constitutional Law Review, 12, p. 318-329.
  • Oliver, J. (2015, April 5). Government Surveillance: Last Week Tonight with John Oliver (HBO). Retrieved from Youtube: https://www.youtube.com/watch?v=XEVlyP4_11M.
  • Panday, C (2017) Rising Demands for Data Localization a Response to Weak Data Protection Mechanisms Electronic Frontier Foundation https://www.eff.org/deeplinks/2017/08/rising-demands-data-localization-response-weak-data-protection-mechanisms
  • Paulson, Michelle. (2015) ROGERS, Jacob. Victory in Germany: court rules in favor of the Wikimedia Foundation. Wikimedia. Retrieved from https://blog.wikimedia.org/2015/11/24/victory-germany-court-ruling/
  • Pohle, J. (2016). ‘Multistakeholder governance processes as production sites: enhanced cooperation "in the making"’. Internet Policy Review, 5(3).
  • Pohle, J. and Leo Van Audenhove (2017) Post-Snowden Internet Policy: Between Public Outrage, Resistance and Policy Change Media and Communication - Volume 5, Issue 1
  • Polatin-Reuben, D., & Wright, J. (2014). An Internet with BRICS Characteristics: Data Sovereignty and the Balkanisation of the Internet. Presented at the 4th Workshop on Free and Open Communications on the Internet, San Diego (CA). Retrieved from https://www.usenix.org/conference/foci14/workshop-program/presentation/polatin-reuben
  • Powles, J. (2017). “Why are we giving away our most sensitive health data to Google?” Published online 5 July 2017. UK: The Guardian.
  • Prasad, S. K. (2016). Digitisation of Health / Medical Records: Is the law keeping up? Published online 7 December 2016. Delhi: Legally India.
  • Pufong, M. G. (2001). State Obligation, Sovereignty, and Theories of International Law. Politics & Policy, 29(3), 478–519. https://doi.org/10.1111/j.1747-1346.2001.tb00600.x
  • Raytheon I Websense (2015) 2015 Industry Drill-Down Report: Healthcare. Raytheon Company. Retreived online 22 October 2017.
  • Registrar of the Court. (2014) European Court of Human Rights – Press Release. French crime database system in breach of Convention for storing information on individuals against whom proceedings have been dropped. Retrieved from http://www.statewatch.org/news/2014/sep/echr-france-judgment-brunet-v-France-storage-of-information-on-crime-database.pdf.
  • Registration for all in India: The Economist. (2017, April 15). Aadhaar: Digital Dawn. Government Information Quarterly.
  • Reporters without borders (2014), Enemies of the Internet : entities at the heart of censorship and surveillance http://12mars.rsf.org/2014-en/#slide2
  • Reuters. (2017). “Plague kills 124 in Madagascar, cities most affected: report”. Published online on October 25th 2017.
  • Revenge Porn and Internet Privacy. (2017). C.A. Goldberg, PLLC. Retrieved from http://www.cagoldberglaw.com/revenge-porn-and-internet-privacy/?non-consensualdistributionofsexualimagesandorvideosierevengeporn
  • Rieff, D. (2013, August 22). Why Nobody Cares About the Surveillance State. Foreign Policy. Retrieved from http://foreignpolicy.com/2013/08/22/why-nobody-cares-about-the-surveillance-state/
  • Rodriguez, K. (2015, June 17). Strong Encryption and Anonymity Are The Guardians Of Free Expression. Retrieved November 05, 2017, from: https://www.eff.org/deeplinks/2015/06/strong-encryption-and-anonymity-are-guardians-free-expression
  • Rosen, Rebecca, C. (2013, June 11). Why Should We Even Care if the Government is Collecting our Data? The Atlantic. Retrieved from:https://www.theatlantic.com/technology/archive/2013/06/why-should-we-even-care-if-the-government-is-collecting-our-data/276732/
  • Rubinstein, I. S., Nojeim, G. T., & Lee, R. D. (2014). Systematic government access to personal data: a comparative analysis. International Data Privacy Law, 4(2), 96-119.
  • Rubinstein, I., Nojeim, G., & Lee Ronald. (2014). Systematic government access to private data: a comparative analysis. International Data Privacy Law, 4 (2), 96-119.
  • Russia tells Facebook to localize user data or be blocked (2017) Reuters https://www.reuters.com/article/us-russia-facebook/russia-tells-facebook-to-localize-user-data-or-be-blocked-idUSKCN1C11R5
  • Russians Selectively Blocking (2013) Russians Selectively Blocking Internet, New York Times http://www.nytimes.com/2013/04/01/technology/russia-begins-selectively-blocking-internet-content.html
  • S., M. (2013, June 11). Should the government know less than Google? The Economist. Retrieved from https://www.economist.com/blogs/democracyinamerica/2013/06/surveillance-0
  • S.S. Lotus - France v. Turkey (P.C.I.J. September 7, 1927). Retrieved from http://www.worldcourts.com/pcij/eng/decisions/1927.09.07_lotus.htm
  • Safer Nudes. (2016). Coding Rights. Retrived from https://www.codingrights.org/safernudes/
  • Safi, Michael. (2017) Indian court rules privacy a ‘fundamental right’ in battle over national ID cards. The Guardian: 2017. Retrieved from https://www.theguardian.com/world/2017/aug/24/indian-court-rules-privacy-a-fundamental-right-in-battle-over-national-id-cards
  • Sales, N. (2017, May 8). 13 Reasons Why is being devoured by teenagers. The Guardian. Retrieved from https://www.theguardian.com/commentisfree/2017/may/08/13-reasons-why-devoured-teenagers-understand-why
  • Sargsyan, T. (2016, December 16). The privacy role of information intermediaries through self-regulation. Internet Policy Review , 5 (4).
  • Senese, A., Mossé, M., Kent, G., & Sacquet, M. (2017, October 9). The Internet, private actors and security challenges. Sciences Po, Paris, France.
  • Shearman S. (2017, March 30). Cyberbullying in the workplace. The Guardian. Retrieved from https://www.theguardian.com/careers/2017/mar/30/cyberbullying-in-the-workplace-i-became-paranoid
  • Shen, Y. (2016). Cyber Sovereignty and the Governance of Global Cyberspace. Chinese Political Science Review, 1(1), 81–93. https://doi.org/10.1007/s41111-016-0002-6
  • Shepard, C. (2017) China quietly releases draft of tough new intelligence law, Reuters. http://www.reuters.com/article/us-china-security-lawmaking/china-quietly-releases-draft-of-tough-new-intelligence-law-idUSKCN18C0UX
  • Smith, C. (2016, September 20). The Snowden effect: Three years after Edward Snowden’s mass-surveillance leaks, does the public care how they are watched. Index on Censorship, 45, 48-50. doi:10.1177/0306422016670343
  • Smith, C. (2016). The Snowden effect: Three years after Edward Snowden’s mass-surveillance leaks, does the public care how they are watched?. SAGE journals. Retrieved from: http://journals.sagepub.com/doi/abs/10.1177/0306422016670343
  • Smith, P. et. al. (2008, March 19). Cyberbullying: its nature and impact in secondary school pupils. The Journal of Child Psychology and Psychiatry. Retrieved from http://onlinelibrary.wiley.com/doi/10.1111/j.1469-7610.2007.01846.x/abstract
  • Snowden, E. (2015, June 4). Edward Snowden: The World Says No to Surveillance. Retrieved from The New York Times: https://www.nytimes.com/2015/06/05/opinion/edward-snowden-the-world-says-no-to-surveillance.html
  • Social Media Safety Guides. (2017). HeartMob. Retrieved from https://iheartmob.org/resources/safety_guides
  • Solon, O. (2017, March 7). With the latest WikiLeaks revelations about the CIA – is privacy really dead?. Retrieved from The Guardian: https://www.theguardian.com/world/2017/mar/09/with-the-latest-wikileaks-revelations-about-the-cia-is-privacy-really-dead.
  • Solon, O. (2017). US consumers lose privacy protections for their web browsing history, The Guardian.
  • Solove, D.J. (2011, May 15). Why privacy matters even if you have ‘nothing to hide’. The Chronicle of Higher Education. Retrieved from http://www.chronicle.com/article/Why-Privacy-Matters-Even-if/127461/
  • Spice, B. (2017, September 15). To Improve Smartphone Privacy, Control Access to Third-Party Libraries. Carnegie Mellon University.
  • Stacey, Kiran. (2017) India supreme court deals blow to biometric ID system. Financial Times. Retrieved from https://www.ft.com/content/473c8532-888f-11e7-bf50-e1c239b45787?mhq5j=e5
  • Stark, L. (2015, December 2015). The emotional context of information privacy. The Information Society, 32, 14-27. http://dx.doi.org/10.1080/01972243.2015.1107167
  • Stoycheff, E. (2016). Under Surveillance: Examining Facebook’s Spiral of Silence Effects in the Wake of NSA Internet Monitoring. Journalism & Mass Communication Quarterly , 93 (2), pp. 296– 311.
  • Stoycheff, E., Wibowo, K. A., Liu J., & Xu K. (2017). Online Surveillance’s Effect on Support for Other Extraordinary Measures to Prevent Terrorism. Mass Communication and Society, 1-16. Retrieved from: http://dx.doi.org/10.1080/15205436.2017.1350278
  • Strielkowski, W.; Gryshova, I.; Kalyugina, S. (2017). Modern Technologies in Public Administration Management: A Comparison of Estonia, India and United Kingdom. Administratie si Management Public, (28): 174-185.
  • Tewari, S. (2015, October 6). Facebook: Social Media or Paid Media? Afaqs!
  • The Economist. (2017). “India’s biometric identity scheme should not be compulsory”. Leader published 15 April 2017. London: The Economist.
  • The Guardian. (2017) “The Guardian view on a Swedish scandal: the precedence of privacy.” Editorial published 31 July 2017. London: The Guardian.
  • The world’s most valuable resource is no longer oil, but data. (2017, May 6). The Economist. Retrieved from https://www.economist.com/news/leaders/21721656-data-economy-demands-new-approach-antitrust-rules-worlds-most-valuable-resource
  • Thielman, S. (2017, January 10). Your private medical data is for sale – and it's driving a business worth billions. The Guardian.
  • Thompson, M. and Jethro, M. (2017). “World’s biggest cyberattack sends countries into ‘disaster recovery mode’” Published online 14 May 2017. Washington: CNN.
  • Tokunaga R. (2010, May). Following you home from school: A critical review and synthesis of research on cyberbullying victimization. Science Direct. Retrieved from http://www.sciencedirect.com/science/article/pii/S074756320900185X
  • Tolbert, C. J. and Mossberger, K. (2006). “The Effects of E-Government on Trust and Confidence in Government”. Public Administration Review 66(3): 354-369.
  • Topak, Özgün E. 2017. The Making of a Totalitarian Surveillance Machine: Surveillance in Turkey Under AKP Rule. Surveillance & Society 15(3/4): 535-542. Retrieved from: https://ojs.library.queensu.ca/index.php/surveillance-and-society/article/view/6614
  • Tréguer, F. (2017). Intelligence Reform and the Snowden Paradox: The Case of France. Media and Communication, 5(1). Retrieved from: https://www.wethenet.eu/wp-content/uploads/Tr%C3%A9guer-Intelligence-Reform-and-the-Snowden-Paradox-final.pdf
  • United Nations Global Pulse About. (2016). Retrieved from https://www.unglobalpulse.org/about-new
  • United Nations. (2016). “United Nations E-Government survey 2016”. New York: United Nations.
  • Walker, Robert Kirk. (2012) The Right to be Forgotten, Hastings Law Journal, v. 64, p. 257.
  • Walker, S. (2016, November 17). Russia blocks access to LinkedIn over foreign-held data. The Guardian. Retrieved from http://www.theguardian.com/world/2016/nov/17/russia-blocks-access-to-linkedin-over-foreign-held-data
  • Watt, E. (2017). ‘The right to privacy and the future of mass surveillance’. The International Journal of Human Rights , 21(7). Retrieved from: http://www.tandfonline.com/doi/abs/10.1080/13642987.2017.1298091
  • Watt, E. (2017). ‘The right to privacy and the future of mass surveillance’. The International Journal of Human Rights , 21 (7), pp. 773-799
  • Weber, M. (1965). Politics as a Vocation. Fortress Press Philadelphia, PA.
  • Willsher, K. (2015, January 21). France boosts anti-terror measures in wake of Paris attacks. The Guardian. Retrieved from: https://www.theguardian.com/world/2015/jan/21/france-anti-terror-measures-paris-attacks-manuel-valls
  • Willsher, K. (2015, July 24). France approves 'Big Brother' surveillance powers despite UN concern. Retrieved October 22, 2017, from: https://www.theguardian.com/world/2015/jul/24/france-big-brother-surveillance-powers
  • Withers, I. (2017, September 16). The big data revolution: the high price of a force for good. The Telegraph.
  • Withers, I. (2017). ”The big data revolution: the high price of a force for good”. Published online 16 September 2017. UK: The Telegraph.
  • Wong, C. (2017, July 2). The dangers of surveillance in the age of populism. Retrieved from Newsweek: http://www.newsweek.com/state-surveillance-europe-populism-cctv-citizens-553857.
  • Wood, M. and Schwab, K. (2017, September 20). We might not see the effects of the Equifax breach for years. whqr.org. Retrieved from http://whqr.org/post/we-might-not-see-effects-equifax-breach-years#stream/0
  • Woolf, N. (2016, August 26). Stingray documents offer rare insight into police and FBI surveillance. Retrieved October 22, 2017, from: https://www.theguardian.com/us-news/2016/aug/26/stingray-oakland-police-fbi-surveillance
  • Yahoo. (2017). Yahoo! Inc. Law Enforcement Response Guidelines. Retrieved from Transparency Report: https://transparency.yahoo.com/law-enforcement-guidelines/us.
  • Zalaquett C. and Chatters S. (2014). Cyberbullying in College: Frequency, Characteristics, and Practical Implications. SAGE Open. http://journals.sagepub.com/doi/pdf/10.1177/2158244014526721
  • Zetter, K. (2013, August 30). Google, Microsoft Press Lawsuits for Right to Release More Surveillance Data. Retrieved from Wired: https://www.wired.com/2013/08/google-and-microsoft-sue-gov/