• عربي
  • 中文
  • English
  • Français
  • Русский
  • Español
 
  This module is a resource for lecturers  

 

Advanced reading

 

The following readings are recommended for those interested in exploring the topics covered in this Module in more detail:

  • Brunton, Finn and Helen Nissbaum. (2015). Obfuscation: A User's Guide for Privacy and Protest. MIT Press.
  • Chatelain, Yannick. (2018). Darknet: faut-il démanteler la revente illégale de la liberté de s'exprimer et de s'informer? The Conversation, 5 July 2018.
  • Gerry, Felicity, Julia Muraszkiewicz, and Niovi Vavoula. (2016). The role of technology in the fight against human trafficking: Reflections on privacy and data protection concerns.  Computer Law & Security Review, Vol. 32(2), 205-217.
  • Joyce, Daniel. (2015). Privacy in the Digital Era: Human Rights Online? Melbourne Journal of International Law, Vol.16, 270-285.
  • Koops Bert-Jaap, Bryce Clayton Newell, Tjerk Timan, Ivan Škorvánek, Tomislav Chokrevski, and Maša Galič. (2017). A typology of privacy. University of Pennsylvania Journal of International Law, Vol. 38(2), 483-575.
  • McCallister, Erika, Timothy Grance, Karen A. Scarfone. (2010). Guide to Protecting the Confidentiality of Personally Identifiable Information (PII) . NIST.
  • NIST. (2017). Security and Privacy Controls for Information Systems and Organizations. Draft NIST Special Publication 800-53 .
  • Stewart, Katherine. Looking Backward, Moving Forward: What Must be Remembered When Resolving the Right to be Forgotten. Brooklyn Journal of International Law, Vol. 42(2), 843-886.
  • Summers, Sarah J., Christian Schwarzenegger, Gian Ege, and Finlay Young. (2014). The Emergence of EU Criminal Law: Cyber Crime and the Regulation of the Information Society. Hart.
  • Tikkinen-Piri, Christina, Anna Rohunen, and Jouni Markula. (2018). EU General Data Protection Regulation: Changes and implications for personal data collecting companies. Computer Law & Security Review, Vol. 34(1), 134-153.
  • Vaciago, Giuseppe. (2012). ISPs and Civil Liberties: The "Reasonable Expectation of Privacy" of Twitter's User from People v. Harris. Computer Law Review International, Vol. 13(5), 137-141.
 
Next: Student assessment
Back to top