Bekey, G. A. (2005). Autonomous robots: From biological inspiration to implementation and control. Cambridge, Mass: The MIT Press.
Bingham, T. (2011). The rule of law. London: Penguin.
Boyd, D. (2010). Social networks sites as networked publics: affordances, dynamics, and implications. In Z. Papacharissi (Ed.), Networked self: Identity, community, and culture on social networks sites (pp. 39–58). London: Routledge.
Butler, J. (2005). Giving an account of oneself
. New York: Fordham University Press.CrossRef
Cavoukian, A. (2010). Privacy by design: The definitive workshop. Identity in the Information Society,
Dworkin, G. (1988). The theory and practice of autonomy
. Cambridge, Mass: Cambridge University Press.CrossRef
Faden, R., & Beauchamp, Th. (1986). A history and theory of informed consent. New York: Oxford University Press.
Flanagan, M., Howe, D. C., & Nissenbaum, M. (2008). Embodying values in technology: Theory and practice. In J. van den Hoven & J. Weckert (Eds.), Information technology and moral philosophy (pp. 322–353). New York: Cambridge University Press.
Floridi, L. (2003). On the intrinsic value of information objects and the infosphere. Ethics and Information Technology,
Floridi, L., & Sanders, J. (2004). On the morality of artificial agents. Minds and Machines,
Goldsmith, J. (1998). Against cyberanarchy. University of Chicago Law Review,
Grodzinsky, F. S., Miller, K. A., & Wolf, M. J. (2008). The ethics of designing artificial agents. Ethics and Information Technology,
Hildebrandt, M. (2011) Autonomic and autonomous ‘thinking.’ Preconditions for criminal accountability. In M. Hildebrandt & A. Rouvroy (Eds.), The philosophy of law meets the philosophy of technology (pp. 141–160). Abingdon: Routledge.
Himma, K. (2009). Artificial agency, consciousness, and the criteria for moral agency: What properties must an artificial agent have to be a moral agent? Ethics and Information Society,
Hustinx, P. (2007). Opinion of the European Data Protection Supervisor on the Communication from the Commission to the European Parliament and the Council on the follow-up of the Work Programme for better implementation of the Data Protection Directive. Official Journal of the European Union, 2007/C 2551/01, July 25th 2007.
Jobs, S. (2007). Thoughts on music. Retrieved at http://www.apple.com/hotnews/thoughtsonmusic/
on September 20th, 2011.
Jutla, D. N. (2010). Layering privacy on operating systems, social networks, and other platforms by design. Identity in the Information Society,
Kallinikos, J. (2006). The consequences of information: institutional implications of technological change. Elgar, Cheltenham, Northampton, Mass.
Kant, I. (1795). Kant’s principles of politics, including his essay on perpetual peace. A contribution to political science. (edition 1891) (trans: Hastie W), Edinburgh, Clark.
Katyal, N. (2003). Digital architecture as crime control. Yale Law Journal,
Kelsen, H. (1949). General theory of the law and the state. Cambridge, Mass: Harvard University Press.
Kesan, J. P., & Shah, R. C. (2006). Setting software defaults: Perspectives from law, computer science and behavioural economics. Notre Dame Law Review,
Kuner, Ch. (2003). European data privacy law and online business. Oxford, London: Oxford University Press.
Lessig, L. (1999). Code and other laws of cyberspace. New York: Basic Books.
Lessig, L. (2004). Free culture: The nature and future of creativity. New York: Penguin Press.
Lockton, D., Harrison, D. J., & Stanton, N. A. (2010). The design with intent method: A design tool for influencing user behaviour. Applied Ergonomics,
Morozov, E. (2011). The net delusion: The dark side of internet freedom. New York: Public Affairs.
Nissenbaum, H. (2004). Privacy as contextual integrity. Washington Law Review,
Pagallo, U. (2010). As law goes by: Topology, ontology, evolution. In P. Casanovas, et al. (Eds.), AI approaches to the complexity of legal systems (pp. 12–26). Berlin: Springer.
Pagallo, U. (2011a). Designing data protection safeguards ethically. Information,
Pagallo, U. (2011b). ISPs & rowdy sites before the law: Should we change today’s safe harbor clauses? Philosophy & Technology,
Post, D. G. (2002). Against “against cyberanarchy”. Berkeley Technology Law Journal,
Prigogine, I. & Stengers, I. (1981). Vincolo, Enciclopedia Einaudi, 14, 1064–1080. Einaudi, Torino.
Tavani, H. T. (in press), Ethical aspects of autonomous systems. In M. Decker & M. Gutmann (eds), Information- and robot-ethics: Some fundamentals, Verlag Berlin, Germany.
Volkman, R. (2003). Privacy as life, liberty, property. Ethics and Information Technology,
von Ahn, L., Maurer, B., McMillen, C., Abraham, D., & Blum, M. (2008). reCAPTCHA: Human-based character recognition via web security measures. Science,
WP 29. (2002). EU Working Party art. 29 D-95/46/EC. The international application of EU data protection law to personal data processing on the Internet by non-EU based web sites, WP 56, May 30th 2002.
WP 29. (2009a). EU Working Party art. 29 D-95/46/EC. Online social networking, WP 163, June 12th, 2009.
WP 29. (2009b). EU Working Party art. 29 D-95/46/EC. The future of privacy. WP 168, December 1st 2009.
Yeung, K. (2007). Towards an understanding of regulation by design. In R. Brownsword & K. Yeung (Eds.), Regulating technologies: Legal futures, regulatory frames and technological fixes (pp. 79–108). London: Hart Publishing.
Zittrain, J. (2007). Perfect enforcement on tomorrow’s internet. In R. Brownsword & K. Yeung (Eds.), Regulating technologies: Legal futures, regulatory frames and technological fixes (pp. 125–156). London: Hart Publishing.