Anderson, C. (2010). The Web is dead: Who’s to blame—Us. Wired, September, pp. 123–127, 164.
Bauböck, R. (1994). Transnational citizenship: Membership and rights in international migration. London: Elgar.
Berners-Lee, T. (1999). Weaving the web. San Francisco: Harper.
Breuker, J., Casanovas, P., Klein, M., & Francesconi, E. (Eds.). (2009). Law, ontologies and the semantic web. Amsterdam: Ios Press.
Casanovas, P., Pagallo, U., Sartor, G., & Ajani, G. (Eds.). (2010). AI approaches to the complexity of legal systems. Complex systems, the semantic web, ontologies, argumentation, and dialogue. Berlin: Springer.
Cavoukian, A. (2010). Privacy by design: The definitive workshop. Identity in the Information Society, 3
Cerf, V. (2007). User-generated content is top threat to media and entertainment industry. Accenture, April 16.
Cohen-Almagor, R. (2010). Responsibility of and trust in ISPs. Knowledge, Technology & Policy, 23
CSISAC (2009). Comments to OECD on information intermediaries
. The Civil Society Information Society Advisory Council, June 30th, 2009. Retrieved 3rd November 2010 from http://csisac.org/docs/OECD_Intermediary_071409_final.pdf
Flanagan, M., Howe, D. C., & Nissenbaum, M. (2008). Embodying values in technology: Theory and practice. In J. van den Hoven & J. Weckert (Eds.), Information technology and moral philosophy (pp. 322–353). New York: Cambridge University Press.
Floridi, L. (2003). On the intrinsic value of information objects and the infosphere. Ethics and Information Technology, 4
Floridi, L. (2006). Information technology and the tragedy of the good will. Ethics and Information Technology, 8
Glorioso, A., Pagallo, U., & Ruffo, G. (2010). The social impact of P2P systems. In X. Shen, H. Yu, J. Buford, & M. Akon (Eds.), Handbook of peer-to-peer networking
(pp. 47–70). Heidelberg: Springer.CrossRef
Grodzinsky, F. S., & Tavani, H. T. (2005). P2P networks and the Verizon v. RIAA
case: Implications for personal privacy and intellectual property. Ethics and Information Technology, 7
Grodzinsky, F. S., Miller, K. A., & Wolf, M. J. (2008). The ethics of designing artificial agents. Ethics and Information Technology, 10
Hobbes, T. (1651). Leviathan (1982 edition). New York: Penguin.
Hustinx, P. (2007), Opinion of the European Data Protection Supervisor on the Communication from the Commission to the European Parliament and the Council on the follow-up of the Work Programme for better implementation of the Data Protection Directive. Official Journal of the European Union, 2007/C 2551/01, July 25th 2007.
Jobs, S. (2007). Thoughts on music
. Retrieved 20th April 2009 from http://www.apple.com/hotnews/thoughtsonmusic/
Jutla, D. N. (2010). Layering privacy on operating systems, social networks, and other platforms by design. Identity in the Information Society, 3
Kant, I. (1795). Kant’s principles of politics, including his essay on perpetual peace. A contribution to political science (translated by W. Hastie). Edinburgh, Clark, 1891.
Kuner, Ch. (2003). European data privacy law and online business. Oxford: Oxford University Press.
Lessig, L. (1999). Code and other laws of cyberspace. New York: Basic Books.
Lessig, L. (2004). Free culture: The nature and future of creativity. New York: Penguin.
Lockton, D., Harrison, D. J., & Stanton, N. A. (2010). The design with intent method: A design tool for influencing user behaviour. Applied Ergonomics, 41
Nissenbaum, H. (2004). Privacy as contextual integrity. Washington Law Review, 79(1), 119–158.
Norman, D. A. (2007). The design of future things. New York: Basic Books.
Pagallo, U. (2008). La tutela della privacy negli USA e in Europa. Modelli Giuridici a Confronto. Milano: Giuffrè.
Pagallo, U. (2009). Privacy e design. Informatica e Diritto, 1, 123–134.
Pagallo, U. (2010). As law goes by: Topology, ontology, evolution. In P. Casanovas et al. (Eds.), AI approaches to the complexity of legal systems (pp. 12–26). Berlin: Springer.
Pagallo, U., & Durante, M. (2009). Three roads to P2P systems and their impact on business practices and ethics. Journal of Business Ethics, 90
Post, D. G. (2009). In search of Jefferson’s moose: Notes on the state of cyberspace. Oxford: Oxford University Press.
Sartor, G. and Viola de Azevedo Cunha, M. (2010). The Italian Google-case: Privacy, freedom of speech and responsibility of providers for user-generated contents. International Journal of Law and Information Technology
, forthcoming. Retrieved 19th November 2010 at SSRN from http://ssrn.com/abstract=1604411
Volkman, R. (2003). Privacy as life, liberty, property. Ethics and Information Technology, 5
von Ahn, L., Maurer, B., McMillen, C., Abraham, D., & Blum, M. (2008). reCAPTCHA: Human-based character recognition via web security measures. Science, 321
Waldron, J. (2010). Dignity and defamation: The visibility of hate. Harvard Law Review, 123(7), 1596–1657.
Wolff, M. (2010). The web is dead: Who’s to blame—Them. Wired, September, pp. 123–127, 166.
WP 29 (2009a). EU Working Party art. 29 D-95/46/EC. Online social networking, 01189/09/EN–WP 163, June 12th, 2009.
WP 29 (2009b). EU Working Party art. 29 D-95/46/EC. The future of privacy. 02356/09/EN–WP 168, December 1st 2009.
WP 29 (2010). EU Working Party art. 29 D-95/46/EC. The concepts of “controller” and “processor.” 02264/10/EN–WP 169, February 16th 2010.
Yeung, K. (2007). Towards an understanding of regulation by design. In R. Brownsword & K. Yeung (Eds.), Regulating technologies: Legal futures, regulatory frames and technological fixes (pp. 79–108). London: Hart Publishing.
Zittrain, J. (2007). Perfect enforcement on tomorrow’s Internet. In R. Brownsword & K. Yeung (Eds.), Regulating technologies: Legal futures, regulatory frames and technological fixes (pp. 125–156). London: Hart Publishing.
Zittrain, J. (2008). The future of the Internet and how to stop it. New Haven: Yale University Press.