• Marcelo Corrales CompagnucciEmail author
Part of the Perspectives in Law, Business and Innovation book series (PLBI)


Information technology law (or IT Law) is a new field that was practically unknown just a few decades ago. It goes back, however, to an era before the personal computer entered into mainstream markets. It was not until the mid-1990s and the rise of the Internet that the union of the fields of IT and Law into a unique system became more necessary.


  1. Alkhatib H et al (2014) IEEE CS 2022 Accessed 10 May 2019
  2. Alikhan S, Mashelkar R (2009) Intellectual property and competitive strategies in the 21st century, 2nd edn. Kluwer Law International, Alphen aan den Rijn, p. 19Google Scholar
  3. Al-Khouri A (2012) Data ownership: who owns “my data”? Int J Manag Inf Technol 2(2):1–8Google Scholar
  4. Bainbridge D (2008) Introduction to information technology law. Person Longman, LondonGoogle Scholar
  5. Balasubramanyam S (2013) Cloud-based development using classic life cycle model. In: Mahmood Z, Saqib S (eds) Software engineering frameworks for the cloud computing paradigm. Springer, London, p 102Google Scholar
  6. Biswas S (2014) Relationship marketing: concepts, theories and cases, 2nd edn. Learning Private Limited, Delhi, p 333Google Scholar
  7. Bygrave L, Bing J (2009) (eds) Internet governance: infrastructure and institutions. Oxford University Press, Oxford, pp 3–4Google Scholar
  8. Carr N (2008) The big switch: rewiring the world: from Edison to Google. W.W. Norton & Company, New YorkGoogle Scholar
  9. Catlett C et al (2013) (eds) Cloud computing and big data, preface. IOS Press, AmsterdamGoogle Scholar
  10. Chen M et al (2014) Big data: related technologies, challenges and future prospects. Springer, Cham, pp 12–13Google Scholar
  11. Coleman J (2001) The practice of principle: in defence of a pragmatist approach to legal theory. Oxford University Press, OxfordGoogle Scholar
  12. Corrales M et al (2010) Intellectual property rights in e-health: balancing out the interest at stake–a Herculean task? Int J Private Law 3(3):287CrossRefGoogle Scholar
  13. Corrales M (2012) EU commission calls to “unleash the potential of cloud computing in Europe.” Beck-Online, ZD-Aktuell, No. 03228Google Scholar
  14. Davison M (2003) The legal protection of databases. Cambridge University Press, Cambridge, p 97Google Scholar
  15. Elkin-Koren N, Salzberger E (2013) The law and economics of intellectual property in the digital age: the limits of analysis. Routledge, London, p 44Google Scholar
  16. Guadamuz A (2006) Open science: open source licenses in scientific research. N C J Law Technol 7(2):321Google Scholar
  17. Hashem A et al (2015) The rise of “big data” on cloud computing: review and open research issues. Inf Syst 47:98–115CrossRefGoogle Scholar
  18. Hon W, Millard C, Walden I (2012) Negotiating cloud contracts: looking at clouds from both sides now. Stan Tech L Rev 81 16(1):79–129Google Scholar
  19. Horten M (2016) Closing of the net. Polity Press, CambridgeGoogle Scholar
  20. Iannarelly J, O’Shaughnessy M (2015) Information governance and security: protecting and managing your company’s proprietary information. Butterworth Heinemann, Oxford, p 40Google Scholar
  21. Kannan R et al (2016) (eds) Managing and processing big data in cloud computing. Preface. Information Science Reference (IGI Global), HersheyGoogle Scholar
  22. Kasemsap K (2015) The role of cloud computing adoption in global business. In: Chang V, Walters R, Wills G (eds) Delivery and adoption of cloud computing services in contemporary organizations. Information Science Reference (IGI Global), Hershey, p 31Google Scholar
  23. Kinsella N (2008) Against intellectual property. Ludwig von Mises Institute, Auburn (AL)Google Scholar
  24. Klarman S (1991) Margin of safety: risk-averse value investing strategies for the thoughtful investor, 1st edn. HarperCollins, New YorkGoogle Scholar
  25. Lake P, Drake R (2014) Information systems management in the big data era. Springer, Cham, p 164Google Scholar
  26. Lessig L (1999) Code, and other laws of cyberspace. Basic Books, New YorkGoogle Scholar
  27. Lightman A (2002) Brave new unwired world: the digital big bang and the infinite internet, preface. Wiley, New YorkGoogle Scholar
  28. Mackaay E (1982) Economics of information and law. Kluwer Boston Inc., Boston, p 173CrossRefGoogle Scholar
  29. Marinescu D (2013) Cloud computing: theory and practice, preface. Morgan Kaufmann, WalthamCrossRefGoogle Scholar
  30. McAfee A, Brynjolfsson E (2012) Big data: the management revolution. Harv Bus Rev. Accessed 10 May 2019
  31. McCormick R (2010) Legal risks in the financial market, introduction, 2nd edn. Oxford University Press, Oxford, pp 1–2Google Scholar
  32. Millham R (2012) Software asset re-use: migration of data-intensive legacy system to the cloud computing paradigm. In: Yang H, Liu X (eds) Software reuse in the emerging cloud computing era. Information Science Reference (IGI Global), Hershey, p 2Google Scholar
  33. Mosco V (2014) To the cloud: big data in a turbulent world. Routledge, New YorkGoogle Scholar
  34. Muller H (2015) The big shift in IT leadership: How great CIOs leverage the power of technology for strategic business growth in the customer-centric economy. Wiley, Hoboken, p 168Google Scholar
  35. Murugesan S, Ananth A (2016) Cloud computing: an overview. In: Murugesan S, Bojanova I (eds) Encyclopedia of cloud computing. Wiley, Chichester, p 4CrossRefGoogle Scholar
  36. Oskamp A, Lodder A (2006) Introduction: Law, Information Technology and Artificial Intelligence. In: Lodder A, Oskamp A (eds) Information technology and lawyers: advanced technology in the legal domain. From challenges to daily routine. Springer, Dordrecht, pp 3–4Google Scholar
  37. Reidenberg J (1998) Lex informatica: the formulation of information policy rules through technology. Tex Law Rev 71:553–593Google Scholar
  38. Robson P, McCowan A (1998) Property law, Green’s concise scots law, 2nd edn. Sweet & Maxwell, Edinburgh, p 15Google Scholar
  39. Schiaudone R (2013) Dealing with IP matters in cross-border cases. J Intellect Prop Law Pract 8(4):332CrossRefGoogle Scholar
  40. Srinivasan S (2014) Cloud computing basics. Springer Briefs in Electrical and Computer Engineering. Springer, New York, p 5CrossRefGoogle Scholar
  41. Sunstein C, Thaler R (2003) Libertarian paternalism is not an oxymoron. Univ Chic Law Rev 70(4):1159–1202CrossRefGoogle Scholar
  42. Thaler R, Sunstein C (2003) Libertarian paternalism. Am Econ Rev 93(2):175–179CrossRefGoogle Scholar
  43. Thaler R, Sunstein C, Balz J (2010) Choice architecture Accessed 10 May 2019
  44. Trochim W (2006) Philosophy of research, research methods knowledge base Accessed 10 May 2019
  45. Van Schewick B (2010) Internet architecture and innovation. The MIT Press, CambridgeCrossRefGoogle Scholar
  46. Vincent M, Hart N, Morton K (2011) Cloud computing contracts white paper: a survey of terms and conditions. Truman Hoyle Lawyers, Sydney, Australia, pp 1–21. Accessed 10 May 2019
  47. Viscusi W (1998) Rational risk policy: The 1996 Arne Ryde memorial lectures. Clarendon Press, OxfordCrossRefGoogle Scholar
  48. Wright J, Ginsburg D (2012) Behavioral law and economics: its origins, fatal flaws, and implications for liberty. Northwest Univ Law Rev 106(3):1033Google Scholar
  49. Wu L et al (2013) Automated SLA negotiation framework for cloud computing. In: Balaji P, Epema D, Fahringer T (eds) Cluster, cloud, and grid computing, 13th IEEE/ACM International Symposium, May 13-16 2013 Delft, Netherlands. IEEE Computer Society, Los Alamitos, pp 235–244Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  1. 1.Centre for Advanced Studies in Biomedical Innovation Law (CeBIL)University of CopenhagenCopenhagenDenmark

Personalised recommendations