Этот модуль является ресурсом для лекторов
Список дополнительной литературы
Следующая литература рекомендуется учащимся, заинтересованным в более детальном изучении тематических вопросов, охваченных данным модулем:
- Brunton, Finn and Helen Nissbaum. (2015).
Obfuscation: A User's Guide for Privacy and Protest. MIT Press.
- Chatelain, Yannick. (2018).
Darknet: faut-il démanteler la revente illégale de la liberté de s'exprimer et de s'informer?
The Conversation, 5 July 2018.
- Gerry, Felicity, Julia Muraszkiewicz, and Niovi Vavoula. (2016). The role of technology in the fight against human trafficking: Reflections on privacy and data protection concerns.
Computer Law & Security Review, Vol. 32(2), 205-217.
- Joyce, Daniel. (2015). Privacy in the Digital Era: Human Rights Online?
Melbourne Journal of International Law, Vol.16, 270-285.
- Koops Bert-Jaap, Bryce Clayton Newell, Tjerk Timan, Ivan Škorvánek, Tomislav Chokrevski, and Maša Galič. (2017). A typology of privacy.
University of Pennsylvania Journal of International Law, Vol. 38(2), 483-575.
- McCallister, Erika, Timothy Grance, Karen A. Scarfone. (2010).
Guide to Protecting the Confidentiality of Personally Identifiable Information (PII) . NIST.
- NIST. (2017). Security and Privacy Controls for Information Systems and Organizations.
Draft NIST Special Publication 800-53 .
- Security.org.
A Guide to Securing Confidential Personal Data Both Online and Offline.
- Stewart, Katherine. Looking Backward, Moving Forward: What Must be Remembered When Resolving the Right to be Forgotten.
Brooklyn Journal of International Law, Vol. 42(2), 843-886.
- Summers, Sarah J., Christian Schwarzenegger, Gian Ege, and Finlay Young. (2014).
The Emergence of EU Criminal Law: Cyber Crime and the Regulation of the Information Society. Hart.
- Tikkinen-Piri, Christina, Anna Rohunen, and Jouni Markula. (2018). EU General Data Protection Regulation: Changes and implications for personal data collecting companies.
Computer Law & Security Review, Vol. 34(1), 134-153.
- Vaciago, Giuseppe. (2012). ISPs and Civil Liberties: The "Reasonable Expectation of Privacy" of Twitter's User from People v. Harris.
Computer Law Review International, Vol. 13(5), 137-141.