IT Laws in the Era of Cloud-Computing
A Comparative Analysis between EU and US Law on the Case Study of Data Protection and Privacy
Zusammenfassung
Der Band dokumentiert die Ergebnisse und Empfehlungen einer Analyse zur Frage, wie sich IT-Gesetze entwickeln sollten, unter der Prämisse, dass die heutige und zukünftige Informations- und Kommunikationstechnologie durch Cloud Computing geprägt ist. Insbesondere entwickelt sich diese Untersuchung auf einer vergleichenden und einer interdisziplinären Achse, d.h. als Rechtsvergleich zwischen EU und US-Recht und interdisziplinär zwischen Recht und IT. Die Arbeit konzentriert sich auf den Schwerpunkt vom Datenschutz und Datensicherheit in Cloud-Umgebungen und analysiert drei Hauptherausforderungen auf dem Weg zu einer effizienteren Cloud-Computing-Regulierung:Verständnis der Gründe für die Entwicklung divergierender Rechtsordnungen und Denkschulen zum IT-RechtGewährleistung der Privatsphäre und Datenschutz in der Cloudkonvergierende Regulierungsansätze für die Cloud in der Hoffnung auf eine harmonisierte Landschaft von IT-Gesetzen in der Zukunft.
Abstract
This book documents the findings and recommendations of research into the question of how IT laws should develop on the understanding that today’s information and communication technology is shaped by cloud computing, which lies at the foundations of contemporary and future IT as its most widespread enabler. In particular, this study develops on both a comparative and an interdisciplinary axis, i.e. comparatively by examining EU and US law, and on an interdisciplinary level by dealing with law and IT. Focusing on the study of data protection and privacy in cloud environments, the book examines three main challenges on the road towards more efficient cloud computing regulation:understanding the reasons behind the development of diverging legal structures and schools of thought on IT lawensuring privacy and security in digital cloudsconverging regulatory approaches to digital clouds in the hope of more harmonised IT laws in the future.
Schlagworte
Datenschutzrecht Datenschutz Regulierung Cloud Cloud Computing Privatheit Internetrecht Computerrecht- Kapitel Ausklappen | EinklappenSeiten
- 335–350 CHAPTER 11. Conclusion 335–350
- 351–352 List of case law 351–352
- 355–378 Bibliographical index 355–378
- Audio or Video Documents
- Larry Ellison, Larry Ellison on cloud computing (2009), available at: https://www.youtube.com/watch?v=0FacYAI6DY0.
- Books
- P. E. Agre & M. Rotenberg, Technology and Privacy: The New Landscape (1998): MIT Press.
- Antony Anghie & C.G Weeramantry, Legal visions of the 21st century: essays in honour of judge Christopher Weeramantry (op. 1998). The Hague [etc.]: Kluwer Law International.
- Anne Arendt, Ulrich Dammann & Spiros Simitis, Bundesdatenschutzgesetz (2011). Baden-Baden: Nomos-Verl.Ges.
- I. Augsberg, Informationsverwaltungsrecht: Zur kognitiven Dimension der rechtlichen Steuerung von Verwaltungsentscheidungen (2014): Mohr Siebeck.
- Aharon Barak & Sari Bashi, Purposive Interpretation in Law (2011). Princeton: Princeton University Press.
- Christian Baun, Marcel Kunze, Jens Nimis & Stefan Tai, Cloud Computing (2011). Berlin, Heidelberg: Springer Berlin Heidelberg.
- C. J. Bennett, Regulating Privacy: Data Protection and Public Policy in Europe and the United States (1992): Cornell University Press.
- Colin J. Bennett & Charles D. Raab, The governance of privacy. Policy instruments in global perspective (2006). Cambridge, Mass.: MIT Press.
- Donald H. Berman & Carole D. Hafner, Representing teleological structure in case-based legal reasoning: the missing link (1993): ACM.
- M. Bovens, The Quest for Responsibility: Accountability and Citizenship in Complex Organisations (1998): Cambridge University Press.
- S. Brenner, Law in an Era of Smart Technology (2007): Oxford University Press.
- Stephen G. Breyer, Breaking the vicious circle. Toward effective risk regulation, vol. 1992 (1993). Cambridge, Mass.: Harvard University Press.
- R. Brownsword, E. Scotford & K. Yeung, The Oxford Handbook of Law, Regulation and Technology (2017): OUP Oxford.
- Eoghan Casey, Handbook of digital forensics and investigation (2010). London: Academic.
- V. Chang, Delivery and Adoption of Cloud Computing Services in Contemporary Organizations (2015): IGI Global.
- H. M. Collins, Tacit and explicit knowledge (2013). Chicago, London: The University of Chicago Press.
- N. Cox, Technology and Legal Systems (2016): Taylor & Francis.
- P. P. Craig & G. de Búrca, EU law. Text, cases, and materials (2015). Oxford, United Kingdom, New York, NY: Oxford University Press.
- Frank B. Cross, Theory and practice of statutory interpretation (2012). Stanford: Stanford University Press.
- Ulrich Dammann & Spiros Simitis, Bundesdatenschutzgesetz (2014). Baden-Baden: Nomos.
- Hans Delfs & Helmut Knebl, Introduction to cryptography. Principles and applications, 2007: 1 (2007). Berlin: Springer.
- J. Domingue, D. Fensel & J. A. Hendler, Handbook of Semantic Web Technologies (2011): Springer Berlin Heidelberg.
- Ronald Dworkin, Law's empire (1986). Cambridge, Mass.: Belknap Press.
- D. Dyzenhaus & T. Poole, Law, Liberty and State: Oakeshott, Hayek and Schmitt on the Rule of Law (2015): Cambridge University Press.
- H.S.P.L.C.E.L.P. Eeckhout & P.L.T. Tridimas, Yearbook of European Law 2009, v. 28 (2010): Oxford University Press, USA.
- Evelyn Ellis, The principle of proportionality in the laws of Europe (1999). Oxford, Portland, Or.: Hart Pub.
- Thomas Erl, Richardo Puttini & Zaigham Mahmood, Cloud computing. Concepts, technology, & architecture (2013). Upper Saddle River, NJ: Prentice Hall.
- Federico Fabbrini, Fundamental rights in Europe (2014). Oxford: Oxford University Press.
- Elgar Fleisch & Friedemann Mattern, Das Internet der Dinge. Ubiquitous Computing und RFID in der Praxis : Visionen, Technologien, Anwendungen, Handlungsanleitungen (2005). Berlin: Springer.
- M. Friedewald & R. J. Pohoryles, Privacy and Security in the Digital Age: Privacy in the Age of Super-Technologies (2016): Taylor & Francis.
- Brett M. Frischmann, Michael J. Madison & Katherine Jo Strandburg, Governing knowledge commons (2014). New York: Oxford University Press.
- Lon L. Fuller, The morality of law (1965). New Haven, Conn., London: Yale University Press.
- Borivoje Furht & Armando Escalante, Handbook of cloud computing (2010). New York: Springer.
- Peter Gola, Christoph Klug, Rudolf Schomerus & Barbara Körffer, Bundesdatenschutzgesetz. Kommentar (2010). München: C. H. Beck.
- Jack L. Goldsmith & Tim Wu, Who controls the Internet? Illusions of a borderless world (2008). New York, NY: Oxford University Press.
- Jean-Christophe Graz & Andreas Nölke, Transnational private governance and its limits, vol. 51 (2008). London, New York: Routledge.
- Adam Greenfield, Everyware. The dawning age of ubiquitous computing (2006). Berkeley, CA: New Riders.
- H. L. A. Hart, The concept of law (1998). Oxford: Clarendon Press.
- Friedrich A. von Hayek, The road to serfdom (2005). Princeton, N.J.: Recording for the Blind & Dyslexic.
- Uta Kohl, Jurisdiction and the Internet. A study of regulatory competence over online activity (2010). Cambridge: Cambridge University Press.
- E. Kosta, Consent in European Data Protection Law (2013): Brill.
- Steffen Kroschwald, Informationelle Selbstbestimmung in der Cloud. Datenschutzrechtliche Bewertung und Gestaltung des Cloud Computing aus dem Blickwinkel des Mittelstands (2016). Wiesbaden: Springer Vieweg.
- Christopher Kuner, Transborder Data Flows and Data Privacy Law (2013). Oxford University Press.
- L. Lessig, Code and other laws of cyberspace (1999): New York: Basic books.
- Edward H. Levi & Frederick F. Schauer, An introduction to legal reasoning (2013). Chicago: The University of Chicago Press.
- Ling Liu & M. Tamer Özsu, Encyclopedia of database systems (2009). New York: Springer.
- Andreas F. Lowenfeld, International litigation and the quest for reasonableness. Essays in private international law (1996). Oxford, New York: Clarendon Press; Oxford University Press.
- Christopher T. Marsden, Internet Co-Regulation. European Law, Regulatory Governance and Legitimacy in Cyberspace (2011). Cambridge: Cambridge University Press.
- Viktor Mayer-Schönberger & Kenneth Cukier, Big data. A revolution that will transform how we live, work, and think (2013). Boston: Houghton Mifflin Harcourt.
- McGraw-Hill, McGraw-Hill Dictionary of Scientific and Technical Terms (2003): McGraw-Hill.
- Jens Meierhenrich, Oliver Simons & Friedrich Balke, The Oxford Handbook of Carl Schmitt, vol. 1 (2015): Oxford University Press.
- Christopher Millard, Cloud Computing Law (2013). New York: Oxford University Press.
- V. Mitsilegas, European union and internal security. Guardian of the people? (2014). [Place of publication not identified]: Palgrave Macmillan.
- Andrew Murray, The regulation of cyberspace. Control in the online environment (2007). Milton Park, Abingdon [UK], New York, NY: Routledge-Cavendish.
- Nordic Council of Ministers, Information Security in Nordic Countries (1993): Nordic Council of Ministers.
- Christof Paar & Jan Pelzl, Understanding cryptography. A textbook for students and practitioners (2010). Berlin [u.a.]: Springer.
- John G. Palfrey & Urs Gasser, Born digital. Understanding the first generation of digital natives (2010). New York: BasicBooks.
- John G. Palfrey & Urs Gasser, Interop. The promise and perils of highly interconnected systems (2012). New York: Basic Books.
- Siani Pearson, Taking account of privacy when designing cloud computing services (2009): IEEE Computer Society.
- Siani Pearson & George Yee, Privacy and security for cloud computing (2013). London, New York: Springer.
- Norman Pelzl, Methodische Entwicklung von zukunftsorientierten Geschäftsmodellen im Cloud-Computing, Band 88 (2016). Lohmar: Eul Verlag.
- Stefan Poslad, Ubiquitous computing. Smart devices, environments and interactions (2009). Chichester, U.K.: Wiley.
- Hans Christian Röhl, Wissen, zur kognitiven Dimension des Rechts, vol. 9 (2010). Berlin: Duncker & Humblot.
- Alexander Rossnagel, Allianz von Medienrecht und Informationstechnik? Ordnung in digitalen Medien durch Gestaltung der Technik am Beispiel von Urheberschutz, Datenschutz, Jugendschutz und Vielfaltschutz; Dokumentation der Stiftungstagung (zugleich EMR-Workshop), der Alcatel SEL Stiftung für Kommunikationsforschung, des Instituts für Medienrecht (EMR), der Landeszentrale für politische Bildung (LpB) Baden-Württemberg, am 10. Mai 2001 im Landtag Baden-Württemberg, Stuttgart, Bd. 24 (2001). Baden-Baden: Nomos.
- Alexander Roßnagel, Datenschutz in einem informatisierten Alltag (2007). Berlin: Friedich-Ebert-Stiftung.
- Alexander Roßnagel, Tom Sommerlatte & Udo Winand, Digitale Visionen. Zur Gestaltung allgegenwärtiger Informationstechnologien (2008). Berlin, Heidelberg: Springer-Verlag.
- Andreas Schedler, Larry Jay Diamond & Marc F. Plattner, The self-restraining state. Power and accountability in new democracies (1999). Boulder, Colo.: Lynne Rienner Publishers.
- Gunnar Folke Schuppert & Andreas Vosskuhle, Governance von und durch Wissen, Bd. 12 (2008). Baden-Baden, Berlin: Nomos; Wissenschaftszentrum für Sozialforschung.
- S. Scoglio, Transforming Privacy: A Transpersonal Philosophy of Rights (1998): Praeger.
- V. Sharma, Information Technology Law and Practice (2011): Universal Law Publishing.
- Anne-Marie Slaughter, A New World Order (2009). Princeton: Princeton University Press.
- Christopher Slobogin, Privacy at risk. The new government surveillance and the Fourth Amendment (2007). Chicago: University of Chicago Press.
- S. S. Smith, Web-based Instruction: A Guide for Libraries (2006): American Library Association.
- E. Thomas Sullivan & Richard S. Frase, Proportionality principles in American law. Controlling excessive government actions (2009). Oxford, New York: Oxford University Press.
- Dan Jerker B. Svantesson, Private international law and the internet (2012). Alphen aan den Rijn, Frederick, MD: Kluwer Law International; Sold and distributed in North, Central and South America by Aspen Publishers.
- Peter P. Swire & Robert E. Litan, None of your business. World data flows, electronic commerce, and the European privacy directive (1998). Washington, D.C.: Brookings Institution Press.
- D. Tambini, D. Leonardi & C. T. Marsden, Codifying Cyberspace: Communications Self-regulation in the Age of Internet Convergence (2008): Routledge.
- Georgios Tselentis, Towards the future internet. Emerging trends from European research (2010). Amsterdam: IOS Press.
- Mariana Valverde, Law's Dream of a Common Knowledge (2009). Princeton: Princeton University Press.
- Ian Watson, The universal machine. From the dawn of computing to digital consciousness (2012). New York: Copernicus Books.
- Bill Williams, The economics of cloud computing (2012). Indianapolis, Ind.: Cisco Press.
- Hongji Yang & Xiaodong Liu, Software reuse in the emerging cloud computing era (2012). Hershey, PA: Information Science Reference.
- Liang-Jie Zhang & Qun Zhou, CCOA: Cloud Computing Open Architecture (2009): IEEE.
- K. S. Ziegler, Human Rights and Private Law: Privacy as Autonomy (2007): Bloomsbury Publishing.
- Tomasz Zurek & Michał Araszkiewicz, Modeling teleological interpretation (2013): ACM.
- Books, Edited
- Michael Backes & Peng Ning eds., Computer security – ESORICS 2009. 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009: proceedings, vol. 5789 (2009). Berlin [etc.]: SpringerLink.
- Giorgio Bongiovanni, Giovanni Sartor & Chiara Valentini eds., Reasonableness and Law, vol. 86 (2009). Dordrecht: Springer Netherlands.
- Martin Gilje Jaatun, Gansen Zhao & Chunming Rong eds., Cloud computing. First international conference, CloudCom 2009, Beijing, China, December 1-4, 2009: proceedings, vol. 5931 (2009). Berlin, New York: Springer.
- Helmut Krcmar, Jan Marco Leimeister, Alexander Roßnagel & Ali Sunyaev eds., Cloud-Services aus der Geschäftsperspektive (2016). Wiesbaden: Gabler.
- Steffen Kroschwald ed., Informationelle Selbstbestimmung in der Cloud. Datenschutzrechtliche Bewertung und Gestaltung des Cloud Computing aus dem Blickwinkel des Mittelstands (2016). Wiesbaden: Springer Vieweg.
- Gerald Münzl, Michael Pauly & Martin Reti eds., Cloud Computing als neue Herausforderung für Management und IT (2015). Berlin [Germany], Heidelberg [Germany]: Springer-Verlag.
- Alexander Roßnagel ed., Datenschutzaufsicht nach der EU-Datenschutz-Grundverordnung. Neue Aufgaben und Befugnisse der Aufsichtsbehörden (2017). Wiesbaden: Springer Fachmedien Wiesbaden.
- Marcel Schweiker, Joachim Hass, Anna Novokhatko & Roxana Halbleib eds., Messen und Verstehen in der Wissenschaft. Interdisziplinäre Ansätze (2017). Wiesbaden: Springer Fachmedien Wiesbaden.
- John R. Vacca ed., Security in the private cloud (2017). Boca Raton: Taylor & Francis, a CRC title, part of the Taylor & Francis imprint, a member of the Taylor & Francis Group, the academic division of T&F Informa, plc.
- Birgit Vogel-Heuser, Thomas Bauernhansl & Michael ten Hompel eds., Handbuch Industrie 4.0 Bd.4 (2017). Berlin, Heidelberg: Springer Berlin Heidelberg.
- Conference Proceedings
- 2008 Grid Computing Environments Workshop.
- 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing.
- 2012 IEEE 4th International Conference on Cloud Computing Technology and Science (CloudCom).
- IEEE INFOCOM 2010 – IEEE Conference on Computer Communications.
- International Workshop on Computational Autonomy (2003): Springer Berlin Heidelberg.
- 2012 International Conference on Computer Science and Electronics Engineering (2012): IEEE.
- 2012 International Conference on Computing, Electronics and Electrical Technologies (ICCEET) (2012): IEEE.
- ACM ed., Controlling data in the cloud: outsourcing computation without outsourcing control (2009): ACM.
- Jameela Al-Jaroodi & Shahram Latifi eds., ITNG 2010. Information Technology New Generations: proceedings of the Seventh International Conference on Information Technology :12-14, April 2009, Las Vegas, Nevada, USA (2010). Los Alamitos, Calif., Piscataway, N.J.: IEEE Computer Society; IEEE.
- Solon Barocas & Helen Nissenbaum eds., On Notice: The Trouble with Notice and Consent (2009).
- Elizabeth Chang ed., 24th IEEE International Conference on Advanced Information Networking and Applications (AINA), 2010. 20 – 23 April 2010, Perth, Australia; proceedings (2010). Piscataway, NJ, Piscataway, NJ: IEEE.
- IEEE ed., An audit logic for accountability (2005): IEEE.
- IEEE ed., 2010 19th IEEE International Workshop on Enabling Technologies. Infrastructures for Collaborative Enterprises (2010). [Place of publication not identified]: IEEE.
- KIIT University ed., 2015 International Conference on Computational Intelligence & Networks (CINE).
- Paulo Mendes ed., Proceedings of the 1st ACM workshop on User-provided networking challenges and opportunities (2009). New York, NY: ACM.
- Sascha Ossowski ed., Proceedings of the 31st Annual ACM Symposium on Applied Computing (2016). New York, NY: ACM.
- Alexander Roßnagel ed., Wolken über dem Rechtsstaat? Recht und Technik des Cloud Computing in Verwaltung und Wirtschaft, vol. 33 (2015). Baden-Baden: Nomos.
- IEEE Staff ed., 2011 IEEE International Conference on Services Computing (2011). [Place of publication not identified]: IEEE.
- Adrian Vermeule ed., Local and Global Knowledge in the Administrative State (2013).
- Gabriela Zanfir ed., What Happens in the Cloud Stays in the Cloud, or Why the Cloud's Architecture Should Be Transformed in 'Virtual Territorial Scope' (2013).
- Liang-Jie Zhang ed., World Conference on Services-I, 2009 (2009). Piscataway, NJ: IEEE.
- Contribution in Legal Commentary
- Daniel Halberstam, Constitutionalism and Pluralism in Marbury and Van Gend, in: U of Michigan Public Law Working Paper (2008).
- Contributions
- Bu-Qing Cao, Bing Li & Qi-Ming Xia, A Service-Oriented Qos-Assured and Multi-Agent Cloud Computing Architecture, in Cloud computing. First international conference, CloudCom 2009, Beijing, China, December 1-4, 2009: proceedings, 644–649 (Martin Gilje Jaatun, Gansen Zhao & Chunming Rong eds., 2009).
- Deyan Chen & Hong Zhao, Data Security and Privacy Protection Issues in Cloud Computing, in 2012 International Conference on Computer Science and Electronics Engineering, 647–651 (2012).
- Guilherme Da Cunha Rodrigues, Rodrigo N. Calheiros, Vinicius Tavares Guimaraes, Glederson Lessa dos Santos, Márcio Barbosa de Carvalho, Lisandro Zambenedetti Granville, Liane Margarida Rockenbach Tarouco & Rajkumar Buyya, Monitoring of cloud computing environments, in Proceedings of the 31st Annual ACM Symposium on Applied Computing, 378–383 (Sascha Ossowski ed., 2016).
- Tharam Dillon, Chen Wu & Elizabeth Chang, Cloud Computing: Issues and Challenges, in 24th IEEE International Conference on Advanced Information Networking and Applications (AINA), 2010. 20 – 23 April 2010, Perth, Australia; proceedings, 27–33 (Elizabeth Chang ed., 2010).
- Luciana Duranti, Adam Jansen, Giovanni Michetti, Mumma Courtney, Daryll Prescott, Corinne Rogers & Thibodeau Kenneth, Preservation as a Service for Trust, in Security in the private cloud, 47–72 (John R. Vacca ed., 2017).
- Niels Fallenbeck & Claudia Eckert, IT-Sicherheit und Cloud Computing, in Handbuch Industrie 4.0 Bd.4, 137–171 (Birgit Vogel-Heuser, Thomas Bauernhansl & Michael ten Hompel eds., 2017).
- Marc Fouquet, Heiko Niedermayer & Georg Carle, Cloud computing for the masses, in Proceedings of the 1st ACM workshop on User-provided networking challenges and opportunities, 31 (Paulo Mendes ed., 2009).
- Ines Houidi, Marouen Mechtri, Wajdi Louati & Djamal Zeghlache, Cloud Service Delivery across Multiple Cloud Platforms, in 2011 IEEE International Conference on Services Computing, 741–742 (IEEE Staff ed., 2011).
- Yashpalsinh Jadeja & Kirit Modi, Cloud computing – concepts, architecture and challenges, in 2012 International Conference on Computing, Electronics and Electrical Technologies (ICCEET), 877–880 (2012).
- S. Jandt, S. Kroschwald, A. Roβnagel & M. Wicker, Datenschutzkonformes Cloud-Computing, in Cloud-Services aus der Geschäftsperspektive, 207–266 (Helmut Krcmar, Jan Marco Leimeister, Alexander Roßnagel & Ali Sunyaev eds., 2016).
- Xiaolong Jin & Jiming Liu, From Individual Based Modeling to Autonomy Oriented Computation, in International Workshop on Computational Autonomy, 151–169 (2003).
- Andrea de Mauro, Marco Greco & Michele Grimaldi, What is big data? A consensual definition and a review of key research topics, in AIP Conference Proceedings, Volume 1644, Issue 1, 97–104 (2015).
- Fruzsina Molnár-Gábor & Jan O. Korbel, Regulierung neuer Herausforderungen in den Naturwissenschaften – Datenschutz und Datenaustausch in der translationalen genetischen Forschung, in Messen und Verstehen in der Wissenschaft. Interdisziplinäre Ansätze, 151–171 (Marcel Schweiker, Joachim Hass, Anna Novokhatko & Roxana Halbleib eds., 2017).
- Siani Pearson & Andrew Charlesworth, Accountability as a Way Forward for Privacy Protection in the Cloud, in Cloud computing. First international conference, CloudCom 2009, Beijing, China, December 1-4, 2009: proceedings, 131–144 (Martin Gilje Jaatun, Gansen Zhao & Chunming Rong eds., 2009).
- Siani Pearson, Vasilis Tountopoulos, Daniele Catteddu, Mario Sudholt, Refik Molva, Christoph Reich, Simone Fischer-Hubner, Christopher Millard, Volkmar Lotz, Martin Gilje Jaatun, Ronald Leenes, Chunming Rong & Javier Lopez, Accountability for cloud and other future Internet services, in 2012 IEEE 4th International Conference on Cloud Computing Technology and Science (CloudCom), 629–632.
- Deepak Puthal, B.P.S. Sahoo, Sambit Mishra & Satyabrata Swain, Cloud Computing Features, Issues, and Challenges: A Big Picture, in 2015 International Conference on Computational Intelligence & Networks (CINE), 116–123 (KIIT University ed.).
- Alexander Roßnagel, Datenschutzfragen des Cloud Computing, in Wolken über dem Rechtsstaat? Recht und Technik des Cloud Computing in Verwaltung und Wirtschaft, 19–52 (Alexander Roßnagel ed., 2015).
- Vijay Sarathy, Purnendu Narayan & Rao Mikkilineni, Next Generation Cloud Computing Architecture: Enabling Real-Time Dynamism for Shared Distributed Physical Infrastructure, in 2010 19th IEEE International Workshop on Enabling Technologies. Infrastructures for Collaborative Enterprises, 48–53 (IEEE ed., 2010).
- Wei-Tek Tsai, Xin Sun & Janaka Balasooriya, Service-Oriented Cloud Computing Architecture, in ITNG 2010. Information Technology New Generations: proceedings of the Seventh International Conference on Information Technology :12-14, April 2009, Las Vegas, Nevada, USA, 684–689 (Jameela Al-Jaroodi & Shahram Latifi eds., 2010).
- Cong Wang, Qian Wang, Kui Ren & Wenjing Lou, Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing, in IEEE INFOCOM 2010 – IEEE Conference on Computer Communications, 1–9.
- Kaiqi Xiong & Harry Perros, Service Performance and Analysis in Cloud Computing, in World Conference on Services-I, 2009, 693–700 (Liang-Jie Zhang ed., 2009).
- Lamia Youseff, Maria Butrico & Dilma Da Silva, Toward a Unified Ontology of Cloud Computing, in 2008 Grid Computing Environments Workshop, 1–10.
- Cheng Zeng, Xiao Guo, Weijie Ou & Dong Han, Cloud Computing Service Composition and Search Based on Semantic, in Cloud computing. First international conference, CloudCom 2009, Beijing, China, December 1-4, 2009: proceedings, 290–300 (Martin Gilje Jaatun, Gansen Zhao & Chunming Rong eds., 2009).
- Internet Documents
- M. Arif, A history of cloud computing, available at: http://www.computerweekly.com/feature/A-history-of-cloud-computing (18 February 2015).
- M. Armbrust, A. Fox, R. Griffith, A. Joseph D., R. Katz H., A. Konwinski, G. Lee, D. Patterson A., A. Rabkin, A. Stoica & M. Zaharia, Above the Clouds: A Berkeley View of Cloud Computing, available at: http://www.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS-2009-28.html (2 March 2015).
- Article 29 Working Party, Working document on determining the international application of EU data protection law to personal data processing on the Internet by non-EU based websites, available at: http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/index_en.htm.
- Article 29 Working Party, Opinion 3/2009 on the Draft Commission Decision on standard contractual clauses for the transfer of personal data to processors established in third countries, under Directive 95/46/EC (data controller to data processor), available at: http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/index_en.htm.
- Article 29 Working Party, Opinion 03/2013 on purpose limitation, available at: http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/index_en.htm (3 February 2015).
- Ozalp Babaoglu, M. Jelasity, Anne Marie Kermarrec, Alberto Montresor & Maarten van Steen, Operating Systems Review (ACM), available at: http://dl.acm.org/citation.cfm?doid=1151374.1151379.
- Francesca Bosco, Assessing Europe’s cyber challenges, available at: http://policyreview.info/articles/news/assessing-europes-cyber-challenges/355 (4 July 2016).
- Tobias Bräutigam, The Land of Confusion. International Data Transfers between Schrems and the GDPR.
- A. Cavoukian, Privacy by Design; The 7 Foundational Principles, available at: https://www.ipc.on.ca/wp-content/uploads/Resources/7foundationalprinciples.pdf.
- Centre for Information Policy Leadership, Data Protection Accountability: The Essential Elements A Document for Discussion, available at: http://www.huntonfiles.com/files/webupload/CIPL_Galway_Accountability_Paper.pdf (19 March 2015).
- European Commission, Unleashing the Potential of Cloud Computing in Europe, available at: http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=COM:2012:0529:FIN:EN:PDF (20 November 2014).
- Robert Gellman, Privacy in the Clouds: Risks to Privacy and Confidentiality from Cloud Computing, available at: https://www.worldprivacyforum.org/2011/11/resource-page-cloud-privacy/ (20 April 2015).
- Chris Hoofnagle, COMPARATIVE STUDY ON DIFFERENT APPROACHES TO NEW PRIVACY CHALLENGES, IN PARTICULAR IN THE LIGHT OF TECHNOLOGICAL DEVELOPMENTS. B.1 – UNITED STATES OF AMERICA, available at: http://ec.europa.eu/justice/policies/privacy/docs/studies/new_privacy_challenges/final_report_country_report_B1_usa.pdf (2 May 2016).
- Hunton Privacy Blog, Article 29 Working Party Clarifies Purpose Limitation Principle; Opines on Big and Open Data, available at: https://www.huntonprivacyblog.com/2013/04/09/article-29-working-party-clarifies-purpose-limitation-principle-opines-on-big-and-open-data/ (5 November 2015).
- International Working Group on Data Protection in Telecommunications, Working Paper on Cloud Computing – Privacy and data protection issues. “Sopot Memorandum”, available at: http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/index_en.htm#h2-3 (3 February 2015).
- Xenofon Kontargyris, From effective to efficient regulation of ICT (2): the big leap towards embracing vertical, apart from horizontal, interdisciplinarity, available at: http://www.juwiss.de/88-2016/ (13 September 2017).
- Xenofon Kontargyris, From effective to efficient regulation of ICT: time to build the backbone of information technology legislation, available at: http://www.juwiss.de/66-2016/.
- D. Linthicum, MSDN Documentation. Service Oriented Architecture (SOA), available at: https://msdn.microsoft.com/en-us/library/bb833022.aspx (4 November 2015).
- J. Locke, The Roots of Cloud Computing, available at: http://www.servercloudcanada.com/2013/10/the-roots-of-cloud-computing/ (11 January 2017).
- McAlpine C., Weigh Legal Risks of Cloud Computing, available at: http://www.baselinemag.com/c/a/Legal/Weigh-Legal-Risks-of-Cloud-Computing-869422 (19 February 2016).
- Peter Mell & Timothy Grance, The NIST Definition of Cloud Computing. Recommendations of the National Institute of Standards and Technology, available at: http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf (4 November 2015).
- National Telecommunications & Information Administration (NTIA), PRIVACY AND SELF-REGULATION IN THE INFORMATION AGE, available at: https://www.ntia.doc.gov/report/1997/privacy-and-self-regulation-information-age (4 May 2016).
- R. Peeva, File Hosting vs. Cloud Computing, available at: http://www.websitepulse.com/blog/file-hosting-vs-cloud-computing (4 November 2015).
- Antonio Regalado, Who Coined 'Cloud Computing'?, available at: https://www.technologyreview.com/s/425970/who-coined-cloud-computing/ (11 January 2017).
- Reidenberg, J. R., Schwartz, P. M., Data Protection Law and On-line Services: Regulatory Responses.
- Reilly, D., Wren, C., & Berry, T., Cloud computing: Forensic challenges for law enforcement. In Internet Technology and Secured Transactions (ICITST).
- Neil Robinson, Hans Graux, Maarten Botterman & Lorenzo Valeri, RAND Europe: Review of the European Data Protection Directive, available at: http://www.rand.org/pubs/technical_reports/TR710.html (13 February 2015).
- Paul M. Schwartz, Legal Access to Cloud Information. Data Shards, Data Localization, and Data Trusts.
- Jonathan Stuart Ward & Adam Barker, Undefined By Data. A Survey of Big Data Definitions, available at: http://arxiv.org/pdf/1309.5821.
- Journal Articles
- Divyakant Agrawal, Philip Bernstein, Elisa Bertino, Susan Davidson, Umeshwas Dayal, Michael Franklin, Johannes Gehrke, Laura Haas, Alon Halevy, Jiawei Han, H. V. Jagadish, Alexandros Labrinidis, Sam Madden, Yannis Papakonstantinou, Jignesh Patel, Raghu Ramakrishnan, Kenneth Ross, Cyrus Shahabi, Dan Suciu, Shiv Vaithyanathan & Jennifer Widom, Challenges and Opportunities with Big Data 2011-1 Cyber Center Technical Reports (2011).
- Divyakant Agrawal, Sudipto Das & Amr El Abbadi, Big data and cloud computing. Current state and future opportunities 530–533 (2011).
- Robert B. Ahdieh, The Visible Hand: Coordination Functions of the Regulatory State, 09 Emory University School of Law, Public Law and Legal Theory Research Paper Series 578–649 (2009).
- Michael Akehurst, Jurisdiction in International Law, 46 Brit. Y. B. Int'l L. 145–258 (1972).
- Robert Alexy, On the Structure of Legal Principles, 13 Ratio Juris 294–304 (2000).
- Ricardo Alonso, Wouter Dessein & Niko Matouschek, When Does Coordination Require Centralization?, 98 American Economic Review 145–179 (2008).
- Alfred Aman, A Global Perspective on Current Regulatory Reform: Rejection, Relocation, or Reinvention?, 2 2 Indiana Journal of Global Legal Studies 429 (1995) 429–464 (1995).
- Mauro Andreolini, Michele Colajanni, Marcello Pietri & Stefania Tosi, Adaptive, scalable and reliable monitoring of big data on clouds, 79-80 Journal of Parallel and Distributed Computing 67–79 (2015).
- Damon C. Andrews & John M. Newman, Personal Jurisdiction and Choice of Law in the Cloud, 73 Md. L. Rev. 313–388 (2013).
- Stephanos Androutsellis-Theotokis & Diomidis Spinellis, A survey of peer-to-peer content distribution technologies, 36 ACM Comput. Surv. 335–371 (2004).
- Kevin D. Ashley & Edwina L. Rissland, Law, learning and representation, 150 Artificial Intelligence 17–58 (2003).
- Marcos D. Assunção, Rodrigo N. Calheiros, Silvia Bianchi, Marco A.S. Netto & Rajkumar Buyya, Big Data computing and clouds. Trends and future directions, 79-80 Journal of Parallel and Distributed Computing 3–15 (2015).
- Nicholas Bagley & Richard L. Revesz, Centralized Oversight of the Regulatory State, 106 Columbia Law Review 1260–1330 (2006).
- Kenneth A. Bamberger & Deirdre K. Mulligan, Privacy on the Books and on the Ground, 63 Stanford Law Review 247–316 (2011).
- Merve Bayramusta & V. Aslihan Nasir, A fad or future of IT? A comprehensive literature review on the cloud computing research, 36 International Journal of Information Management 635–644 (2016).
- Patricia L. Bellia, Federalization in Information Privacy Law, 118 Yale Law Journal 868–890 (2009).
- Trevor Bench-Capon & Giovanni Sartor, A model of legal reasoning with cases incorporating theories and values. AI and Law, 150 Artificial Intelligence 97–143 (2003).
- Y. Benkler, Internet regulation: a case study in the problem of unilateralism, 11 European Journal of International Law 171–185 (2000).
- Paul Schiff Berman, Cyberspace and the State Action Debate: The Cultural Value of Applying Constitutional Norms to 'Private' Regulation, 71 University of Colorado Law Review 1263–1310 (2000).
- Paul Schiff Berman, Global Legal Pluralism, 80 S. Cal. L. Rev. 1155–1238 (2006).
- Paul Schiff Berman, The New Legal Pluralism, 5 Annual Review of Law and Social Science 225–242 (2009).
- J. Bing, Data Protection, jurisdiction and the choice of law Privacy Laws & Policy Reporter 92–98 (1999).
- Julia Black, Constructing and contesting legitimacy and accountability in polycentric regulatory regimes, 2 Regulation & Governance 137–164 (2008).
- D. Scott Blake, Let’s Be Reasonable: Fourth Amendment Principles in the Digital Age, 5 SEVENTH CIRCUIT REV. 491–531 (2010).
- P. Blume, Transborder data flow: is there a solution in sight?, 8 International Journal of Law and Information Technology 65–86 (2000).
- Martin Boodman, The Myth of Harmonization of Laws, 39 The American Journal of Comparative Law 699–724 (1991).
- Scott Brewer, Exemplary Reasoning. Semantics, Pragmatics, and the Rational Force of Legal Argument by Analogy, 109 Harvard Law Review 923–1028 (1996).
- Grainne de Burca, The EU, the European Court of Justice and the International Legal Order after Kadi. Harvard International Law Journal, 1 Fordham Law Legal Studies Research 1–51 (2009).
- Rajkumar Buyya, Chee Shin Yeo, Srikumar Venugopal, James Broberg & Ivona Brandic, Cloud computing and emerging IT platforms. Vision, hype, and reality for delivering computing as the 5th utility, 25 Future Generation Computer Systems 599–616 (2009).
- L. A. Bygrave, Privacy protection in a global context–a comparative overview, 47 Scandinavian Studies in Law 319–348 (2004).
- Lee A. Bygrave, Aytomated Profiling, 17 Computer Law & Security Review 17–24 (2001).
- Eve M. Caudill & Patrick E. Murphy, Consumer Online Privacy. Legal and Ethical Issues, 19 Journal of Public Policy & Marketing 7–19 (2000).
- Everton Cavalcante, Jorge Pereira, Marcelo Pitanga Alves, Pedro Maia, Roniceli Moura, Thais Batista, Flavia C. Delicato & Paulo F. Pires, On the interplay of Internet of Things and Cloud Computing. A systematic mapping study, 89-90 Computer Communications 17–33 (2016).
- Anupam Chander & Uyen P. Le, Breaking the Web. Data Localization vs. the Global Internet Emory Law Journal, Forthcoming 53 (2014).
- Andrew Charlesworth, Clash of the Data Titans? US and EU Data Privacy Regulation, 6 European Public Law 253–274 (2000).
- Jiahong Chen, How the best-laid plans go awry. The (unsolved) issues of applicable law in the General Data Protection Regulation, 6 International Data Privacy Law 310–323 (2017).
- Fa-Chang Cheng & Wen-Hsing Lai, The Impact of Cloud Computing Technology on Legal Infrastructure within Internet—Focusing on the Protection of Information Privacy, 29 2012 International Workshop on Information and Electronics Engineering 241–251 (2012).
- Annalisa Ciampi, The Potentially Competing Jurisdiction of the European Court of Human Rights and the European Court of Justice, 28 Yearbook of European Law 601–609 (2009).
- David Cole & Federico Fabbrini, Bridging the Transatlantic Divide? The United States, the European Union, and the Protection of Privacy Across Borders. iCourts Working Paper Series, No. 33, 2015 International Journal of Constitutional Law (2015).
- David Couillard, Defogging the Cloud: Applying Fourth Amendment Principles to Evolving Privacy Expectations in Cloud Computing, 93 Minnesota Law Review 2205–2239 (2009).
- Frank B. Cross, Law and trust, 93 The Georgetown Law Journal 1457–1545 (2005).
- Dara Hallinan, Michael Friedewald, Paul McCarthy, Citizens’ Perceptions of Data Protection and Privacy in Europe, 28 Computer Law and Security Review 263–272 (2012).
- Jennifer C. Daskal, The Un-Territoriality of Data, 125 Yale Law Journal 326–398 (2015).
- Primavera De Filippi, Primavera De Filippi & Luca Belli, Law of the Cloud v Law of the Land: Challenges and Opportunities for Innovation, 3 European Journal of Law and Technology 156–173 (2012).
- Lothar Determann, What Happens in the Cloud: Software as a Service and Copyrights, 29 Berkeley Technology Law Journal 1096–1129 (2015).
- Dias, Renata Dalle Molle Araujo, The Potential Impact of the EU General Data Protection Regulation on Pharmacogenomics Research, 36 Med. & L. 43–58 (2017).
- Hoang T. Dinh, Chonho Lee, Dusit Niyato & Ping Wang, A survey of mobile cloud computing. Architecture, applications, and approaches, 13 Wirel. Commun. Mob. Comput. 1587–1611 (2013).
- Colin S. Diver, Statutory Interpretation in the Administrative State, 133 University of Pennsylvania law review 549–599 (1985).
- Benoit Dupont, Cybersecurity Futures: How Can We Regulate Emergent Risks? Technology Innovation Management Review 6–11 (2013).
- Baudouin. Dupret, Legal pluralism, plurality of laws, and legal practices, 1 European Journal of Legal Studies (2007).
- Luciana Duranti & Corinne Rogers, Trust in digital records. An increasingly cloudy legal area, 28 Computer Law & Security Review 522–531 (2012).
- Clarence A. Dykstra, The Quest for Responsibility, 33 The American Political Science Review 1–25 (1939).
- M. J. Eger, Emerging Restrictions on Transnational Data Flows: Privacy Protection or Non-Tariff Trade Barriers, 10 Law & Pol 1055–1105 (1978).
- William N. Eskridge & Philip P. Frickey, Statutory Interpretation as Practical Reasoning, 42 Stanford Law Review 321–384 (1990).
- John A. Ferejohn & Barry R. Weingast, A positive theory of statutory interpretation, 12 International Review of Law and Economics 263–279 (1992).
- Ian Foster, Yong Zhao, Ioan Raicu & Shiyong Lu, Cloud Computing and Grid Computing 360-Degree Compared,” IEEE Grid Computing Environments (GCE08) 2008, co-located with IEEE/ACM Supercomputing 2008 2012 ACM/IEEE 13TH INTERNATIONAL CONFERENCE ON GRID COMPUTING 1–10.
- Susan Freiwald & Patricia Bellia, The Fourth Amendment Status of Stored E-mail: The Law Professors' Brief in Warshak v. United States Journal Articles 559–588 (2007).
- A. Froomkin, Of Governments and Governance, 14 Berkeley Technology Law Journal 618–633 (1999).
- Lon L. Fuller, Positivism and Fidelity to Law. A Reply to Professor Hart, 71 Harvard Law Review 630–672 (1958).
- Amir Gandomi & Murtaza Haider, Beyond the hype. Big data concepts, methods, and analytics, 35 International Journal of Information Management 137–144 (2015).
- Ruth Gavison, Privacy and the Limits of Law, 89 The Yale Law Journal 421–471 (1980).
- Wesley Gee, Internet Tracking: Stalking or a Necessary Tool for Keeping the Internet Free, 20 CommLaw Conspectus 223–252 (2011).
- Tom Geller, In privacy law, it's the U.S. vs. the world, 59 Commun. ACM 21–23 (2016).
- M. Gillen, Internet Co-Regulation: European Law, Regulatory Governance and Legitimacy in Cyberspace, 20 International Journal of Law and Information Technology 147–149 (2012).
- J. Goldring, Globalisation, National Sovereignty and the Harmonisation of Laws, 3 Uniform Law Review – Revue de droit uniforme 435–451 (1998).
- Graham Greenleaf, Global Data Privacy Laws: Forty Years of Acceleration. UNSW Law Research Paper No. 2011-36 Privacy Laws and Business International Report 11–17 (2011).
- Graham Greenleaf, The Influence of European Data Privacy Standards Outside Europe: Implications for Globalisation of Convention 108, 2 International Data Privacy Law 68–92 (2012).
- John Griffiths, What is Legal Pluralism?, 18 The Journal of Legal Pluralism and Unofficial Law 1–55 (1986).
- Dieter Grimm, Proportionality in Canadian and German Constitutional Jurisprudence, 57 University of Toronto Law Journal 383–397 (2007).
- Neil Gunningham & Joseph Rees, Industry Self‐Regulation: An Institutional Perspective, 19 Law & Policy 363–414 (1997).
- Marit Hansen, Datenschutz nach dem Summer of Snowden, 38 Datenschutz Datensich 439–444 (2014).
- Tor-Inge Harbo, The Function of the Proportionality Principle in EU Law, 16 European Law Journal 158–185 (2010).
- Carol Harlow, Global Administrative Law: The Quest for Principles and Values, 17 Eur J Int Law 187–214 (2006).
- Ibrahim Abaker Targio Hashem, Ibrar Yaqoob, Nor Badrul Anuar, Salimah Mokhtar, Abdullah Gani & Samee Ullah Khan, The rise of “big data” on cloud computing. Review and open research issues, 47 Information Systems 98–115 (2015).
- Friedrich A. von Hayek, The Use of Knowledge in Society, 35 The American Economic Review 519–530 (1945).
- Alden Heintz, The Dangers of Regulation, 29 J Communication 129–134 (1979).
- Paul de Hert & Vagelis Papakonstantinou, The new General Data Protection Regulation. Still a sound system for the protection of individuals?, 32 Computer Law & Security Review 179–194 (2016).
- Mireille Hildebrandt, Profiling and the rule of law, 1 IDIS 55–70 (2008).
- Dennis D. Hirsch, In Search of the Holy Grail: Achieving Global Privacy Rules Through Sector-Based Codes of Conduct, 74 Ohio State Law Journal 1030–1069 (2013).
- D. Hofman, Duranti L. & E. How, Trust in the Balance. Data Protection Laws as Tools for Privacy and Security in the Cloud, 10 Algorithms 47 (2017).
- W. K. Hon, C. Millard & I. Walden, The problem of 'personal data' in cloud computing: what information is regulated? -The cloud of unknowing, 1 International Data Privacy Law 211–228 (2011).
- W. K. Hon, C. Millard & I. Walden, Who is responsible for 'personal data' in cloud computing? --The cloud of unknowing, Part 2, 2 International Data Privacy Law 3–18 (2012).
- W. Kuan Hon, Julia Hörnle & Christopher Millard, Data Protection Jurisdiction and Cloud Computing. When are Cloud Users and Providers Subject to EU Data Protection Law? The Cloud of Unknowing, Part 3, 26 International Review of Law, Computers & Technology (2012).
- W. Kuan Hon & Christopher Millard, Data Export in Cloud Computing. How Can Personal Data Be Transferred Outside the EEA? The Cloud of Unknowing, Part 4, 9 SCRIPT-ed (2011).
- W. Kuan Hon, Christopher Millard & Ian Walden, The Problem of 'Personal Data' in Cloud Computing – What Information is Regulated? The Cloud of Unknowing, Part 1, 1 International Data Privacy Law 211–228 (2011).
- J. Hoover, Compliance in the Ether: Cloud Computing, Data Security and Business Regulation, 8 Journal of Business & Technology Law 255–273 (2013).
- Gerrit Hornung, Regulating privacy enhancing technologies: seizing the opportunity of the future European Data Protection Framework, 26 Innovation: The European Journal of Social Science Research 181–196 (2013).
- Peter Hustinx, Privacy by design. Delivering the promises, 3 IDIS 253–255 (2010).
- Kristina Irion, Government Cloud Computing and the Policies of Data Sovereignty, 4 Policy and Internet 40–71 (2012).
- Paul T. Jaeger, Jimmy Lin & Justin M. Grimes, Cloud Computing and Information Policy: Computing in a Policy Cloud?, 5 Journal of Information Technology & Politics 269–283 (2008).
- Paul T. Jaeger, Jimmy Lin, Justin M. Grimes & Shannon N. Simmons, Where is the cloud? Geography, economics, environment, and jurisdiction in cloud computing, 14 First Monday (2009).
- David R. Johnson, Susan P. Crawford & John G. Palfrey, The accountable net: Peer production of internet governance, 9 Berkman Center for Internet & Society at Harvard Law School Virginia Journal of Law and Technology 1–32 (2004).
- David R. Johnson & David G. Post, Law And Borders--The Rise of Law in Cyberspace, 48 Stanford Law Review 1367–1402 (1996).
- Richard Jones, Legal Pluralism and the Adjudication of Internet Disputes, 13 International Review of Law, Computers & Technology 49–68 (1999).
- Amin Jula, Elankovan Sundararajan & Zalinda Othman, Cloud computing service composition. A systematic literature review, 41 Expert Systems with Applications 3809–3824 (2014).
- Margot Kaminski, Why trade is not the place for the EU to negotiate privacy Internet Policy Review (2015).
- Sean P. Kanuck, Information Warefare: New Challenges for Public International Law, 37 Harv. Int'l LJ 272–568 (1996).
- Orin Kerr, The Case for the Third-Party Doctrine, 107 Michigan Law Review 561–601 (2009).
- Orin S. Kerr, The Problem of Perspective in Internet Law, 91 Georgetown Law Journal 357–405 (2003).
- Orin S. Kerr, The Fourth Amendment and New Technologies: Constitutional Myths and the Case for Caution, 102 Michigan Law Review 102–183 (2004).
- Orin S. Kerr, The Fourth Amendment and the Global Internet, 67 Stanford Law Review 285–329 (2014).
- Orin S. Kerr, The Next Generation Communications Privacy Act, 162 University of Pennsylvania law review 373–419 (2014).
- Ido Kilovaty, Freedom to Hack SSRN Journal (2017).
- Won Kim, Cloud computing architecture, 9 IJWGS 287–303 (2013).
- Nancy J. King & V. T. Raja, What Do They Really Know About Me in the Cloud? A Comparative Law Perspective on Protecting Privacy and Security of Sensitive Consumer Data, 50 Am Bus Law J 413–482 (2013).
- Benedict Kingsbury, The Concept of ‘Law’ in Global Administrative Law, 20 Eur J Int Law 23–57 (2009).
- Benedict Kingsbury, Nico Krisch & Richard Stewart, The Emergence of Global Administrative Law, 68 Law and Contemporary Problems 15–62 (2005).
- Alfred Kobsa, Privacy-enhanced personalization, 50 Commun. ACM 24–33 (2007).
- B.-J. Koops, The trouble with European data protection law, 4 International Data Privacy Law 250–261 (2014).
- Jonathan G. S. Koppell, Pathologies of Accountability. ICANN and the Challenge of “Multiple Accountabilities Disorder”, 65 Public Administration Review 94–108 (2005).
- N. Krisch, The Pluralism of Global Administrative Law, 17 European Journal of International Law 247–278 (2006).
- Nir Kshetri, Privacy and security issues in cloud computing. The role of institutions and institutional evolution, 37 Telecommunications Policy 372–386 (2013).
- W. Kuan Hon & C. Millard, Cloud Computing vs. Traditional Outsourcing – Key Differences, 23 Computers & Law (2012).
- C. Kuner, Data Protection Law and International Jurisdiction on the Internet (Part 1), 18 International Journal of Law and Information Technology 176–193 (2010).
- C. Kuner, Data Protection Law and International Jurisdiction on the Internet (Part 2), 18 International Journal of Law and Information Technology 227–247 (2010).
- Christopher Kuner, Internet Jurisdiction and Data Protection Law: An International Legal Analysis (Part 1), 18 International Journal of Law and Information Technology 176–202 (2010).
- Christopher Kuner, Internet Jurisdiction and Data Protection Law: An International Legal Analysis (Part 2), 18 International Journal of Law and Information Technology 227–257 (2010).
- Michèle Lamont, Rethinking Expertise. By Harry Collins and Robert Evans. Chicago. University of Chicago Press, 2007. Pp. 153. $37.50, 115 American Journal of Sociology 569–571 (2009).
- Stefanie Leimeister, Markus Böhm, Christoph Riedl & Helmut Krcmar, The Business Perspective of Cloud Computing: Actors, Roles and Value Networks ECIS 2010 Proceedings (2010).
- Philip Leith, The socio-legal context of privacy, 2 IJC 105–136 (2006).
- Lawrence Lessig, Law Regulating Code Regulating Law, 35 Loyola University Chicago Law Journal 1–14 (2003).
- Lawrence Lessig & Paul Resnick, Zoning speech on the Internet: A legal and technical model, 98 Michigan Law Review 395–431 (1999).
- R. K. Lippert & K. Walby, Governing Through Privacy. Authoritarian Liberalism, Law, and Privacy Knowledge, 12 Law, Culture and the Humanities 329–352 (2016).
- E. Douglas Litowitz, Internal versus external perspectives in law: toward mediation, 26 Florida State University Law Review 127–150 (1998).
- Volker Lüdemann, Alfred Scheerhorn, Christin Sengstacken & Daniel Brettschneider, Systemdatenschutz im Smart Grid, 39 Datenschutz Datensich 93–97 (2015).
- Marcel Machill, Thomas Hart & Bettina Kaltenhäuser, Structural development of Internet self‐regulation, 4 INFO 39–55 (2002).
- Giandomenico Majone, Policy Harmonization. Limits and Alternatives, 16 Journal of Comparative Policy Analysis: Research and Practice 4–21 (2014).
- Earl M. Maltz, Statutory Interpretation and Legislative Power: The Case for a Modified Intentionalist Approach, 63 Tul. L. Rev. 1–28 (1988).
- F. A. Mann & Académie de droit international de La Haye., The doctrine of international jurisdiction revisited after twenty years, 186 Recueil des cours = Collected courses 9–116 (1984).
- Sean Marston, Zhi Li, Subhajyoti Bandyopadhyay, Juheng Zhang & Anand Ghalsasi, Cloud computing — The business perspective, 51 Decision Support Systems 176–189 (2011).
- Viktor Mayer-Schonberger & Yann Padova, Regime Change: Enabling Big Data through Europe, XVII The Columbia Science & Technology Law Review 315–335 (2016).
- S. Meachem, Cloud With a Chance of Regulation, 57 ITNOW 18–21 (2015).
- Aron Mefford, Lex Informatica: Foundations of Law on the Internet, 5 Indiana Journal of Global Legal Studies 211–237 (1997).
- Raul Mendez, Google case in Italy, 1 International Data Privacy Law 137–139 (2011).
- Sally Engle Merry, Legal Pluralism, 22 Law & Society Review 869–896 (1988).
- Ralf Michaels, Global Legal Pluralism, 5 Annual Review of Law & Social Science (2009).
- L. Moerel, Back to basics: when does EU data protection law apply?, 1 International Data Privacy Law 92–110 (2011).
- Jesús Montes, Alberto Sánchez, Bunjamin Memishi, María S. Pérez & Gabriel Antoniu, GMonE. A complete approach to cloud monitoring, 29 Future Generation Computer Systems 2026–2040 (2013).
- Menno Mostert, Annelien L. Bredenoord, Biesaart, Monique C I H & Delden, Johannes J M van, Big Data in medical research and EU data protection law. Challenges to the consent or anonymise approach, 24 European Journal of Human Genetics 956–960 (2016).
- Milton Mueller, ICANN and Internet governance: sorting through the debris of “self‐regulation”, 1 info 497–520 (1999).
- Richard Mulgan, 'Accountability'. An Ever-Expanding Concept?, 78 Public Administration 555–573 (2000).
- Nancy J. King, V.T. Raja, What Do They Really Know About Me in the Cloud? A Comparative Law Perspective on Protecting Privacy and Security of Sensitive Consumer Data, 50 American Business Law Journal 413–482 (2013).
- Michael R. Nelson, The Cloud, the Crowd, and Public Policy, 25 Issues in science and technology 71–76 (2009).
- Eva Nieuwdorp, The pervasive discourse, 5 Comput. Entertain. 13 (2007).
- John T. Noonan, THE CONCEPT OF LAW. By H. L. A. Hart. Oxford: Oxford University Press, 1961. Pp. viii, 263. 21s, 7 Am. J. Juris. 169–177 (1962).
- Olof Nyrén, Magnus Stenbeck & Henrik Grönberg, The European Parliament proposal for the new EU General Data Protection Regulation may severely restrict European epidemiological research, 29 European Journal of Epidemiology 227–230 (2014).
- David W. Opderbeck, Encryption Policy and Law Enforcement in the Cloud, 49 Connecticut Law Review (2017).
- Mike P. Papazoglou & Willem-Jan van den Heuvel, Service oriented architectures. Approaches, technologies and research issues, 16 The VLDB Journal 389–415 (2007).
- Siani Pearson & Nick Wainwright, An interdisciplinary approach to accountability for future internet service provision, 1 IJTMCC 52–72 (2013).
- Nicholas Platten, Protectors of Privacy: Regulating Data in the Global Economy – By A.L. Newman, 48 JCMS: Journal of Common Market Studies 453–454 (2010).
- Reinhard Posch, Neue Herausforderungen für eine Informations- und Datensicherungsstrategie, 2014 Strategie und Sicherheit (2014).
- Henry Prakken, An exercise in formalising teleological case-based reasoning. Artificial Intelligence and Law, 10 Artificial Intelligence and Law 113–133 (2002).
- Charles D. Raab & Paul de Hert, The Regulation of Technology: Policy Tools and Policy Actors TILT Law & Technology Working Paper Series (2007).
- Joseph Raz, Legal Principles and the Limits of Law, 81 The Yale Law Journal 823–854 (1972).
- Chris Reed, How to Make Bad Law: Lessons from Cyberspace, 73 The Modern Law Review 903–932 (2010).
- Christopher Rees, Who owns our data?, 30 Computer Law & Security Review 75–79 (2014).
- Joel Reidenberg, Lex Informatica: The Formulation of Information Policy Rules through Technology, 76 Tex. L. Rev. 553–593 (1997).
- Joel Reidenberg, Resolving Conflicting International Data Privacy Rules in Cyberspace, 52 Stan. L. Rev. 1315–1371 (1999).
- Joel Reidenberg, Technology and Internet Jurisdiction, 153 University of Pennsylvania law review 1951–1974 (2005).
- Gustavo Ribeiro, No Need to Toss a Coin: Conflicting Scientific Expert Testimonies and Intellectual Due Process, 12 Law, Probability and Risk 1–44 (2013).
- Richard B. Stewart, The Global Regulatory Challenge to U.S. Administrative Law, 37 N.Y.U. J. Int 695–762 (2006).
- William Jeremy Robison, Free at What Cost? Cloud Computing Privacy Under the Stored Communications Act, 98 Georgetown Law Journal 1195–1239 (2010).
- Martin Rost, Standardisierte Datenschutzmodellierung, 36 Datenschutz Datensich 433–438 (2012).
- Rothenberg, M., Jacobs, D., Updating the Law of Information Privacy: The New Framework of the European Union, 36 Harv. J. L. & Pub. Pol 606–652 (2013).
- John Mark Michael Rumbold & Barbara Pierscionek, The Effect of the General Data Protection Regulation on Medical Research, 19 Journal of medical Internet research e47 (2017).
- Sabino Cassese, Administrative Law without the State – The Challenge of Global Regulation, 37 N.Y.U. J. Int 663–694 (2005).
- Rekha Saluja, Cloud Computing: Challenges and New Developments, 5 International Journal of Science, Engineering and Computer Technology 173–176 (2015).
- Amedeo Santosuosso & Alessandra Malerba, Legal Interoperability as a Comprehensive Concept in Transnational Law, 6 Law, Inn Tech 51–73 (2014).
- G. Sartor & Viola de Azevedo Cunha, M., The Italian Google-Case. Privacy, Freedom of Speech and Responsibility of Providers for User-Generated Contents, 18 International Journal of Law and Information Technology 356–378 (2010).
- Giovanni Sartor, Doing justice to rights and values: teleological reasoning and proportionality. Artificial Intelligence and Law, 18 Artif Intell Law 175–215 (2010).
- Andrej Savin, Profiling and Automated Decision Making in the Present and New EU Data Protection Frameworks SSRN Journal (2014).
- Heinz-Dieter Schmelling, Motivation. Wie verhält sich die IT-Sicherheit zum IT-Outsourcing?, 40 Datenschutz und Datensicherheit – DuD 635–639 (2016).
- Klaus Schmidt & Alejandro Laje, The Proportionality and Solidarity Principles and Their Impact on Privacy Laws in German Jurisprudence, 5 Laws 27–38 (2016).
- T. Schultz, Carving up the Internet. Jurisdiction, Legal Orders, and the Private/Public International Law Interface, 19 European Journal of International Law 799–839 (2008).
- Paul Schwartz, Information Privacy in the Cloud, 161 University of Pennsylvania law review 1623–1662 (2013).
- Paul Schwartz, The EU-U.S. Privacy Collision: A Turn to Institutions and Procedures, 126 Harvard Law Review 1966–2009 (2013).
- Paul M. Schwartz, Preemption and Privacy. UC Berkeley Public Law Research Paper, 118 Yale Law Journal 904-947 (2009).
- Paul M. Schwartz & Daniel J. Solove, The PII Problem: Privacy and a New Concept of Personally Identifiable Information, 86 New York University Law Review 1814–1894 (2011).
- Jatinder Singh, Thomas Pasquier, Jean Bacon, Hajoon Ko & David Eyers, Twenty Security Considerations for Cloud-Supported Internet of Things, 3 IEEE Internet Things J. 269–284 (2016).
- Daniel J. Solove, A Taxonomy of Privacy, 154 University of Pennsylvania law review 477–560 (2006).
- Alexander Somek, The Concept of ‘Law’ in Global Administrative Law: A Reply to Benedict Kingsbury, 20 Eur J Int Law 985–995 (2009).
- Dawn Song, Elaine Shi, Ian Fischer & Umesh Shankar, Cloud Data Protection for the Masses Computer 39–45 (2012).
- John F. Sowa, Top-level ontological categories, 43 International Journal of Human-Computer Studies 669–685 (1995).
- Elen Stokes, Regulating Technologies: Legal Futures, Regulatory Frames and Technological Fixes by Roger Brownsword and Karen Yeung (eds), 73 The Modern Law Review 682–689 (2010).
- S. Subashini & V. Kavitha, A survey on security issues in service delivery models of cloud computing, 34 Journal of Network and Computer Applications 1–11 (2011).
- Clare Sullivan, Protecting digital identity in the cloud: Regulating cross border data disclosure, 30 Computer Law & Security Review 137–152 (2014).
- Nabil Sultan, Cloud computing. A democratizing force?, 33 International Journal of Information Management 810–815 (2013).
- Cass R. Sunstein, ON ANALOGICAL REASONING, 106 Harvard Law Review 741–791 (1993).
- Dan Svantesson, Protecting Privacy on the 'Borderless' Internet – Some Thoughts on Extraterritoriality and Transborder Data Flow, 19 Bond Law Review 168–187 (2007).
- Hassan Takabi, James B. D. Joshi & Gail-Joon Ahn, Security and Privacy Challenges in Cloud Computing Environments IEEE Security & Privacy 24–31 (2010).
- Brian Z. Tamanaha, Understanding Legal Pluralism: Past to Present, Local to Global, 30 Sydney L. Rev. 375–411 (2008).
- Omer Tene & Jules Polonetsky, Privacy in the Age of Big Data: A Time for Big Decisions, 64 Stan. L. Rev. Online 63–69 (2011).
- Omer Tene & Jules Polonetsky, Judged by the Tin Man: Individual Rights in the Age of Big Data, 11 J. on Telecomm. & High Tech. L. 351–368 (2013).
- Y. Tian, Current Issues of Cross-Border Personal Data Protection in the Context of Cloud Computing and Trans-Pacific Partnership Agreement. Join or Withdraw, 34 Wisconsin International Law Journal 367–408 (2016).
- Tridimas, T., & Gutierrez-Fons, J. A., EU Law, International Law, and Economic Sanctions against Terrorism: The Judiciary in Distress?, 32 Fordham International Law Journal 660–730 (2008).
- Hans-Heinrich Trute, Law and Knowledge – Remarks on a Debate in German Legal Science, 32 Ewha Journal of Social Sciences 34 (2016).
- Edwin Tucker, The Morality of Law, by Lon L. Fuller, 40 40 Indiana Law Journal 270 (1965) 270–279 (1965).
- Maria Tzanou, The EU as an emerging 'Surveillance Society'. The function creep case study and challenges to privacy and data protection, 4 ICL Journal (2010).
- W. Gregory Voss, European Union Data Privacy Law Developments, 70 Business Lawyer 253–260 (2014/2015).
- W. Gregory Voss, Looking at European Union Data Protection Law Reform Through a Different Prism. The Proposed EU General Data Protection Regulation Two Years Later, 17 Journal of Internet Law 1–3 (2014).
- Mladen A. Vouk, Cloud Computing – Issues, Research and Implementations, 16 CIT 235–246 (2008).
- David S. Wall, Digital Realism and the Governance of Spam as Cybercrime, 10 Eur J Crim Policy Res 309–335 (2004).
- Huaiqing Wang, Matthew K. O. Lee & Chen Wang, Consumer privacy concerns about Internet marketing, 41 Commun. ACM 63–70 (1998).
- Burke T. Ward & Janice C. Sipior, The Internet Jurisdiction Risk of Cloud Computing, 27 Information Systems Management 334–339 (2010).
- Robert Ware, The strategic use of American cyberlaw and cyberspace jurisprudence, 48 Managerial Law 303–321 (2006).
- Samuel D. Warren & Louis D. Brandeis, The Right to Privacy, IV Harvard Law Review 193–220 (1890).
- Rolf H. Weber, Accountability in the Internet of Things, 27 Computer Law & Security Review 133–138 (2011).
- Webster, J., & Watson, R. T., Analyzing the past to prepare for the future: Writing a literature review., 26 MIS quarterly 13–23 (2002).
- Christof Weinhardt, Arun Anandasivam, Benjamin Blau, Nikolay Borissov, Thomas Meinl, Wibke Michalk & Jochen Stößer, Cloud Computing – A Classification, Business Models, and Research Directions, 1 Bus. Inf. Syst. Eng. 391–399 (2009).
- Α. Ε. Whitley, P. L. Willcocks & W. Venters, Privacy and Security in the Cloud: A Review of Guidance and Responses, 22 Journal of International Technology and Information Management 75–92 (2013).
- James Q. Whitman, The Two Western Cultures of Privacy. Dignity versus Liberty, 113 The Yale Law Journal 1151–1221 (2004).
- Jonathan B. Wiener, The regulation of technology, and the technology of regulation, 26 Technology in Society 483–500 (2004).
- Andrew Keane Woods, Against Data Exceptionalism, 68 Stanford Law Review 729–789 (2016).
- Chaowei Yang, Qunying Huang, Zhenlong Li, Kai Liu & Fei Hu, Big Data and cloud computing. Innovation opportunities and challenges, 10 International Journal of Digital Earth 13–53 (2016).
- Zachary NJ Peterson, Mark Gondree, Robert Beverly, A position paper on data sovereignty: the importance of geolocating data in the cloud Proceedings of the 3rd USENIX conference on Hot topics in cloud computing (2011).
- Dimitrios Zissis & Dimitrios Lekkas, Addressing cloud computing security issues, 28 Future Generation Computer Systems 583–592 (2012).
- Lecture
- Dimitra Kamarinou, Christopher Millard & Jatinder Singh, Machine Learning with Personal Data (2016).
- Legal Commentary
- Dutch Lawyers ed., Privacy for the Homo Digitalis. Proposal for a New Regulatory Framework for Data Protection in the Light of Big Data and the Internet of Things (2016): Wolters Kluwer.
- Newspaper Articles
- Ibrahim Hasan, New EU data protection regulation Law Society Gazette (2016).
- C. Tuna, Ellison and Benioff Spar Over Cloud Credentials Wall Street Journal (2010).
- Press Releases
- eHealth Governance Initiative, DISCUSSION PAPER ON SEMANTIC AND TECHNICAL INTEROPERABILITY (2012).
- Digital Agenda in the Europe 2020 strategy (2012).
- Reports or Gray Literature
- Response to the UK Ministry of Justice’s Call for Evidence on the European Commission’s Data Protection Proposals (2012).
- DER HESSISCHE DATENSCHUTZBEAUFTRAGTE, Key data protection points for the trilogue on the General Data Protection Regulation (2015).
- Luciana Duranti, Trust in online records and data. Integrity in Government through Records Management: Essays in Honour of Anne Thurston.
- European Commission, Working Paper No. 2: Data protection laws in the EU: The difficulties in meeting the challenges posed by global social and technical developments (2010).
- European Parliament, Report on the First Report on the implementation of the Data Protection Directive (95/46/EC) (COM(2003) 265 – C5-0375/2003 – 2003/2153(INI)) (2004).
- Primavera De Filippi & Internet Policy Review, Foreign clouds in the European sky: how US laws affect the privacy of Europeans (2013): HIIG – Alexander von Humboldt Institute for Internet and Society.
- Inc. Gartner, Cloud Computing Confusion Leads to Opportunity (2008).
- Urs Gasser, Cloud Innovation and the Law: Issues, Approaches, and Interplay (2014).
- Graham Greenleaf, Major Changes in Asia Pacific Data Privacy Laws: 2011 Survey (2012).
- Douwe Korff, EC Study on Implementation of Data Protection Directive 95/46/EC (2008).
- Francesca Musiani & Internet Policy Review, Decentralised internet governance: the case of a ‘peer-to-peer cloud’ (2014): HIIG – Alexander von Humboldt Institute for Internet and Society.
- Tim O’Reilly & John Battelle, Web Squared: Web 2.0 Five Years On.
- Older Adults and Technology Use (2014).
- Neil Robinson, Lorenzo Valeri, Jonathan Cave, Tony Starkey, Hans Graux, Sadie Creese & Paul P. Hopkins, The Cloud: Understanding the Security, Privacy and Trust Challenges. Prepared for Unit F.5, Directorate-General Information Society and Media, European Commission (2012).
- Osvaldo Saldias & Internet Policy Review, Cloud-friendly regulation: The EU’s strategy towards emerging economies (2013): HIIG – Alexander von Humboldt Institute for Internet and Society.
- Johannes Thimm, Inseparable, but not equal. Assessing U.S.-EU relations in the wake of the NSA surveillance affair, 4/2014 (2014). Berlin.
- A. van Cleeff, W. Pieters & R. J. Wieringa, Security Implications of Virtualization: A Literature Study, vol. 3: IEEE.
- Daniel J. Weitzner, Harold Abelson, Tim Berners-Lee, Chris Hanson, James Hendler, Lalana Kagal, Deborah L. McGuinness, Gerald Jay Sussman & K. Krasnow Waterman, Transparent Accountable Data Mining: New Strategies for Privacy Protection (2006).
- Willcocks, Leslie P., Venters, Will and Whitley, Edgar A., Cloud and the future of business: from costs to innovation: part two: challenges (2012). London.
- M. Zhou, R. Zhang, W. Xie, W. Qian & A. Zhou, Security and Privacy in Cloud Computing: A Survey: IEEE.
- Special Issue
- Graham Greenleaf ed., GLOBAL DATA PRIVACY LAWS: 89 COUNTRIES, AND ACCELERATING. Special Supplement, Issue 115 (2012).