Main Content
Bruce Schneier, "The Value of Privacy," Schneier on Security (May 19, 2006)
2.2.1
http://perma.cc/8UPJ-CRXR
Christian Sandvig, "Corrupt Personalization," Multicast (Jun 26, 2014)
4.2
http://perma.cc/HQQ7-VQRS
Daniel Solove, "Why Privacy Matters Even if You Have 'Nothing to Hide'," Chronicle of Higher Education (May 15, 2011)
2.2.2
http://perma.cc/HMH8-PTLV
Danny Bradbury, “How Blockchain Technology Could Usher in Digital Democracy,” CoinDesk (Jun 16, 2014)
3.7
http://perma.cc/N3TL-LD2H
"Fact Sheet on the 'Right to Be Forgotten' Ruling (C-131/12)," European Commission (2014)
1.2.2
http://perma.cc/97PX-KVVV
James Surowiecki, "Cryptocurrency,” MIT Technology Review (Aug 13, 2011)
3.4
http://perma.cc/X2A4-K8YN
Jeffery Rosen, "The Right to be Forgotten," Stanford Law Review Online (Feb 13, 2012)
1.2.1
http://perma.cc/ZG6C-TR7C
Jonathan Zittrain, “Be Careful What You Ask For: Reconciling a Global Internet and Local Law,” WHO RULES THE NET?, Cato Institute (2003)
1.1.3
http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/2003-03.pdf
Jonathan Zittrain, "Don’t Force Google to Forget," New York Times (May 14, 2014)
1.2.3
http://www.nytimes.com/2014/05/15/opinion/dont-force-google-to-forget.html
Jonathan Zittrain, "I. AN OVERVIEW OF JURISDICTIONAL PROBLEMS IN CYBERSPACE," Internet Law Jurisdiction, Foundation Press (2005)
1.1.2
http://perma.cc/0nzSsncggSV?type=pdf
This book, and all H2O books, are Creative Commons licensed for sharing and re-use. Material included from the American Legal Institute is reproduced with permission and is exempted from the open license.