Main Content
Bruce Schneier, "The Value of Privacy," Schneier on Security (May 19, 2006)
2.2.1
http://perma.cc/8UPJ-CRXR
Christian Sandvig, "Corrupt Personalization," Multicast (Jun 26, 2014)
4.2
http://perma.cc/HQQ7-VQRS
Daniel Solove, "Why Privacy Matters Even if You Have 'Nothing to Hide'," Chronicle of Higher Education (May 15, 2011)
2.2.2
http://perma.cc/HMH8-PTLV
Danny Bradbury, “How Blockchain Technology Could Usher in Digital Democracy,” CoinDesk (Jun 16, 2014)
3.7
http://perma.cc/N3TL-LD2H
"Fact Sheet on the 'Right to Be Forgotten' Ruling (C-131/12)," European Commission (2014)
1.2.2
http://perma.cc/97PX-KVVV
James Surowiecki, "Cryptocurrency,” MIT Technology Review (Aug 13, 2011)
3.4
http://perma.cc/X2A4-K8YN
Jeffery Rosen, "The Right to be Forgotten," Stanford Law Review Online (Feb 13, 2012)
1.2.1
http://perma.cc/ZG6C-TR7C
Jonathan Zittrain, “Be Careful What You Ask For: Reconciling a Global Internet and Local Law,” WHO RULES THE NET?, Cato Institute (2003)
1.1.3
http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/2003-03.pdf
Jonathan Zittrain, "Don’t Force Google to Forget," New York Times (May 14, 2014)
1.2.3
http://www.nytimes.com/2014/05/15/opinion/dont-force-google-to-forget.html
Jonathan Zittrain, "I. AN OVERVIEW OF JURISDICTIONAL PROBLEMS IN CYBERSPACE," Internet Law Jurisdiction, Foundation Press (2005)
1.1.2
http://perma.cc/0nzSsncggSV?type=pdf
This book, and all H2O books, are Creative Commons licensed for sharing and re-use with the exception of certain excerpts. Any excerpts from the Restatements of the Law, Principles of the Law, and the Model Penal Code are copyright by The American Law Institute. Excerpts are reproduced with permission, not as part of a Creative Commons license.