Диссертация (1138922), страница 38
Текст из файла (страница 38)
Report of the Special Rapporteur on the Promotion and Protection of theRight to Freedom of Opinion and Expression, Frank La Rue. – URL:http://www2.ohchr.org/english/bodies/hrcouncil/docs/17session/A.HRC.17.27_en.pdf280. Scarlet Extended SA v Société belge des auteurs, compositeurs et éditeursSCRL (SABAM) (C-70/10). Judgment of the Court of Justice (Grand Chamber)of 24 November 2011. – URL: http://curia.europa.eu/juris/liste.jsf?num=c-70/10281. Section 508 Amendment to the Rehabilitation Act of 1973 (29 U.S.C. §794d).
– URL: https://www.law.cornell.edu/uscode/text/29/794d167282. Statement on Statement of the WP29 on the Impact of the Development ofBig Data on the Protection of Individuals with Regard to the Processing of TheirPersonal Data in the EU. Article 29 Data Protection Working Party, WP221.September 16, 2014. – URL: http://ec.europa.eu/justice/data-protection/article29/documentation/opinion-recommendation/files/2014/wp221_en.pdf283. Telecommunications Act of 1996. – URL: https://www.fcc.gov/general/telecommunications-act-1996284.
Telekabel Wien GmbH v Constantin Film Verleih GmbH and WegaFilmproduktionsgesellschaft mbH (C-314/12). Judgment of the Court (FourthChamber) of 27 March 2014. – URL: http://curia.europa.eu/juris/liste.jsf?num=c314/12285. The Constitution of Greece. – URL: http://www.hellenicparliament.gr/UserFiles/f3c70a23-7696-49db-9148-f24dce6a27c8/001-156%20aggliko.pdf286.
The Instrument of Government. – URL: http://www.riksdagen.se/en/SysSiteAssets/07.-dokument--lagar/the-instrument-of-government-2015.pdf/287. The International Principles on the Application of Human Rights toCommunications Surveillance. – URL: https://www.necessaryandproportionate.net288. The ITU National Cybersecurity Strategy Guide.
– URL: http://www.itu.int/ITU-D/cyb/cybersecurity/docs/ITUNationalCybersecurity StrategyGuide.pdf289. Treaty of Lisbon amending the Treaty on European Union and the TreatyestablishingtheEuropeanCommunity.–URL:http://www.consilium.europa.eu/uedocs/ cmsUpload/cg00014.en07.pdf290. U.S.-EU Safe Harbor Framework Documents. – URL: http://webarchive.loc.gov/all/20150405033356/http%3A//export%2Egov/safeharbor/eu/eg_main_018493%2Easp291.
United Nations, Organization of American States, Organization for Securityand Co-operation in Europe, African Commission on Human and Peoples' Rights.«JointDeclarationConcerningtheInternet».http://www.oas.org/en/iachr/expression/showarticle.asp?artID=848–URL:168292. Uniting and Strengthening America by Providing Appropriate Tools Requiredto Intercept and Obstruct Terrorism (USA PATRIOT ACT) Act of 2001. – URL:https://epic.org/privacy/terrorism/hr3162.pdf293. Uniting and Strengthening America by Fulfilling Rights and EndingEavesdropping, Dragnet-collection and Online Monitoring Act (USA FREEDOMAct) 2015 г.
– URL: http://legislink.org/us/pl-114-23 Pub.L. 114–23294. UPC Telekabel Wien GmbH v Constantin Film Verleih GmbH and WegaFilmproduktionsgesellschaft mbH (C-314/12). Judgment of the Court of Justice(FourthChamber),27March2014.–URL:http://curia.europa.eu/juris/liste.jsf?num=c-314/12295. Verizon Communications Inc. v. Federal Communications Commission.
–URL: https://www.cadc.uscourts.gov/internet/opinions.nsf/ 5DFE38F28E7CAC9185257C610074579E/$file/11-1355-1475317.pdfМонографии296. Barak, A. Proportionality. Constitutional Rights and their Limitations. – N.Y.,2012. – ххvi, 611 p.297. Banakar, R. Normativity in Legal Sociology: Methodological Reflections onLaw and Regulation in Late Modernity. – Springer International Publishing,2015. – 292 p.298. Castells, M. The Rise of the Network Society: The Information Age:Economy, Society and Culture. – Wiley, 2000.
– 624 p.299. Columbic, M. C. Fighting Terror Online: The Convergence of Security,Technology, and the Law. – New York: Springer New York, 2008. – XIV, 178 p.300. Christou, G. Cybersecurity in the European Union: Resilience andAdaptability in Governance Policy. – L: Palgrave Macmillan UK, 2016. – 222 p.301. Crounse, S. The Fair Information Principles: A Comparison of U.S. andCanadian Privacy Policy as Applied to the Private Sector. – NY: RochesterInstitute of Technology, ProQuest, UMI Dissertations Publishing, 2009. – 174 p.169302. Etzioni, A.
Security First. For a Muscular, Moral Foreign Policy. – NewHaven (Ct.): Yale University Press, 2008. – 336 p.303. Ferrarotti, F. The Myth of Inevitable Progress. Westport (Conn.) / F.Ferrarotti – L., 1985. – 208 p.304. Grama, J. Legal Issues in Information Security. – Jones & Bartlett Publishers,2010.
– 526 p.305. Gutwirth, S. Privacy and the Information Age. – Lanham, MD: Rowman &Littlefield Publishers, 2002. – 144 p.306. Hicks, J. Wealth and Welfare, Collected Essays on Economic Theory. V. 1. –Oxford: Basil Blackwell. 1981. – 320 p.307. Information Security and Privacy: a Practical Guide for Global Executives,Lawyers, and Technologists / Thomas J. Shaw, editor. – Chicago: American BarAssociation, 2011. – 395 p.308. Inglehart, R.
Culture Shift in Advanced Industrial Society. – Princeton:Princeton University Press, 1990. – P. 151.309. Klitou, D. Privacy-Invading Technologies and Privacy by Design:Safeguarding Privacy, Liberty and Security in the 21st. T.M.C. – Asser Press,2014. – XIX, 338 p.310.
Lessig, L. Code: Version 2.0. – New York: Basic Books, 2006. – 410 p.311. Mahoney, J. The Challenge of Human Rights: Origin, Development, andSignificance. – Malden: Blackwell Publ., 2007. – 215 p.312. Masuda, Y. The Information Society as Postindustrial Society. – Wash., 1983.– 171 p.313. McLuhan, M., Powers, B. R. The Global Village: Transformations in WordLife of Media in 21st Century. – N.Y., Oxford, 1989. – XV.
220 p.314. Michalowski S. German Constitutional Law: The Protection of Civil Liberties/ Michalowski S., Woods L. – Sudbury, MA: Dartmouth Publishing Co Ltd.1999. – 127 p.315. Mironenko, O. Aviation Security and Protection of Individuals: Technologiesand Legal Principles. – Oslo: University of Oslo, 2016. – 532 p.170316. Nelson, S. D. Information Security for Lawyers and Law Firms / Nelson S.D., Isom D. K., Simek J. W. – Chicago, IL: American Bar Association, 2006. –424 p.317. Nickel, J. W. Making Sense of Human Rights. – Oxford: Blackwell Publ.,2007. – 267 p.318.
Nozick, R. Anarchy, State, and Utopia. – Basic Books, 2013. – 592 p.(первое издание 1974 г.)319. Price, M. E. Self-Regulation and the Internet / Price M. E., Verhulst S. G. –The Hague: Kluwer Law International, 2005. – 208 p.320. Rothbard, M. N. Egalitarianism as a Revolt Against Nature and Other Essays/ 2nd ed. – Auburn: The Ludwig von Mises Institute, 2000. – 324 p. (первоеиздание 1973 г.)321.
Steiner, H. J. International Human Rights in Context: Law, Politics, Morals /H. J. Steiner, Ph. Alston, R. Goodman. – New York: Oxford Univ. Press, 2008. –149 p.322. Toffler, A. The Adaptive Corporation. – New York: McGraw-Hill, 1985. –217 p.323. Tropina, T., Callanan, C. Self- and Co-regulation in Cybercrime,Cybersecurity and National Security. – Springer International Publishing, 2015. –100 p.324.
Veit, D. Foundations of Digital Government / Veit D., Huntgeburth J.Springer Berlin Heidelberg, 2014. – 158 p.325. Ziccardy, G. Resistance, Liberation Technology and Human Rights in theDigital. – Springer Netherlands Age. 2013. – 328 p.171Статьи326. Attard, J. et al. A Systematic Review of Open Government Data Initiatives //Government Information Quarterly.
– 2015. – V. 32. – P. 399–418.327. Barlow, J. P. The Economy of Ideas: A Framework for Patents and Copyrightin the Digital Age // Wired. – 2.03.1994.328. Bamberger, K. A. Privacy on the Books and on the Ground / Bamberger K.A., Mulligan D. K. // Stanford Law Review. – 2011.
– V. 63. – P. 247 – 315.329. Bell, D. The Social Framework of Information Society // The Computer Age:A Twenty Year View / Ed. M. L. Dertonzos, L. Moses. – MA: MIT Press, 1980.– P. 163-212.330. Bennahum, D. S. United Nodes of Internet: Are We Forming a DigitalNation? // Crypto Anarchy, Cyberstates, and Pirate Utopias / edited by P.Ludlow. – L. : MIT Press, 2001. – 485 p.
– P. 39 – 45.331. Birdsall, W. F. A Right to Communicate as an Open Work // MediaDevelopment. – 2006. – V. LIII. – P.41 – 47.332. Boyle, J. Foucault In Cyberspace: Surveillance, Sovereignty, and Hard-WiredCensors. 1998. – URL: https://law.duke.edu/boylesite/foucault.htm333. Caidi, N., Ross, A. Information Rights and National Security // GovernmentInformation Quarterly. – 2005. – V.22. – P. 663 – 684.334. Cheung, A. S. Y. Re-personalizing Personal Data in the Cloud // Privasy andLegal Issues in Cloud Computing / Ed. by Cheung A. S.
Y., Weber R. H. –Cheltenham: Edward Elgar Publishing, 2015. – P. 69 – 05.335. Cohen, J. E. Cyberspace As/And Space // Columbia Law Review. – 2007. –V. 107. – P. 210 – 256.336. Cohen, J. E. Information Rights and Intellectual Freedom // Ethics and theInternet / Ed. by A.Vedder. – Antwerp: Intersentia, 2001. – P. 11 – 32.337. Cristoffersen, J. Human Rights and Balancing: The Principle ofProportionality // Research Handbook On Human Rights and Intellectual172Property / Ed. by Geiger C. Cheltenham. – UK: Edward Elgar Publishing, 2015.
–727 p.338. D’Arcy, J. Direct Broadcast Satellites and the Right to Communicate // EBUReview. – 1969. – V. 118. – P. 14 – 18.339. Ducoulombier, P. Conflicts between Fundamental Rights and the EuropeanCourt of Human Rights: An Overview // Conflicts between Fundamental Rights /Ed. By Eva Brems. Intersentia, 2008. – XVIII + 690 p. – P. 217 – 247.340. Frieden R. Network Neutrality in the EU, Canada and the U.S. //Intereconomics.















