Диссертация (1138922), страница 39
Текст из файла (страница 39)
– 2015. – V.50. – I.6. – P. 363 – 364.341. Giblin, R. Evaluating Graduated Response // Columbia Journal of Law & theArts. 2014. V. 37. P. 147-209.342. Goldsmith, J. L. Against Cyberanarchy // University of Chicago Law Review.– 1998. – V. 65. – P. 1199 – 1250.343. Graubart, J. What's News: A Progressive Framework for Evaluating theInternational Debate over the News // California Law Review.
– 1989. – V. 77. –I. 3. – P. 629 – 663.344. Greenleaf G. South Korea's Innovations in Data Privacy Principles: AsianComparisons / Greenleaf G., Park W // Computer Law & Security Review. –2014. – V. 30. – P. 492 – 505.345. Hardy, I. T. The Proper Legal Regime for ‘Cyberspace’ // University ofPittsburgh Law Review. – 1994. – V. 55. – P. 993 – 1055.346. Hilbert, M. The End Justifies the Definition: The Manifold Outlooks on theDigitalDivideandTheirPracticalUsefulnessfor Policy-Making//Telecommunications Policy.
– 2011. – № 35 (8). – P. 715 – 736.347. Hughes, J. The Internet and the Persistence of Law // Boston College LawReview. – 2003. – V. 44. – P. 359 – 396.348. Jansen, M. Big and Open Linked Data (BOLD) in Government: A Challengeto Transparency and Privacy? / Janssen M., van den Hoven J. // GovernmentInformation Quarterly. – 2015. – V. 32. – P. 363 – 368.173349.
Jørgensen, R. F. Online Service Providers as Human Rights Arbiters /Jørgensen R. F., Pedersen A. M. // The Responsibilities of Online ServiceProviders / ed. by M. Taddeo, L. Floridi. – Springer International Publishing,2017. – P.179 – 199.350.
Jackson, V. C. Ambivalent Resistanceand Comparative Constitutionalism:Opening Up the Conversation on ‘Proportionality’, Rights and Federalism //University of Pennsylvania Journal of Constitutional Law. – 1999. – V. 1. – P.583 – 639.351. Jackson, V. C. Being Proportional about Proportionality // ConstitutionalCommentary. – 2004. – V. 21. – № 3. – P. 803 – 860.352.
Johnson, D. R. Law and Borders – The Rise of Law in Cyberspace / JohnsonD. R., Post D. // Crypto Anarchy, Cyberstates, and Pirate Utopias / ed. by PeterLudlaw. Massachusetts Institute of Technology. – 2001. – P. 146 – 195.(Впервые опубликована в Stanford Law Review. – 1996. – V.48)353. Kshetri, N. Big Data's Impact on Privacy, Security and Consumer Welfare /Telecommunications Policy. – 2014. – V. 38. – P. 1134 – 1145.354. Leal, M. C.
The EU Approach to Net Neutrality: Network Operators andOver-the-Top Players, Friends or Foes? // Computer Law & Security Review. –2014. – V. 30. – 506 – 520.355. Luiijf, H. Ten National Cyber Security Strategies: a Comparison / Luiijf H.,Besseling K., Spoelstra M., de Graaf P. // Critical Information InfrastructureSecurity. 6th International Workshop, CRITIS 2011, Lucerne, Switzerland,September 8-9, 2011, Revised Selected Papers.
– Berlin: Springer BerlinHeidelberg, 2011. – P. 1 – 17.356. Mantelero, A. Data Protection in a Big Data Society. Ideas for a FutureRegulation / Mantelero A., Vaciago G. // Digital Investigation. – 2015. – V. 15. –P 104 – 109.357. Marshall, J. The Legal Recognition of Personality: Full-Face Veils andPermissible Choice // International Journal of Law in Context. – 2014.
– V. 10. –P. 64 – 80.174358. McDonald, A.M. The Cost of Reading Privacy Policies / McDonald A. M.,Cranor L. F. // I/S: A Journal of Law and Policy for the Information Society. –2008. – V. 4:3. – P. 560.359. Meulen, N.S. van der. You’ve Been Warned: Consumer Liability in InternetBanking Fraud // Computer Law & Security Review. – 2013. – V. 29. – P.
713 –718.360. Mitrakas, A. Information Security Regulation: Tomorrow Never Dies? //Securing Electronic Business Processes / S. Paulus, N. Pohlmann, H. Reimer(Editors). Vieweg. – 2006. – P. 433 – 438.361. Netanel, N. W. Cyberspace Self-Governance: A Skeptical View from LiberalDemocratic Theory // California Law Review. – 2000. – V.88. – P.488.362. Odlyzko, A. Network Neutrality, Search Neutrality, and the Never-EndingConflict between Efficiency and Fairness in Markets // Review of NetworkEconomics.
– 2009. – V. 8. – № 1. – P. 40 – 60.363. Pagalo, U. Online Security and the Protection of Civil Rights: A LegalOverview // Philosophy & Technology. – 2013. – V. 26. – I. 4. – P. 381 – 395.364. Papakonstantinou, A. The Constitutional Right of Participation in theInformation Society // Revue of Public and Administrative Law. – 2006. – № 2. –P.233.365. Perritt, H. H. Cyberspace Self-Government: Town Hall Democracy orRediscovered Royalist? // Berkeley Technology Law Journal.
– 1997. – V. 12. –P. 413 – 482.366. Rees, С. Who Owns Our Data? / Computer Law & Security Review. – 2014.– V. 30. – P. 75 – 79.367. Rees, С. Taking Sides on Technology Neutrality // SCRIPT-ed. – 2007. – V.4. – I. 3. – P.263 – 284.368. Reidenberg, J. R. Governing Networks and Rule-Making in Cyberspace //Emory Law Journal. – 1996. – V. 45. – P.
911 – 930.175369. Rubinstein, I. S. Privacy by Design: A Counterfactual Analysis of Google andFacebook Privacy Incidents / Rubinstein I. S., Nathaniel G. // BerkeleyTechnology Law Journal. – 2013. – V. 28. – P. 1333 – 1413.370. Savirimuthu, J. Response to the Сonsultation by the Body of EuropeanRegulators in Electronic Communications BEREC on Net Neutrality Policy //European Journal for Law and Technology. – 2012.
– V. 3. – №. 1. – URL:http://ejlt.org/article/view/134/214371. Shin, D.-H. A Comparative Analysis of Net Neutrality: Insights Gained byJuxtaposing the U.S. and Korea // Telecommunications Policy. – 2014. – V. 38. –I. 11. – P.1117 – 1133.372. Solms, R. From Information Security to Cyber Security / Solms R., Niekerk J.// Сomputers & Security.
– 2013. – V. 38. – P. 97 – 102.373. Sullivan, C. Digital Citizenship and the Right to Digital Identity underInternational Law // Computer Law & Security Review. – 2016. – V. 32. – P. 474– 481.374. Sullivan, C. Digital Identity, Privacy and the Right to Identity in the UnitedStates of America // Computer Law & Security Review.
– 2013. – V. 29. – P. 348– 358.375. Sullivan, C. Digital Identity – The Legal Person? // Computer Law & SecurityReview. – 2009. – V. 25. – P. 227 – 236.376. Sullivan, C. Digital Identity and French Personality Rights – A Way Forwardin Recognising and Protecting an Individual's Rights in His/Her Digital Identity /Sullivan C., Stalla-Bourdillon S. // Computer Law & Security Review. – 2015. –V. 31. – P.268 – 279.377.
Trachtman, J. P. Cyberspace, Sovereignty, Jurisdiction and Modernism //Indiana Journal of Global Legal Studies. – 1998. – V. 5. – P.561 – 581.378. Umesao, T. Information Industry Theory: Dawn of the Coming Era of theEctodermal Industry / T. Umesao // Hoso Asahi. – 1963. – Jan. – P. 4 – 17.176379. Wiebe A. The New Fundamental Right to IT Security – First evaluation andcomparative view at the U.S. // Datenschutz und Datensicherheit.
– 2008. – V.11. – P. 713 – 716.380. Weber, R. H. Internet of Things: Privacy Issues Revisited // Computer Law &Security Review. – 2015. – V. 31. – P. 618 – 627.381. Wu, T.S. Cyberspace Sovereignty? – The Internet and the InternationalSystem. Harvard Journal of Law & Technology. – 1997. – V. 10. – P.647 – 666.382. Wu, T. Network Neutrality, Broadband Discrimination // Journal ofTelecommunications and Hight Technology Law. – 2003. – V.
2. – P. 141 – 142.Электронные ресурсы383. 8 Principles of Open Government Data. – URL: https://public.resource.org/8_principles.html384. Barlow, J. P. A Declaration of the Independence of Cyberspace. – 1997. –URL: https://projects.eff.org/~barlow/Declaration-Final.html385. Big data.
– URL: http://www.gartner.com/it-glossary/big-data/386. Big Data: What it is and why it matters. – URL: https://www.sas.com/en_us/insights/big-data/what-is-big-data.html387. Castro, D. A Declaration of the Interdependence of Cyberspace. ComputerWorld, February 8, 2013. – URL: http://www.computerworld.com/article/2494710/internet/a-declaration-of-the-interdependence-of-cyberspace.html388. Cavoukian, A. Privacy by Design.
The 7 Foundational Principles. – URL:https://www.ipc.on.ca/wp-content/uploads/Resources/7foundationalprinciples.pdf389. CenterforCopyrightInformation.Resources&FAQ.–URL:http://www.copyrightinformation.org/resources-faq/390. Equality Act 2010. Banning Age Discrimination In Services. An Overviewfor Service Providers and Customers. – URL: https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/ 85004/age-discrimination-ban.pdf177391. European Legislation on Reuse of Public Sector Information. – URL:http://ec.europa.eu/digital-agenda/en/european-legislation-reuse-public-sectorinformation392. F.C.C.















