
IT Laws in the Era of Cloud-Computing
A Comparative Analysis between EU and US Law on the Case Study of Data Protection and Privacy- Autor:innen:
- Verlag:
- 2018
Zusammenfassung
Der Band dokumentiert die Ergebnisse und Empfehlungen einer Analyse zur Frage, wie sich IT-Gesetze entwickeln sollten, unter der Prämisse, dass die heutige und zukünftige Informations- und Kommunikationstechnologie durch Cloud Computing geprägt ist. Insbesondere entwickelt sich diese Untersuchung auf einer vergleichenden und einer interdisziplinären Achse, d.h. als Rechtsvergleich zwischen EU und US-Recht und interdisziplinär zwischen Recht und IT. Die Arbeit konzentriert sich auf den Schwerpunkt vom Datenschutz und Datensicherheit in Cloud-Umgebungen und analysiert drei Hauptherausforderungen auf dem Weg zu einer effizienteren Cloud-Computing-Regulierung:Verständnis der Gründe für die Entwicklung divergierender Rechtsordnungen und Denkschulen zum IT-RechtGewährleistung der Privatsphäre und Datenschutz in der Cloudkonvergierende Regulierungsansätze für die Cloud in der Hoffnung auf eine harmonisierte Landschaft von IT-Gesetzen in der Zukunft.
Schlagworte
Publikation durchsuchen
Bibliographische Angaben
- Copyrightjahr
- 2018
- ISBN-Print
- 978-3-8487-5362-8
- ISBN-Online
- 978-3-8452-9562-6
- Verlag
- Nomos, Baden-Baden
- Reihe
- Schriften der Albrecht Mendelssohn Bartholdy Graduate School of Law
- Band
- 6
- Sprache
- Englisch
- Seiten
- 378
- Produkttyp
- Monographie
Inhaltsverzeichnis
- Titelei/InhaltsverzeichnisSeiten 1 - 20 Download Kapitel (PDF)
- i. The European state of affairs
- ii. The US state of affairs
- iii. Current state of affairs in other countries
- b. Research question and structure of the project
- a. Introduction – scope of this chapter
- b. A brief history of the cloud
- c. The NIST definition of cloud computing; a starting point
- i. Cloud computing compared to traditional IT – Their main differences and why the cloud matters
- ii. Cloud computing environments compared to client-server systems
- iii. Cloud computing compared to outsourcing – The key differences
- e. Data handling needs and the parallel technological evolution – How developing computational requirements led to technological progress
- i. File hosting
- ii. Clustering
- iii. Grid Computing
- iv. Virtualization
- i. The cloud’s business model
- ii. The architecture of cloud computing systems
- i. The cloud’s compute model
- ii. Virtualization
- iii. Monitoring
- iv. Provenance
- i. The application model of the cloud
- j. The security model of the cloud
- k. What is cloud computing after all and why does it merit a new regulatory approach?
- a. Introduction – scope of the chapter
- b. How extensive is the influence of European data privacy standards outside Europe? Is it EU law that has been so influencing or is it more the entire European legal thinking?
- c. What is the main difference from Europe in USA’s arrangement of their regulatory framework for privacy and the internet?
- d. The ‘privacy collision’ between Europe and the USA: a brief historical overview
- e. Personal data privacy in Europe and the US: a pragmatic and an articulate approach
- i. EU’s approach towards cyber challenges
- ii. The US approach towards cyber challenges
- i. Privacy under the effect of the cloud in the US
- ii. Judicial obstacles
- iii. Legislative obstacles
- iv. Societal obstacles
- h. Europe’s combined approach towards the cloud and economic growth
- i. Regulating privacy and security of consumer sensitive data in the cloud; the US current status quo
- ii. Regulating privacy and security of consumer sensitive data in the cloud; the EU current status quo
- iii. The need for efficient protection of sensitive data also points towards regulatory reform in the cloud
- a. Introduction – scope of this chapter
- b. The most important policy views on aspects of cloud computing brought out so far and why they are not yet sufficient
- c. The European Data Protection Directive 95/46/EC; an assessment of its effects on the prevalent views about data protection and related IT technologies; are things different under the GDPR?
- i. Does the GDPR set up a truly universal legal framework for data transfer law?
- ii. What does the spirit of GDPR tell us about the longevity of the current overall EU data protection regime?
- e. GDPR and its readiness to respond to big scale uses of data in the cloud; the case of machine learning
- f. Vision for a cloud-based future
- i. Privacy and security viewed through the years and across major jurisdictions
- ii. Privacy issues particular to cloud computing technologies
- iii. Why does cloud computing call for a new regulatory framework?
- a. Introduction – scope of this chapter
- b. Internet Regulation: a paramount of unilateralism
- c. From governments to governance; learning to do laws for a borderless world
- d. So far, existing laws about cyberspace are bad laws. Lessons learnt?
- e. Lex informatica: The formulation of policy rules for the web through applied technology. Can it offer any useful insight for the conceptualization of a dedicated cloud computing regime?
- f. Sectoral codes of conduct: the most dedicated attempt to come up with cloud computing laws so far and how it could be improved
- g. Efforts undertaken so far on the front of sector-based regulation of IT and their common weakness
- i. Defining global administrative law
- ii. The general theory on global administrative law and its principles
- iii. Theoretical foundations of global administrative law based on US and EU administrative law
- i. The proposal
- ii. The problems of legal pluralism
- j. Can effective cloud computing regulation be achieved through international law? Not really.
- k. A comparatist approach and synthesis is the only way; moving forward to regulate cloud computing through legal pluralism
- PART I: Jurisdiction in the era of cloud computing
- i. Establishment – Art. 4 para. 1(a) DPD
- ii. International law – Art. 4 para. 1(b) DPD
- iii. Equipment – Art. 4 para. 1(c) DPD
- iv. Changes to current status quo by the upcoming GDPR
- b. Technology and internet jurisdiction: a process of parallel ‘give and take’
- c. From data protection law to international jurisdiction on the internet; adapting laws to modern needs and reality
- d. What is the problem with asserting jurisdiction over cloud-related cases under current EU laws?
- e. Steps to reduce jurisdictional disputes from the perspective of EU law
- i. The basics about determining jurisdiction under US law
- ii. Jurisdiction under the influence of technological evolution; practices for alleviating jurisdiction risks in the US and internationally over IT-related cases
- i. Virtual and physical environments
- ii. Accepting the inherent nature of cloud jurisdiction risk
- PART II: Accountability on the cloud
- a. Accountability: the essentials from data protection to cloud computing
- b. Accountability is not self-regulation; clearing the picture between two comparable but critically different concepts
- c. Accountability in the cloud cannot be sufficiently settled with existing EU laws
- d. Providing answers to the privacy challenges of cloud computing under US law; the importance of the Fourth Amendment principles
- e. Achieving effective regulation of the cyberspace: discussing particularities of the web and how these should be mirrored in modern laws about aspects of the digital world
- f. Tackling the issue of perspective in internet law; an essential step towards a pragmatic accountability regime
- g. The road to an accountable cloud computing goes through the road to an accountable internet: how to achieve a sound internet governance
- h. Effective accountability for cloud computing
- i. Accountability as a way to further reinforce privacy in the cloud
- PART I: THE RISKS ASSOCIATED WITH CLOUD COMPUTING
- i. United States v. Miller
- ii. The Electronic Communications Privacy Act (ECPA) – a step ahead but obscurity lingers
- iii. The USA PATRIOT Act
- iv. The HIPAA and compelled disclosures
- v. The Fair Credit Reporting Act
- b. Threats to privacy means threats to security: the two prominent issues that go hand in hand in cloud computing environments
- c. Privacy risks posed by the cloud put into question cornerstone elements of information privacy laws
- d. The other side of the coin: how cloud computing’s architectural advantages can turn into threats for privacy
- e. The affluence of consumer data on cloud computing and particular threats to them because of the cloud’s specificities
- PART II: CLOUD COMPLIANCE
- a. Introductory remarks on the concept of ‘cloud compliance’
- b. Effective regulation of technology: the need to define policy tools and policy actors
- c. Incorporating users’ privacy concerns into the rules governing design and deployment of cloud environments
- d. Pragmatic answers regarding the deployment of secure and privacy-proof cloud networks
- e. Incentivizing privacy and security by encouraging the adoption of privacy enhancing technologies
- a. Introduction – scope of this chapter
- i. The Firmware/Hardware layer
- ii. The Software Kernel layer
- iii. The Cloud Software Infrastructure layer
- iv. The Cloud Software Environment layer
- v. The Cloud Application layer (SaaS)
- c. Different uses but the same ontology: what does this mean for cloud computing regulatory principles?
- i. Data generation
- ii. Transfer
- iii. Use
- iv. Sharing
- v. Storage
- vi. Archival
- vii. Destruction
- i. On the hardware/firmware layer
- ii. On the software/kernel layer
- iii. On the cloud software infrastructure layer
- iv. On the PaaS and SaaS layers
- v. On the SaaS layer in particular
- a. Introduction – scope of this chapter
- b. Viewing cloud computing from the outside; what else is the cloud apart from its infrastructure and the science behind it?
- i. The customer (or user) of cloud computing services
- ii. The service provider
- iii. Infrastructure providers
- iv. Aggregate services providers (aggregators)
- v. The platform provider
- vi. The cloud services consultant
- d. The innovative nature of cloud computing business and the legal challenges raised as a result thereof
- i. Data protection
- ii. Data Security
- iii. Data retention
- iv. Consumer protection
- v. Intellectual Property
- vi. Competition
- vii. Trade
- viii. Jurisdiction, applicable law, enforcement
- ix. Compliance
- x. Transparency
- xi. Responsibility and liability
- xii. Infrastructure
- i. Challenges in conceptualizing cloud computing regulation
- ii. Challenges in implementing cloud computing regulation
- iii. Projecting challenges in the assessment phase of a regulation on the cloud
- a. Introduction – scope of this chapter
- b. Doing laws based on the local and global experience: the differences in approach and the need to combine both perspectives in the case of cloud computing
- c. The ability of law to learn and evolve; how to achieve law evolution in the case of cloud computing
- d. How proportionality and teleological reasoning can help cloud computing regulation make IT laws overall more efficient
- e. How technology itself can help establishing a sound system of governance in the field of cloud computing
- f. The key to achieving a sound system of governance in cloud computing regulation: legal interoperability and its significance as a concept in transnational law
- g. A brief summary of the trends on privacy regulation through time in a global context; the transit to a cloud computing regulation governance regime is not a free fall into the unknown
- h. Making a long-lasting governance regime a choice not a necessity
- i. Can the transatlantic divide on privacy be bridged? Why the extensive use of cloud computing technologies makes the call for convergence an urgent one?
- a. The driving forces that make the need for cloud computing regulation a pressing one
- i. Normative proposals
- ii. Governance proposals
- iii. Policy proposals
- c. Future challenges – insights for further research
- Court of Justice of the European Union
- US Courts
- US Supreme Court
- Lower US courts
- Other national courts
- Italy
- EU laws and statutes
- US laws and statutes
- United Nations
- Council of Europe
- Bibliographical indexSeiten 355 - 378 Download Kapitel (PDF)
Literaturverzeichnis (427 Einträge)
Es wurden keine Treffer gefunden. Versuchen Sie einen anderen Begriff.
- Audio or Video Documents Google Scholar öffnen
- Larry Ellison, Larry Ellison on cloud computing (2009), available at: https://www.youtube.com/watch?v=0FacYAI6DY0. Google Scholar öffnen
- Books Google Scholar öffnen
- P. E. Agre & M. Rotenberg, Technology and Privacy: The New Landscape (1998): MIT Press. Google Scholar öffnen
- Antony Anghie & C.G Weeramantry, Legal visions of the 21st century: essays in honour of judge Christopher Weeramantry (op. 1998). The Hague [etc.]: Kluwer Law International. Google Scholar öffnen
- Anne Arendt, Ulrich Dammann & Spiros Simitis, Bundesdatenschutzgesetz (2011). Baden-Baden: Nomos-Verl.Ges. Google Scholar öffnen
- I. Augsberg, Informationsverwaltungsrecht: Zur kognitiven Dimension der rechtlichen Steuerung von Verwaltungsentscheidungen (2014): Mohr Siebeck. Google Scholar öffnen
- Aharon Barak & Sari Bashi, Purposive Interpretation in Law (2011). Princeton: Princeton University Press. Google Scholar öffnen
- Christian Baun, Marcel Kunze, Jens Nimis & Stefan Tai, Cloud Computing (2011). Berlin, Heidelberg: Springer Berlin Heidelberg. Google Scholar öffnen
- C. J. Bennett, Regulating Privacy: Data Protection and Public Policy in Europe and the United States (1992): Cornell University Press. Google Scholar öffnen
- Colin J. Bennett & Charles D. Raab, The governance of privacy. Policy instruments in global perspective (2006). Cambridge, Mass.: MIT Press. Google Scholar öffnen
- Donald H. Berman & Carole D. Hafner, Representing teleological structure in case-based legal reasoning: the missing link (1993): ACM. Google Scholar öffnen
- M. Bovens, The Quest for Responsibility: Accountability and Citizenship in Complex Organisations (1998): Cambridge University Press. Google Scholar öffnen
- S. Brenner, Law in an Era of Smart Technology (2007): Oxford University Press. Google Scholar öffnen
- Stephen G. Breyer, Breaking the vicious circle. Toward effective risk regulation, vol. 1992 (1993). Cambridge, Mass.: Harvard University Press. Google Scholar öffnen
- R. Brownsword, E. Scotford & K. Yeung, The Oxford Handbook of Law, Regulation and Technology (2017): OUP Oxford. Google Scholar öffnen
- Eoghan Casey, Handbook of digital forensics and investigation (2010). London: Academic. Google Scholar öffnen
- V. Chang, Delivery and Adoption of Cloud Computing Services in Contemporary Organizations (2015): IGI Global. Google Scholar öffnen
- H. M. Collins, Tacit and explicit knowledge (2013). Chicago, London: The University of Chicago Press. Google Scholar öffnen
- N. Cox, Technology and Legal Systems (2016): Taylor & Francis. Google Scholar öffnen
- P. P. Craig & G. de Búrca, EU law. Text, cases, and materials (2015). Oxford, United Kingdom, New York, NY: Oxford University Press. Google Scholar öffnen
- Frank B. Cross, Theory and practice of statutory interpretation (2012). Stanford: Stanford University Press. Google Scholar öffnen
- Ulrich Dammann & Spiros Simitis, Bundesdatenschutzgesetz (2014). Baden-Baden: Nomos. Google Scholar öffnen
- Hans Delfs & Helmut Knebl, Introduction to cryptography. Principles and applications, 2007: 1 (2007). Berlin: Springer. Google Scholar öffnen
- J. Domingue, D. Fensel & J. A. Hendler, Handbook of Semantic Web Technologies (2011): Springer Berlin Heidelberg. Google Scholar öffnen
- Ronald Dworkin, Law's empire (1986). Cambridge, Mass.: Belknap Press. Google Scholar öffnen
- D. Dyzenhaus & T. Poole, Law, Liberty and State: Oakeshott, Hayek and Schmitt on the Rule of Law (2015): Cambridge University Press. Google Scholar öffnen
- H.S.P.L.C.E.L.P. Eeckhout & P.L.T. Tridimas, Yearbook of European Law 2009, v. 28 (2010): Oxford University Press, USA. Google Scholar öffnen
- Evelyn Ellis, The principle of proportionality in the laws of Europe (1999). Oxford, Portland, Or.: Hart Pub. Google Scholar öffnen
- Thomas Erl, Richardo Puttini & Zaigham Mahmood, Cloud computing. Concepts, technology, & architecture (2013). Upper Saddle River, NJ: Prentice Hall. Google Scholar öffnen
- Federico Fabbrini, Fundamental rights in Europe (2014). Oxford: Oxford University Press. Google Scholar öffnen
- Elgar Fleisch & Friedemann Mattern, Das Internet der Dinge. Ubiquitous Computing und RFID in der Praxis : Visionen, Technologien, Anwendungen, Handlungsanleitungen (2005). Berlin: Springer. Google Scholar öffnen
- M. Friedewald & R. J. Pohoryles, Privacy and Security in the Digital Age: Privacy in the Age of Super-Technologies (2016): Taylor & Francis. Google Scholar öffnen
- Brett M. Frischmann, Michael J. Madison & Katherine Jo Strandburg, Governing knowledge commons (2014). New York: Oxford University Press. Google Scholar öffnen
- Lon L. Fuller, The morality of law (1965). New Haven, Conn., London: Yale University Press. Google Scholar öffnen
- Borivoje Furht & Armando Escalante, Handbook of cloud computing (2010). New York: Springer. Google Scholar öffnen
- Peter Gola, Christoph Klug, Rudolf Schomerus & Barbara Körffer, Bundesdatenschutzgesetz. Kommentar (2010). München: C. H. Beck. Google Scholar öffnen
- Jack L. Goldsmith & Tim Wu, Who controls the Internet? Illusions of a borderless world (2008). New York, NY: Oxford University Press. Google Scholar öffnen
- Jean-Christophe Graz & Andreas Nölke, Transnational private governance and its limits, vol. 51 (2008). London, New York: Routledge. Google Scholar öffnen
- Adam Greenfield, Everyware. The dawning age of ubiquitous computing (2006). Berkeley, CA: New Riders. Google Scholar öffnen
- H. L. A. Hart, The concept of law (1998). Oxford: Clarendon Press. Google Scholar öffnen
- Friedrich A. von Hayek, The road to serfdom (2005). Princeton, N.J.: Recording for the Blind & Dyslexic. Google Scholar öffnen
- Uta Kohl, Jurisdiction and the Internet. A study of regulatory competence over online activity (2010). Cambridge: Cambridge University Press. Google Scholar öffnen
- E. Kosta, Consent in European Data Protection Law (2013): Brill. Google Scholar öffnen
- Steffen Kroschwald, Informationelle Selbstbestimmung in der Cloud. Datenschutzrechtliche Bewertung und Gestaltung des Cloud Computing aus dem Blickwinkel des Mittelstands (2016). Wiesbaden: Springer Vieweg. Google Scholar öffnen
- Christopher Kuner, Transborder Data Flows and Data Privacy Law (2013). Oxford University Press. Google Scholar öffnen
- L. Lessig, Code and other laws of cyberspace (1999): New York: Basic books. Google Scholar öffnen
- Edward H. Levi & Frederick F. Schauer, An introduction to legal reasoning (2013). Chicago: The University of Chicago Press. Google Scholar öffnen
- Ling Liu & M. Tamer Özsu, Encyclopedia of database systems (2009). New York: Springer. Google Scholar öffnen
- Andreas F. Lowenfeld, International litigation and the quest for reasonableness. Essays in private international law (1996). Oxford, New York: Clarendon Press; Oxford University Press. Google Scholar öffnen
- Christopher T. Marsden, Internet Co-Regulation. European Law, Regulatory Governance and Legitimacy in Cyberspace (2011). Cambridge: Cambridge University Press. Google Scholar öffnen
- Viktor Mayer-Schönberger & Kenneth Cukier, Big data. A revolution that will transform how we live, work, and think (2013). Boston: Houghton Mifflin Harcourt. Google Scholar öffnen
- McGraw-Hill, McGraw-Hill Dictionary of Scientific and Technical Terms (2003): McGraw-Hill. Google Scholar öffnen
- Jens Meierhenrich, Oliver Simons & Friedrich Balke, The Oxford Handbook of Carl Schmitt, vol. 1 (2015): Oxford University Press. Google Scholar öffnen
- Christopher Millard, Cloud Computing Law (2013). New York: Oxford University Press. Google Scholar öffnen
- V. Mitsilegas, European union and internal security. Guardian of the people? (2014). [Place of publication not identified]: Palgrave Macmillan. Google Scholar öffnen
- Andrew Murray, The regulation of cyberspace. Control in the online environment (2007). Milton Park, Abingdon [UK], New York, NY: Routledge-Cavendish. Google Scholar öffnen
- Nordic Council of Ministers, Information Security in Nordic Countries (1993): Nordic Council of Ministers. Google Scholar öffnen
- Christof Paar & Jan Pelzl, Understanding cryptography. A textbook for students and practitioners (2010). Berlin [u.a.]: Springer. Google Scholar öffnen
- John G. Palfrey & Urs Gasser, Born digital. Understanding the first generation of digital natives (2010). New York: BasicBooks. Google Scholar öffnen
- John G. Palfrey & Urs Gasser, Interop. The promise and perils of highly interconnected systems (2012). New York: Basic Books. Google Scholar öffnen
- Siani Pearson, Taking account of privacy when designing cloud computing services (2009): IEEE Computer Society. Google Scholar öffnen
- Siani Pearson & George Yee, Privacy and security for cloud computing (2013). London, New York: Springer. Google Scholar öffnen
- Norman Pelzl, Methodische Entwicklung von zukunftsorientierten Geschäftsmodellen im Cloud-Computing, Band 88 (2016). Lohmar: Eul Verlag. Google Scholar öffnen
- Stefan Poslad, Ubiquitous computing. Smart devices, environments and interactions (2009). Chichester, U.K.: Wiley. Google Scholar öffnen
- Hans Christian Röhl, Wissen, zur kognitiven Dimension des Rechts, vol. 9 (2010). Berlin: Duncker & Humblot. Google Scholar öffnen
- Alexander Rossnagel, Allianz von Medienrecht und Informationstechnik? Ordnung in digitalen Medien durch Gestaltung der Technik am Beispiel von Urheberschutz, Datenschutz, Jugendschutz und Vielfaltschutz; Dokumentation der Stiftungstagung (zugleich EMR-Workshop), der Alcatel SEL Stiftung für Kommunikationsforschung, des Instituts für Medienrecht (EMR), der Landeszentrale für politische Bildung (LpB) Baden-Württemberg, am 10. Mai 2001 im Landtag Baden-Württemberg, Stuttgart, Bd. 24 (2001). Baden-Baden: Nomos. Google Scholar öffnen
- Alexander Roßnagel, Datenschutz in einem informatisierten Alltag (2007). Berlin: Friedich-Ebert-Stiftung. Google Scholar öffnen
- Alexander Roßnagel, Tom Sommerlatte & Udo Winand, Digitale Visionen. Zur Gestaltung allgegenwärtiger Informationstechnologien (2008). Berlin, Heidelberg: Springer-Verlag. Google Scholar öffnen
- Andreas Schedler, Larry Jay Diamond & Marc F. Plattner, The self-restraining state. Power and accountability in new democracies (1999). Boulder, Colo.: Lynne Rienner Publishers. Google Scholar öffnen
- Gunnar Folke Schuppert & Andreas Vosskuhle, Governance von und durch Wissen, Bd. 12 (2008). Baden-Baden, Berlin: Nomos; Wissenschaftszentrum für Sozialforschung. Google Scholar öffnen
- S. Scoglio, Transforming Privacy: A Transpersonal Philosophy of Rights (1998): Praeger. Google Scholar öffnen
- V. Sharma, Information Technology Law and Practice (2011): Universal Law Publishing. Google Scholar öffnen
- Anne-Marie Slaughter, A New World Order (2009). Princeton: Princeton University Press. Google Scholar öffnen
- Christopher Slobogin, Privacy at risk. The new government surveillance and the Fourth Amendment (2007). Chicago: University of Chicago Press. Google Scholar öffnen
- S. S. Smith, Web-based Instruction: A Guide for Libraries (2006): American Library Association. Google Scholar öffnen
- E. Thomas Sullivan & Richard S. Frase, Proportionality principles in American law. Controlling excessive government actions (2009). Oxford, New York: Oxford University Press. Google Scholar öffnen
- Dan Jerker B. Svantesson, Private international law and the internet (2012). Alphen aan den Rijn, Frederick, MD: Kluwer Law International; Sold and distributed in North, Central and South America by Aspen Publishers. Google Scholar öffnen
- Peter P. Swire & Robert E. Litan, None of your business. World data flows, electronic commerce, and the European privacy directive (1998). Washington, D.C.: Brookings Institution Press. Google Scholar öffnen
- D. Tambini, D. Leonardi & C. T. Marsden, Codifying Cyberspace: Communications Self-regulation in the Age of Internet Convergence (2008): Routledge. Google Scholar öffnen
- Georgios Tselentis, Towards the future internet. Emerging trends from European research (2010). Amsterdam: IOS Press. Google Scholar öffnen
- Mariana Valverde, Law's Dream of a Common Knowledge (2009). Princeton: Princeton University Press. Google Scholar öffnen
- Ian Watson, The universal machine. From the dawn of computing to digital consciousness (2012). New York: Copernicus Books. Google Scholar öffnen
- Bill Williams, The economics of cloud computing (2012). Indianapolis, Ind.: Cisco Press. Google Scholar öffnen
- Hongji Yang & Xiaodong Liu, Software reuse in the emerging cloud computing era (2012). Hershey, PA: Information Science Reference. Google Scholar öffnen
- Liang-Jie Zhang & Qun Zhou, CCOA: Cloud Computing Open Architecture (2009): IEEE. Google Scholar öffnen
- K. S. Ziegler, Human Rights and Private Law: Privacy as Autonomy (2007): Bloomsbury Publishing. Google Scholar öffnen
- Tomasz Zurek & Michał Araszkiewicz, Modeling teleological interpretation (2013): ACM. Google Scholar öffnen
- Books, Edited Google Scholar öffnen
- Michael Backes & Peng Ning eds., Computer security – ESORICS 2009. 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009: proceedings, vol. 5789 (2009). Berlin [etc.]: SpringerLink. Google Scholar öffnen
- Giorgio Bongiovanni, Giovanni Sartor & Chiara Valentini eds., Reasonableness and Law, vol. 86 (2009). Dordrecht: Springer Netherlands. Google Scholar öffnen
- Martin Gilje Jaatun, Gansen Zhao & Chunming Rong eds., Cloud computing. First international conference, CloudCom 2009, Beijing, China, December 1-4, 2009: proceedings, vol. 5931 (2009). Berlin, New York: Springer. Google Scholar öffnen
- Helmut Krcmar, Jan Marco Leimeister, Alexander Roßnagel & Ali Sunyaev eds., Cloud-Services aus der Geschäftsperspektive (2016). Wiesbaden: Gabler. Google Scholar öffnen
- Steffen Kroschwald ed., Informationelle Selbstbestimmung in der Cloud. Datenschutzrechtliche Bewertung und Gestaltung des Cloud Computing aus dem Blickwinkel des Mittelstands (2016). Wiesbaden: Springer Vieweg. Google Scholar öffnen
- Gerald Münzl, Michael Pauly & Martin Reti eds., Cloud Computing als neue Herausforderung für Management und IT (2015). Berlin [Germany], Heidelberg [Germany]: Springer-Verlag. Google Scholar öffnen
- Alexander Roßnagel ed., Datenschutzaufsicht nach der EU-Datenschutz-Grundverordnung. Neue Aufgaben und Befugnisse der Aufsichtsbehörden (2017). Wiesbaden: Springer Fachmedien Wiesbaden. Google Scholar öffnen
- Marcel Schweiker, Joachim Hass, Anna Novokhatko & Roxana Halbleib eds., Messen und Verstehen in der Wissenschaft. Interdisziplinäre Ansätze (2017). Wiesbaden: Springer Fachmedien Wiesbaden. Google Scholar öffnen
- John R. Vacca ed., Security in the private cloud (2017). Boca Raton: Taylor & Francis, a CRC title, part of the Taylor & Francis imprint, a member of the Taylor & Francis Group, the academic division of T&F Informa, plc. Google Scholar öffnen
- Birgit Vogel-Heuser, Thomas Bauernhansl & Michael ten Hompel eds., Handbuch Industrie 4.0 Bd.4 (2017). Berlin, Heidelberg: Springer Berlin Heidelberg. Google Scholar öffnen
- Conference Proceedings Google Scholar öffnen
- 2008 Grid Computing Environments Workshop. Google Scholar öffnen
- 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing. Google Scholar öffnen
- 2012 IEEE 4th International Conference on Cloud Computing Technology and Science (CloudCom). Google Scholar öffnen
- IEEE INFOCOM 2010 – IEEE Conference on Computer Communications. Google Scholar öffnen
- International Workshop on Computational Autonomy (2003): Springer Berlin Heidelberg. Google Scholar öffnen
- 2012 International Conference on Computer Science and Electronics Engineering (2012): IEEE. Google Scholar öffnen
- 2012 International Conference on Computing, Electronics and Electrical Technologies (ICCEET) (2012): IEEE. Google Scholar öffnen
- ACM ed., Controlling data in the cloud: outsourcing computation without outsourcing control (2009): ACM. Google Scholar öffnen
- Jameela Al-Jaroodi & Shahram Latifi eds., ITNG 2010. Information Technology New Generations: proceedings of the Seventh International Conference on Information Technology :12-14, April 2009, Las Vegas, Nevada, USA (2010). Los Alamitos, Calif., Piscataway, N.J.: IEEE Computer Society; IEEE. Google Scholar öffnen
- Solon Barocas & Helen Nissenbaum eds., On Notice: The Trouble with Notice and Consent (2009). Google Scholar öffnen
- Elizabeth Chang ed., 24th IEEE International Conference on Advanced Information Networking and Applications (AINA), 2010. 20 – 23 April 2010, Perth, Australia; proceedings (2010). Piscataway, NJ, Piscataway, NJ: IEEE. Google Scholar öffnen
- IEEE ed., An audit logic for accountability (2005): IEEE. Google Scholar öffnen
- IEEE ed., 2010 19th IEEE International Workshop on Enabling Technologies. Infrastructures for Collaborative Enterprises (2010). [Place of publication not identified]: IEEE. Google Scholar öffnen
- KIIT University ed., 2015 International Conference on Computational Intelligence & Networks (CINE). Google Scholar öffnen
- Paulo Mendes ed., Proceedings of the 1st ACM workshop on User-provided networking challenges and opportunities (2009). New York, NY: ACM. Google Scholar öffnen
- Sascha Ossowski ed., Proceedings of the 31st Annual ACM Symposium on Applied Computing (2016). New York, NY: ACM. Google Scholar öffnen
- Alexander Roßnagel ed., Wolken über dem Rechtsstaat? Recht und Technik des Cloud Computing in Verwaltung und Wirtschaft, vol. 33 (2015). Baden-Baden: Nomos. Google Scholar öffnen
- IEEE Staff ed., 2011 IEEE International Conference on Services Computing (2011). [Place of publication not identified]: IEEE. Google Scholar öffnen
- Adrian Vermeule ed., Local and Global Knowledge in the Administrative State (2013). Google Scholar öffnen
- Gabriela Zanfir ed., What Happens in the Cloud Stays in the Cloud, or Why the Cloud's Architecture Should Be Transformed in 'Virtual Territorial Scope' (2013). Google Scholar öffnen
- Liang-Jie Zhang ed., World Conference on Services-I, 2009 (2009). Piscataway, NJ: IEEE. Google Scholar öffnen
- Contribution in Legal Commentary Google Scholar öffnen
- Daniel Halberstam, Constitutionalism and Pluralism in Marbury and Van Gend, in: U of Michigan Public Law Working Paper (2008). Google Scholar öffnen
- Contributions Google Scholar öffnen
- Bu-Qing Cao, Bing Li & Qi-Ming Xia, A Service-Oriented Qos-Assured and Multi-Agent Cloud Computing Architecture, in Cloud computing. First international conference, CloudCom 2009, Beijing, China, December 1-4, 2009: proceedings, 644–649 (Martin Gilje Jaatun, Gansen Zhao & Chunming Rong eds., 2009). Google Scholar öffnen
- Deyan Chen & Hong Zhao, Data Security and Privacy Protection Issues in Cloud Computing, in 2012 International Conference on Computer Science and Electronics Engineering, 647–651 (2012). Google Scholar öffnen
- Guilherme Da Cunha Rodrigues, Rodrigo N. Calheiros, Vinicius Tavares Guimaraes, Glederson Lessa dos Santos, Márcio Barbosa de Carvalho, Lisandro Zambenedetti Granville, Liane Margarida Rockenbach Tarouco & Rajkumar Buyya, Monitoring of cloud computing environments, in Proceedings of the 31st Annual ACM Symposium on Applied Computing, 378–383 (Sascha Ossowski ed., 2016). Google Scholar öffnen
- Tharam Dillon, Chen Wu & Elizabeth Chang, Cloud Computing: Issues and Challenges, in 24th IEEE International Conference on Advanced Information Networking and Applications (AINA), 2010. 20 – 23 April 2010, Perth, Australia; proceedings, 27–33 (Elizabeth Chang ed., 2010). Google Scholar öffnen
- Luciana Duranti, Adam Jansen, Giovanni Michetti, Mumma Courtney, Daryll Prescott, Corinne Rogers & Thibodeau Kenneth, Preservation as a Service for Trust, in Security in the private cloud, 47–72 (John R. Vacca ed., 2017). Google Scholar öffnen
- Niels Fallenbeck & Claudia Eckert, IT-Sicherheit und Cloud Computing, in Handbuch Industrie 4.0 Bd.4, 137–171 (Birgit Vogel-Heuser, Thomas Bauernhansl & Michael ten Hompel eds., 2017). Google Scholar öffnen
- Marc Fouquet, Heiko Niedermayer & Georg Carle, Cloud computing for the masses, in Proceedings of the 1st ACM workshop on User-provided networking challenges and opportunities, 31 (Paulo Mendes ed., 2009). Google Scholar öffnen
- Ines Houidi, Marouen Mechtri, Wajdi Louati & Djamal Zeghlache, Cloud Service Delivery across Multiple Cloud Platforms, in 2011 IEEE International Conference on Services Computing, 741–742 (IEEE Staff ed., 2011). Google Scholar öffnen
- Yashpalsinh Jadeja & Kirit Modi, Cloud computing – concepts, architecture and challenges, in 2012 International Conference on Computing, Electronics and Electrical Technologies (ICCEET), 877–880 (2012). Google Scholar öffnen
- S. Jandt, S. Kroschwald, A. Roβnagel & M. Wicker, Datenschutzkonformes Cloud-Computing, in Cloud-Services aus der Geschäftsperspektive, 207–266 (Helmut Krcmar, Jan Marco Leimeister, Alexander Roßnagel & Ali Sunyaev eds., 2016). Google Scholar öffnen
- Xiaolong Jin & Jiming Liu, From Individual Based Modeling to Autonomy Oriented Computation, in International Workshop on Computational Autonomy, 151–169 (2003). Google Scholar öffnen
- Andrea de Mauro, Marco Greco & Michele Grimaldi, What is big data? A consensual definition and a review of key research topics, in AIP Conference Proceedings, Volume 1644, Issue 1, 97–104 (2015). Google Scholar öffnen
- Fruzsina Molnár-Gábor & Jan O. Korbel, Regulierung neuer Herausforderungen in den Naturwissenschaften – Datenschutz und Datenaustausch in der translationalen genetischen Forschung, in Messen und Verstehen in der Wissenschaft. Interdisziplinäre Ansätze, 151–171 (Marcel Schweiker, Joachim Hass, Anna Novokhatko & Roxana Halbleib eds., 2017). Google Scholar öffnen
- Siani Pearson & Andrew Charlesworth, Accountability as a Way Forward for Privacy Protection in the Cloud, in Cloud computing. First international conference, CloudCom 2009, Beijing, China, December 1-4, 2009: proceedings, 131–144 (Martin Gilje Jaatun, Gansen Zhao & Chunming Rong eds., 2009). Google Scholar öffnen
- Siani Pearson, Vasilis Tountopoulos, Daniele Catteddu, Mario Sudholt, Refik Molva, Christoph Reich, Simone Fischer-Hubner, Christopher Millard, Volkmar Lotz, Martin Gilje Jaatun, Ronald Leenes, Chunming Rong & Javier Lopez, Accountability for cloud and other future Internet services, in 2012 IEEE 4th International Conference on Cloud Computing Technology and Science (CloudCom), 629–632. Google Scholar öffnen
- Deepak Puthal, B.P.S. Sahoo, Sambit Mishra & Satyabrata Swain, Cloud Computing Features, Issues, and Challenges: A Big Picture, in 2015 International Conference on Computational Intelligence & Networks (CINE), 116–123 (KIIT University ed.). Google Scholar öffnen
- Alexander Roßnagel, Datenschutzfragen des Cloud Computing, in Wolken über dem Rechtsstaat? Recht und Technik des Cloud Computing in Verwaltung und Wirtschaft, 19–52 (Alexander Roßnagel ed., 2015). Google Scholar öffnen
- Vijay Sarathy, Purnendu Narayan & Rao Mikkilineni, Next Generation Cloud Computing Architecture: Enabling Real-Time Dynamism for Shared Distributed Physical Infrastructure, in 2010 19th IEEE International Workshop on Enabling Technologies. Infrastructures for Collaborative Enterprises, 48–53 (IEEE ed., 2010). Google Scholar öffnen
- Wei-Tek Tsai, Xin Sun & Janaka Balasooriya, Service-Oriented Cloud Computing Architecture, in ITNG 2010. Information Technology New Generations: proceedings of the Seventh International Conference on Information Technology :12-14, April 2009, Las Vegas, Nevada, USA, 684–689 (Jameela Al-Jaroodi & Shahram Latifi eds., 2010). Google Scholar öffnen
- Cong Wang, Qian Wang, Kui Ren & Wenjing Lou, Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing, in IEEE INFOCOM 2010 – IEEE Conference on Computer Communications, 1–9. Google Scholar öffnen
- Kaiqi Xiong & Harry Perros, Service Performance and Analysis in Cloud Computing, in World Conference on Services-I, 2009, 693–700 (Liang-Jie Zhang ed., 2009). Google Scholar öffnen
- Lamia Youseff, Maria Butrico & Dilma Da Silva, Toward a Unified Ontology of Cloud Computing, in 2008 Grid Computing Environments Workshop, 1–10. Google Scholar öffnen
- Cheng Zeng, Xiao Guo, Weijie Ou & Dong Han, Cloud Computing Service Composition and Search Based on Semantic, in Cloud computing. First international conference, CloudCom 2009, Beijing, China, December 1-4, 2009: proceedings, 290–300 (Martin Gilje Jaatun, Gansen Zhao & Chunming Rong eds., 2009). Google Scholar öffnen
- Internet Documents Google Scholar öffnen
- M. Arif, A history of cloud computing, available at: http://www.computerweekly.com/feature/A-history-of-cloud-computing (18 February 2015). Google Scholar öffnen
- M. Armbrust, A. Fox, R. Griffith, A. Joseph D., R. Katz H., A. Konwinski, G. Lee, D. Patterson A., A. Rabkin, A. Stoica & M. Zaharia, Above the Clouds: A Berkeley View of Cloud Computing, available at: http://www.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS-2009-28.html (2 March 2015). Google Scholar öffnen
- Article 29 Working Party, Working document on determining the international application of EU data protection law to personal data processing on the Internet by non-EU based websites, available at: http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/index_en.htm. Google Scholar öffnen
- Article 29 Working Party, Opinion 3/2009 on the Draft Commission Decision on standard contractual clauses for the transfer of personal data to processors established in third countries, under Directive 95/46/EC (data controller to data processor), available at: http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/index_en.htm. Google Scholar öffnen
- Article 29 Working Party, Opinion 03/2013 on purpose limitation, available at: http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/index_en.htm (3 February 2015). Google Scholar öffnen
- Ozalp Babaoglu, M. Jelasity, Anne Marie Kermarrec, Alberto Montresor & Maarten van Steen, Operating Systems Review (ACM), available at: http://dl.acm.org/citation.cfm?doid=1151374.1151379. Google Scholar öffnen
- Francesca Bosco, Assessing Europe’s cyber challenges, available at: http://policyreview.info/articles/news/assessing-europes-cyber-challenges/355 (4 July 2016). Google Scholar öffnen
- Tobias Bräutigam, The Land of Confusion. International Data Transfers between Schrems and the GDPR. Google Scholar öffnen
- A. Cavoukian, Privacy by Design; The 7 Foundational Principles, available at: https://www.ipc.on.ca/wp-content/uploads/Resources/7foundationalprinciples.pdf. Google Scholar öffnen
- Centre for Information Policy Leadership, Data Protection Accountability: The Essential Elements A Document for Discussion, available at: http://www.huntonfiles.com/files/webupload/CIPL_Galway_Accountability_Paper.pdf (19 March 2015). Google Scholar öffnen
- European Commission, Unleashing the Potential of Cloud Computing in Europe, available at: http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=COM:2012:0529:FIN:EN:PDF (20 November 2014). Google Scholar öffnen
- Robert Gellman, Privacy in the Clouds: Risks to Privacy and Confidentiality from Cloud Computing, available at: https://www.worldprivacyforum.org/2011/11/resource-page-cloud-privacy/ (20 April 2015). Google Scholar öffnen
- Chris Hoofnagle, COMPARATIVE STUDY ON DIFFERENT APPROACHES TO NEW PRIVACY CHALLENGES, IN PARTICULAR IN THE LIGHT OF TECHNOLOGICAL DEVELOPMENTS. B.1 – UNITED STATES OF AMERICA, available at: http://ec.europa.eu/justice/policies/privacy/docs/studies/new_privacy_challenges/final_report_country_report_B1_usa.pdf (2 May 2016). Google Scholar öffnen
- Hunton Privacy Blog, Article 29 Working Party Clarifies Purpose Limitation Principle; Opines on Big and Open Data, available at: https://www.huntonprivacyblog.com/2013/04/09/article-29-working-party-clarifies-purpose-limitation-principle-opines-on-big-and-open-data/ (5 November 2015). Google Scholar öffnen
- International Working Group on Data Protection in Telecommunications, Working Paper on Cloud Computing – Privacy and data protection issues. “Sopot Memorandum”, available at: http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/index_en.htm#h2-3 (3 February 2015). Google Scholar öffnen
- Xenofon Kontargyris, From effective to efficient regulation of ICT (2): the big leap towards embracing vertical, apart from horizontal, interdisciplinarity, available at: http://www.juwiss.de/88-2016/ (13 September 2017). Google Scholar öffnen
- Xenofon Kontargyris, From effective to efficient regulation of ICT: time to build the backbone of information technology legislation, available at: http://www.juwiss.de/66-2016/. Google Scholar öffnen
- D. Linthicum, MSDN Documentation. Service Oriented Architecture (SOA), available at: https://msdn.microsoft.com/en-us/library/bb833022.aspx (4 November 2015). Google Scholar öffnen
- J. Locke, The Roots of Cloud Computing, available at: http://www.servercloudcanada.com/2013/10/the-roots-of-cloud-computing/ (11 January 2017). Google Scholar öffnen
- McAlpine C., Weigh Legal Risks of Cloud Computing, available at: http://www.baselinemag.com/c/a/Legal/Weigh-Legal-Risks-of-Cloud-Computing-869422 (19 February 2016). Google Scholar öffnen
- Peter Mell & Timothy Grance, The NIST Definition of Cloud Computing. Recommendations of the National Institute of Standards and Technology, available at: http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf (4 November 2015). Google Scholar öffnen
- National Telecommunications & Information Administration (NTIA), PRIVACY AND SELF-REGULATION IN THE INFORMATION AGE, available at: https://www.ntia.doc.gov/report/1997/privacy-and-self-regulation-information-age (4 May 2016). Google Scholar öffnen
- R. Peeva, File Hosting vs. Cloud Computing, available at: http://www.websitepulse.com/blog/file-hosting-vs-cloud-computing (4 November 2015). Google Scholar öffnen
- Antonio Regalado, Who Coined 'Cloud Computing'?, available at: https://www.technologyreview.com/s/425970/who-coined-cloud-computing/ (11 January 2017). Google Scholar öffnen
- Reidenberg, J. R., Schwartz, P. M., Data Protection Law and On-line Services: Regulatory Responses. Google Scholar öffnen
- Reilly, D., Wren, C., & Berry, T., Cloud computing: Forensic challenges for law enforcement. In Internet Technology and Secured Transactions (ICITST). Google Scholar öffnen
- Neil Robinson, Hans Graux, Maarten Botterman & Lorenzo Valeri, RAND Europe: Review of the European Data Protection Directive, available at: http://www.rand.org/pubs/technical_reports/TR710.html (13 February 2015). Google Scholar öffnen
- Paul M. Schwartz, Legal Access to Cloud Information. Data Shards, Data Localization, and Data Trusts. Google Scholar öffnen
- Jonathan Stuart Ward & Adam Barker, Undefined By Data. A Survey of Big Data Definitions, available at: http://arxiv.org/pdf/1309.5821. Google Scholar öffnen
- Journal Articles Google Scholar öffnen
- Divyakant Agrawal, Philip Bernstein, Elisa Bertino, Susan Davidson, Umeshwas Dayal, Michael Franklin, Johannes Gehrke, Laura Haas, Alon Halevy, Jiawei Han, H. V. Jagadish, Alexandros Labrinidis, Sam Madden, Yannis Papakonstantinou, Jignesh Patel, Raghu Ramakrishnan, Kenneth Ross, Cyrus Shahabi, Dan Suciu, Shiv Vaithyanathan & Jennifer Widom, Challenges and Opportunities with Big Data 2011-1 Cyber Center Technical Reports (2011). Google Scholar öffnen
- Divyakant Agrawal, Sudipto Das & Amr El Abbadi, Big data and cloud computing. Current state and future opportunities 530–533 (2011). Google Scholar öffnen
- Robert B. Ahdieh, The Visible Hand: Coordination Functions of the Regulatory State, 09 Emory University School of Law, Public Law and Legal Theory Research Paper Series 578–649 (2009). Google Scholar öffnen
- Michael Akehurst, Jurisdiction in International Law, 46 Brit. Y. B. Int'l L. 145–258 (1972). Google Scholar öffnen
- Robert Alexy, On the Structure of Legal Principles, 13 Ratio Juris 294–304 (2000). Google Scholar öffnen
- Ricardo Alonso, Wouter Dessein & Niko Matouschek, When Does Coordination Require Centralization?, 98 American Economic Review 145–179 (2008). Google Scholar öffnen
- Alfred Aman, A Global Perspective on Current Regulatory Reform: Rejection, Relocation, or Reinvention?, 2 2 Indiana Journal of Global Legal Studies 429 (1995) 429–464 (1995). Google Scholar öffnen
- Mauro Andreolini, Michele Colajanni, Marcello Pietri & Stefania Tosi, Adaptive, scalable and reliable monitoring of big data on clouds, 79-80 Journal of Parallel and Distributed Computing 67–79 (2015). Google Scholar öffnen
- Damon C. Andrews & John M. Newman, Personal Jurisdiction and Choice of Law in the Cloud, 73 Md. L. Rev. 313–388 (2013). Google Scholar öffnen
- Stephanos Androutsellis-Theotokis & Diomidis Spinellis, A survey of peer-to-peer content distribution technologies, 36 ACM Comput. Surv. 335–371 (2004). Google Scholar öffnen
- Kevin D. Ashley & Edwina L. Rissland, Law, learning and representation, 150 Artificial Intelligence 17–58 (2003). Google Scholar öffnen
- Marcos D. Assunção, Rodrigo N. Calheiros, Silvia Bianchi, Marco A.S. Netto & Rajkumar Buyya, Big Data computing and clouds. Trends and future directions, 79-80 Journal of Parallel and Distributed Computing 3–15 (2015). Google Scholar öffnen
- Nicholas Bagley & Richard L. Revesz, Centralized Oversight of the Regulatory State, 106 Columbia Law Review 1260–1330 (2006). Google Scholar öffnen
- Kenneth A. Bamberger & Deirdre K. Mulligan, Privacy on the Books and on the Ground, 63 Stanford Law Review 247–316 (2011). Google Scholar öffnen
- Merve Bayramusta & V. Aslihan Nasir, A fad or future of IT? A comprehensive literature review on the cloud computing research, 36 International Journal of Information Management 635–644 (2016). Google Scholar öffnen
- Patricia L. Bellia, Federalization in Information Privacy Law, 118 Yale Law Journal 868–890 (2009). Google Scholar öffnen
- Trevor Bench-Capon & Giovanni Sartor, A model of legal reasoning with cases incorporating theories and values. AI and Law, 150 Artificial Intelligence 97–143 (2003). Google Scholar öffnen
- Y. Benkler, Internet regulation: a case study in the problem of unilateralism, 11 European Journal of International Law 171–185 (2000). Google Scholar öffnen
- Paul Schiff Berman, Cyberspace and the State Action Debate: The Cultural Value of Applying Constitutional Norms to 'Private' Regulation, 71 University of Colorado Law Review 1263–1310 (2000). Google Scholar öffnen
- Paul Schiff Berman, Global Legal Pluralism, 80 S. Cal. L. Rev. 1155–1238 (2006). Google Scholar öffnen
- Paul Schiff Berman, The New Legal Pluralism, 5 Annual Review of Law and Social Science 225–242 (2009). Google Scholar öffnen
- J. Bing, Data Protection, jurisdiction and the choice of law Privacy Laws & Policy Reporter 92–98 (1999). Google Scholar öffnen
- Julia Black, Constructing and contesting legitimacy and accountability in polycentric regulatory regimes, 2 Regulation & Governance 137–164 (2008). Google Scholar öffnen
- D. Scott Blake, Let’s Be Reasonable: Fourth Amendment Principles in the Digital Age, 5 SEVENTH CIRCUIT REV. 491–531 (2010). Google Scholar öffnen
- P. Blume, Transborder data flow: is there a solution in sight?, 8 International Journal of Law and Information Technology 65–86 (2000). Google Scholar öffnen
- Martin Boodman, The Myth of Harmonization of Laws, 39 The American Journal of Comparative Law 699–724 (1991). Google Scholar öffnen
- Scott Brewer, Exemplary Reasoning. Semantics, Pragmatics, and the Rational Force of Legal Argument by Analogy, 109 Harvard Law Review 923–1028 (1996). Google Scholar öffnen
- Grainne de Burca, The EU, the European Court of Justice and the International Legal Order after Kadi. Harvard International Law Journal, 1 Fordham Law Legal Studies Research 1–51 (2009). Google Scholar öffnen
- Rajkumar Buyya, Chee Shin Yeo, Srikumar Venugopal, James Broberg & Ivona Brandic, Cloud computing and emerging IT platforms. Vision, hype, and reality for delivering computing as the 5th utility, 25 Future Generation Computer Systems 599–616 (2009). Google Scholar öffnen
- L. A. Bygrave, Privacy protection in a global context–a comparative overview, 47 Scandinavian Studies in Law 319–348 (2004). Google Scholar öffnen
- Lee A. Bygrave, Aytomated Profiling, 17 Computer Law & Security Review 17–24 (2001). Google Scholar öffnen
- Eve M. Caudill & Patrick E. Murphy, Consumer Online Privacy. Legal and Ethical Issues, 19 Journal of Public Policy & Marketing 7–19 (2000). Google Scholar öffnen
- Everton Cavalcante, Jorge Pereira, Marcelo Pitanga Alves, Pedro Maia, Roniceli Moura, Thais Batista, Flavia C. Delicato & Paulo F. Pires, On the interplay of Internet of Things and Cloud Computing. A systematic mapping study, 89-90 Computer Communications 17–33 (2016). Google Scholar öffnen
- Anupam Chander & Uyen P. Le, Breaking the Web. Data Localization vs. the Global Internet Emory Law Journal, Forthcoming 53 (2014). Google Scholar öffnen
- Andrew Charlesworth, Clash of the Data Titans? US and EU Data Privacy Regulation, 6 European Public Law 253–274 (2000). Google Scholar öffnen
- Jiahong Chen, How the best-laid plans go awry. The (unsolved) issues of applicable law in the General Data Protection Regulation, 6 International Data Privacy Law 310–323 (2017). Google Scholar öffnen
- Fa-Chang Cheng & Wen-Hsing Lai, The Impact of Cloud Computing Technology on Legal Infrastructure within Internet—Focusing on the Protection of Information Privacy, 29 2012 International Workshop on Information and Electronics Engineering 241–251 (2012). Google Scholar öffnen
- Annalisa Ciampi, The Potentially Competing Jurisdiction of the European Court of Human Rights and the European Court of Justice, 28 Yearbook of European Law 601–609 (2009). Google Scholar öffnen
- David Cole & Federico Fabbrini, Bridging the Transatlantic Divide? The United States, the European Union, and the Protection of Privacy Across Borders. iCourts Working Paper Series, No. 33, 2015 International Journal of Constitutional Law (2015). Google Scholar öffnen
- David Couillard, Defogging the Cloud: Applying Fourth Amendment Principles to Evolving Privacy Expectations in Cloud Computing, 93 Minnesota Law Review 2205–2239 (2009). Google Scholar öffnen
- Frank B. Cross, Law and trust, 93 The Georgetown Law Journal 1457–1545 (2005). Google Scholar öffnen
- Dara Hallinan, Michael Friedewald, Paul McCarthy, Citizens’ Perceptions of Data Protection and Privacy in Europe, 28 Computer Law and Security Review 263–272 (2012). Google Scholar öffnen
- Jennifer C. Daskal, The Un-Territoriality of Data, 125 Yale Law Journal 326–398 (2015). Google Scholar öffnen
- Primavera De Filippi, Primavera De Filippi & Luca Belli, Law of the Cloud v Law of the Land: Challenges and Opportunities for Innovation, 3 European Journal of Law and Technology 156–173 (2012). Google Scholar öffnen
- Lothar Determann, What Happens in the Cloud: Software as a Service and Copyrights, 29 Berkeley Technology Law Journal 1096–1129 (2015). Google Scholar öffnen
- Dias, Renata Dalle Molle Araujo, The Potential Impact of the EU General Data Protection Regulation on Pharmacogenomics Research, 36 Med. & L. 43–58 (2017). Google Scholar öffnen
- Hoang T. Dinh, Chonho Lee, Dusit Niyato & Ping Wang, A survey of mobile cloud computing. Architecture, applications, and approaches, 13 Wirel. Commun. Mob. Comput. 1587–1611 (2013). Google Scholar öffnen
- Colin S. Diver, Statutory Interpretation in the Administrative State, 133 University of Pennsylvania law review 549–599 (1985). Google Scholar öffnen
- Benoit Dupont, Cybersecurity Futures: How Can We Regulate Emergent Risks? Technology Innovation Management Review 6–11 (2013). Google Scholar öffnen
- Baudouin. Dupret, Legal pluralism, plurality of laws, and legal practices, 1 European Journal of Legal Studies (2007). Google Scholar öffnen
- Luciana Duranti & Corinne Rogers, Trust in digital records. An increasingly cloudy legal area, 28 Computer Law & Security Review 522–531 (2012). Google Scholar öffnen
- Clarence A. Dykstra, The Quest for Responsibility, 33 The American Political Science Review 1–25 (1939). Google Scholar öffnen
- M. J. Eger, Emerging Restrictions on Transnational Data Flows: Privacy Protection or Non-Tariff Trade Barriers, 10 Law & Pol 1055–1105 (1978). Google Scholar öffnen
- William N. Eskridge & Philip P. Frickey, Statutory Interpretation as Practical Reasoning, 42 Stanford Law Review 321–384 (1990). Google Scholar öffnen
- John A. Ferejohn & Barry R. Weingast, A positive theory of statutory interpretation, 12 International Review of Law and Economics 263–279 (1992). Google Scholar öffnen
- Ian Foster, Yong Zhao, Ioan Raicu & Shiyong Lu, Cloud Computing and Grid Computing 360-Degree Compared,” IEEE Grid Computing Environments (GCE08) 2008, co-located with IEEE/ACM Supercomputing 2008 2012 ACM/IEEE 13TH INTERNATIONAL CONFERENCE ON GRID COMPUTING 1–10. Google Scholar öffnen
- Susan Freiwald & Patricia Bellia, The Fourth Amendment Status of Stored E-mail: The Law Professors' Brief in Warshak v. United States Journal Articles 559–588 (2007). Google Scholar öffnen
- A. Froomkin, Of Governments and Governance, 14 Berkeley Technology Law Journal 618–633 (1999). Google Scholar öffnen
- Lon L. Fuller, Positivism and Fidelity to Law. A Reply to Professor Hart, 71 Harvard Law Review 630–672 (1958). Google Scholar öffnen
- Amir Gandomi & Murtaza Haider, Beyond the hype. Big data concepts, methods, and analytics, 35 International Journal of Information Management 137–144 (2015). Google Scholar öffnen
- Ruth Gavison, Privacy and the Limits of Law, 89 The Yale Law Journal 421–471 (1980). Google Scholar öffnen
- Wesley Gee, Internet Tracking: Stalking or a Necessary Tool for Keeping the Internet Free, 20 CommLaw Conspectus 223–252 (2011). Google Scholar öffnen
- Tom Geller, In privacy law, it's the U.S. vs. the world, 59 Commun. ACM 21–23 (2016). Google Scholar öffnen
- M. Gillen, Internet Co-Regulation: European Law, Regulatory Governance and Legitimacy in Cyberspace, 20 International Journal of Law and Information Technology 147–149 (2012). Google Scholar öffnen
- J. Goldring, Globalisation, National Sovereignty and the Harmonisation of Laws, 3 Uniform Law Review – Revue de droit uniforme 435–451 (1998). Google Scholar öffnen
- Graham Greenleaf, Global Data Privacy Laws: Forty Years of Acceleration. UNSW Law Research Paper No. 2011-36 Privacy Laws and Business International Report 11–17 (2011). Google Scholar öffnen
- Graham Greenleaf, The Influence of European Data Privacy Standards Outside Europe: Implications for Globalisation of Convention 108, 2 International Data Privacy Law 68–92 (2012). Google Scholar öffnen
- John Griffiths, What is Legal Pluralism?, 18 The Journal of Legal Pluralism and Unofficial Law 1–55 (1986). Google Scholar öffnen
- Dieter Grimm, Proportionality in Canadian and German Constitutional Jurisprudence, 57 University of Toronto Law Journal 383–397 (2007). Google Scholar öffnen
- Neil Gunningham & Joseph Rees, Industry Self‐Regulation: An Institutional Perspective, 19 Law & Policy 363–414 (1997). Google Scholar öffnen
- Marit Hansen, Datenschutz nach dem Summer of Snowden, 38 Datenschutz Datensich 439–444 (2014). Google Scholar öffnen
- Tor-Inge Harbo, The Function of the Proportionality Principle in EU Law, 16 European Law Journal 158–185 (2010). Google Scholar öffnen
- Carol Harlow, Global Administrative Law: The Quest for Principles and Values, 17 Eur J Int Law 187–214 (2006). Google Scholar öffnen
- Ibrahim Abaker Targio Hashem, Ibrar Yaqoob, Nor Badrul Anuar, Salimah Mokhtar, Abdullah Gani & Samee Ullah Khan, The rise of “big data” on cloud computing. Review and open research issues, 47 Information Systems 98–115 (2015). Google Scholar öffnen
- Friedrich A. von Hayek, The Use of Knowledge in Society, 35 The American Economic Review 519–530 (1945). Google Scholar öffnen
- Alden Heintz, The Dangers of Regulation, 29 J Communication 129–134 (1979). Google Scholar öffnen
- Paul de Hert & Vagelis Papakonstantinou, The new General Data Protection Regulation. Still a sound system for the protection of individuals?, 32 Computer Law & Security Review 179–194 (2016). Google Scholar öffnen
- Mireille Hildebrandt, Profiling and the rule of law, 1 IDIS 55–70 (2008). Google Scholar öffnen
- Dennis D. Hirsch, In Search of the Holy Grail: Achieving Global Privacy Rules Through Sector-Based Codes of Conduct, 74 Ohio State Law Journal 1030–1069 (2013). Google Scholar öffnen
- D. Hofman, Duranti L. & E. How, Trust in the Balance. Data Protection Laws as Tools for Privacy and Security in the Cloud, 10 Algorithms 47 (2017). Google Scholar öffnen
- W. K. Hon, C. Millard & I. Walden, The problem of 'personal data' in cloud computing: what information is regulated? -The cloud of unknowing, 1 International Data Privacy Law 211–228 (2011). Google Scholar öffnen
- W. K. Hon, C. Millard & I. Walden, Who is responsible for 'personal data' in cloud computing? --The cloud of unknowing, Part 2, 2 International Data Privacy Law 3–18 (2012). Google Scholar öffnen
- W. Kuan Hon, Julia Hörnle & Christopher Millard, Data Protection Jurisdiction and Cloud Computing. When are Cloud Users and Providers Subject to EU Data Protection Law? The Cloud of Unknowing, Part 3, 26 International Review of Law, Computers & Technology (2012). Google Scholar öffnen
- W. Kuan Hon & Christopher Millard, Data Export in Cloud Computing. How Can Personal Data Be Transferred Outside the EEA? The Cloud of Unknowing, Part 4, 9 SCRIPT-ed (2011). Google Scholar öffnen
- W. Kuan Hon, Christopher Millard & Ian Walden, The Problem of 'Personal Data' in Cloud Computing – What Information is Regulated? The Cloud of Unknowing, Part 1, 1 International Data Privacy Law 211–228 (2011). Google Scholar öffnen
- J. Hoover, Compliance in the Ether: Cloud Computing, Data Security and Business Regulation, 8 Journal of Business & Technology Law 255–273 (2013). Google Scholar öffnen
- Gerrit Hornung, Regulating privacy enhancing technologies: seizing the opportunity of the future European Data Protection Framework, 26 Innovation: The European Journal of Social Science Research 181–196 (2013). Google Scholar öffnen
- Peter Hustinx, Privacy by design. Delivering the promises, 3 IDIS 253–255 (2010). Google Scholar öffnen
- Kristina Irion, Government Cloud Computing and the Policies of Data Sovereignty, 4 Policy and Internet 40–71 (2012). Google Scholar öffnen
- Paul T. Jaeger, Jimmy Lin & Justin M. Grimes, Cloud Computing and Information Policy: Computing in a Policy Cloud?, 5 Journal of Information Technology & Politics 269–283 (2008). Google Scholar öffnen
- Paul T. Jaeger, Jimmy Lin, Justin M. Grimes & Shannon N. Simmons, Where is the cloud? Geography, economics, environment, and jurisdiction in cloud computing, 14 First Monday (2009). Google Scholar öffnen
- David R. Johnson, Susan P. Crawford & John G. Palfrey, The accountable net: Peer production of internet governance, 9 Berkman Center for Internet & Society at Harvard Law School Virginia Journal of Law and Technology 1–32 (2004). Google Scholar öffnen
- David R. Johnson & David G. Post, Law And Borders--The Rise of Law in Cyberspace, 48 Stanford Law Review 1367–1402 (1996). Google Scholar öffnen
- Richard Jones, Legal Pluralism and the Adjudication of Internet Disputes, 13 International Review of Law, Computers & Technology 49–68 (1999). Google Scholar öffnen
- Amin Jula, Elankovan Sundararajan & Zalinda Othman, Cloud computing service composition. A systematic literature review, 41 Expert Systems with Applications 3809–3824 (2014). Google Scholar öffnen
- Margot Kaminski, Why trade is not the place for the EU to negotiate privacy Internet Policy Review (2015). Google Scholar öffnen
- Sean P. Kanuck, Information Warefare: New Challenges for Public International Law, 37 Harv. Int'l LJ 272–568 (1996). Google Scholar öffnen
- Orin Kerr, The Case for the Third-Party Doctrine, 107 Michigan Law Review 561–601 (2009). Google Scholar öffnen
- Orin S. Kerr, The Problem of Perspective in Internet Law, 91 Georgetown Law Journal 357–405 (2003). Google Scholar öffnen
- Orin S. Kerr, The Fourth Amendment and New Technologies: Constitutional Myths and the Case for Caution, 102 Michigan Law Review 102–183 (2004). Google Scholar öffnen
- Orin S. Kerr, The Fourth Amendment and the Global Internet, 67 Stanford Law Review 285–329 (2014). Google Scholar öffnen
- Orin S. Kerr, The Next Generation Communications Privacy Act, 162 University of Pennsylvania law review 373–419 (2014). Google Scholar öffnen
- Ido Kilovaty, Freedom to Hack SSRN Journal (2017). Google Scholar öffnen
- Won Kim, Cloud computing architecture, 9 IJWGS 287–303 (2013). Google Scholar öffnen
- Nancy J. King & V. T. Raja, What Do They Really Know About Me in the Cloud? A Comparative Law Perspective on Protecting Privacy and Security of Sensitive Consumer Data, 50 Am Bus Law J 413–482 (2013). Google Scholar öffnen
- Benedict Kingsbury, The Concept of ‘Law’ in Global Administrative Law, 20 Eur J Int Law 23–57 (2009). Google Scholar öffnen
- Benedict Kingsbury, Nico Krisch & Richard Stewart, The Emergence of Global Administrative Law, 68 Law and Contemporary Problems 15–62 (2005). Google Scholar öffnen
- Alfred Kobsa, Privacy-enhanced personalization, 50 Commun. ACM 24–33 (2007). Google Scholar öffnen
- B.-J. Koops, The trouble with European data protection law, 4 International Data Privacy Law 250–261 (2014). Google Scholar öffnen
- Jonathan G. S. Koppell, Pathologies of Accountability. ICANN and the Challenge of “Multiple Accountabilities Disorder”, 65 Public Administration Review 94–108 (2005). Google Scholar öffnen
- N. Krisch, The Pluralism of Global Administrative Law, 17 European Journal of International Law 247–278 (2006). Google Scholar öffnen
- Nir Kshetri, Privacy and security issues in cloud computing. The role of institutions and institutional evolution, 37 Telecommunications Policy 372–386 (2013). Google Scholar öffnen
- W. Kuan Hon & C. Millard, Cloud Computing vs. Traditional Outsourcing – Key Differences, 23 Computers & Law (2012). Google Scholar öffnen
- C. Kuner, Data Protection Law and International Jurisdiction on the Internet (Part 1), 18 International Journal of Law and Information Technology 176–193 (2010). Google Scholar öffnen
- C. Kuner, Data Protection Law and International Jurisdiction on the Internet (Part 2), 18 International Journal of Law and Information Technology 227–247 (2010). Google Scholar öffnen
- Christopher Kuner, Internet Jurisdiction and Data Protection Law: An International Legal Analysis (Part 1), 18 International Journal of Law and Information Technology 176–202 (2010). Google Scholar öffnen
- Christopher Kuner, Internet Jurisdiction and Data Protection Law: An International Legal Analysis (Part 2), 18 International Journal of Law and Information Technology 227–257 (2010). Google Scholar öffnen
- Michèle Lamont, Rethinking Expertise. By Harry Collins and Robert Evans. Chicago. University of Chicago Press, 2007. Pp. 153. $37.50, 115 American Journal of Sociology 569–571 (2009). Google Scholar öffnen
- Stefanie Leimeister, Markus Böhm, Christoph Riedl & Helmut Krcmar, The Business Perspective of Cloud Computing: Actors, Roles and Value Networks ECIS 2010 Proceedings (2010). Google Scholar öffnen
- Philip Leith, The socio-legal context of privacy, 2 IJC 105–136 (2006). Google Scholar öffnen
- Lawrence Lessig, Law Regulating Code Regulating Law, 35 Loyola University Chicago Law Journal 1–14 (2003). Google Scholar öffnen
- Lawrence Lessig & Paul Resnick, Zoning speech on the Internet: A legal and technical model, 98 Michigan Law Review 395–431 (1999). Google Scholar öffnen
- R. K. Lippert & K. Walby, Governing Through Privacy. Authoritarian Liberalism, Law, and Privacy Knowledge, 12 Law, Culture and the Humanities 329–352 (2016). Google Scholar öffnen
- E. Douglas Litowitz, Internal versus external perspectives in law: toward mediation, 26 Florida State University Law Review 127–150 (1998). Google Scholar öffnen
- Volker Lüdemann, Alfred Scheerhorn, Christin Sengstacken & Daniel Brettschneider, Systemdatenschutz im Smart Grid, 39 Datenschutz Datensich 93–97 (2015). Google Scholar öffnen
- Marcel Machill, Thomas Hart & Bettina Kaltenhäuser, Structural development of Internet self‐regulation, 4 INFO 39–55 (2002). Google Scholar öffnen
- Giandomenico Majone, Policy Harmonization. Limits and Alternatives, 16 Journal of Comparative Policy Analysis: Research and Practice 4–21 (2014). Google Scholar öffnen
- Earl M. Maltz, Statutory Interpretation and Legislative Power: The Case for a Modified Intentionalist Approach, 63 Tul. L. Rev. 1–28 (1988). Google Scholar öffnen
- F. A. Mann & Académie de droit international de La Haye., The doctrine of international jurisdiction revisited after twenty years, 186 Recueil des cours = Collected courses 9–116 (1984). Google Scholar öffnen
- Sean Marston, Zhi Li, Subhajyoti Bandyopadhyay, Juheng Zhang & Anand Ghalsasi, Cloud computing — The business perspective, 51 Decision Support Systems 176–189 (2011). Google Scholar öffnen
- Viktor Mayer-Schonberger & Yann Padova, Regime Change: Enabling Big Data through Europe, XVII The Columbia Science & Technology Law Review 315–335 (2016). Google Scholar öffnen
- S. Meachem, Cloud With a Chance of Regulation, 57 ITNOW 18–21 (2015). Google Scholar öffnen
- Aron Mefford, Lex Informatica: Foundations of Law on the Internet, 5 Indiana Journal of Global Legal Studies 211–237 (1997). Google Scholar öffnen
- Raul Mendez, Google case in Italy, 1 International Data Privacy Law 137–139 (2011). Google Scholar öffnen
- Sally Engle Merry, Legal Pluralism, 22 Law & Society Review 869–896 (1988). Google Scholar öffnen
- Ralf Michaels, Global Legal Pluralism, 5 Annual Review of Law & Social Science (2009). Google Scholar öffnen
- L. Moerel, Back to basics: when does EU data protection law apply?, 1 International Data Privacy Law 92–110 (2011). Google Scholar öffnen
- Jesús Montes, Alberto Sánchez, Bunjamin Memishi, María S. Pérez & Gabriel Antoniu, GMonE. A complete approach to cloud monitoring, 29 Future Generation Computer Systems 2026–2040 (2013). Google Scholar öffnen
- Menno Mostert, Annelien L. Bredenoord, Biesaart, Monique C I H & Delden, Johannes J M van, Big Data in medical research and EU data protection law. Challenges to the consent or anonymise approach, 24 European Journal of Human Genetics 956–960 (2016). Google Scholar öffnen
- Milton Mueller, ICANN and Internet governance: sorting through the debris of “self‐regulation”, 1 info 497–520 (1999). Google Scholar öffnen
- Richard Mulgan, 'Accountability'. An Ever-Expanding Concept?, 78 Public Administration 555–573 (2000). Google Scholar öffnen
- Nancy J. King, V.T. Raja, What Do They Really Know About Me in the Cloud? A Comparative Law Perspective on Protecting Privacy and Security of Sensitive Consumer Data, 50 American Business Law Journal 413–482 (2013). Google Scholar öffnen
- Michael R. Nelson, The Cloud, the Crowd, and Public Policy, 25 Issues in science and technology 71–76 (2009). Google Scholar öffnen
- Eva Nieuwdorp, The pervasive discourse, 5 Comput. Entertain. 13 (2007). Google Scholar öffnen
- John T. Noonan, THE CONCEPT OF LAW. By H. L. A. Hart. Oxford: Oxford University Press, 1961. Pp. viii, 263. 21s, 7 Am. J. Juris. 169–177 (1962). Google Scholar öffnen
- Olof Nyrén, Magnus Stenbeck & Henrik Grönberg, The European Parliament proposal for the new EU General Data Protection Regulation may severely restrict European epidemiological research, 29 European Journal of Epidemiology 227–230 (2014). Google Scholar öffnen
- David W. Opderbeck, Encryption Policy and Law Enforcement in the Cloud, 49 Connecticut Law Review (2017). Google Scholar öffnen
- Mike P. Papazoglou & Willem-Jan van den Heuvel, Service oriented architectures. Approaches, technologies and research issues, 16 The VLDB Journal 389–415 (2007). Google Scholar öffnen
- Siani Pearson & Nick Wainwright, An interdisciplinary approach to accountability for future internet service provision, 1 IJTMCC 52–72 (2013). Google Scholar öffnen
- Nicholas Platten, Protectors of Privacy: Regulating Data in the Global Economy – By A.L. Newman, 48 JCMS: Journal of Common Market Studies 453–454 (2010). Google Scholar öffnen
- Reinhard Posch, Neue Herausforderungen für eine Informations- und Datensicherungsstrategie, 2014 Strategie und Sicherheit (2014). Google Scholar öffnen
- Henry Prakken, An exercise in formalising teleological case-based reasoning. Artificial Intelligence and Law, 10 Artificial Intelligence and Law 113–133 (2002). Google Scholar öffnen
- Charles D. Raab & Paul de Hert, The Regulation of Technology: Policy Tools and Policy Actors TILT Law & Technology Working Paper Series (2007). Google Scholar öffnen
- Joseph Raz, Legal Principles and the Limits of Law, 81 The Yale Law Journal 823–854 (1972). Google Scholar öffnen
- Chris Reed, How to Make Bad Law: Lessons from Cyberspace, 73 The Modern Law Review 903–932 (2010). Google Scholar öffnen
- Christopher Rees, Who owns our data?, 30 Computer Law & Security Review 75–79 (2014). Google Scholar öffnen
- Joel Reidenberg, Lex Informatica: The Formulation of Information Policy Rules through Technology, 76 Tex. L. Rev. 553–593 (1997). Google Scholar öffnen
- Joel Reidenberg, Resolving Conflicting International Data Privacy Rules in Cyberspace, 52 Stan. L. Rev. 1315–1371 (1999). Google Scholar öffnen
- Joel Reidenberg, Technology and Internet Jurisdiction, 153 University of Pennsylvania law review 1951–1974 (2005). Google Scholar öffnen
- Gustavo Ribeiro, No Need to Toss a Coin: Conflicting Scientific Expert Testimonies and Intellectual Due Process, 12 Law, Probability and Risk 1–44 (2013). Google Scholar öffnen
- Richard B. Stewart, The Global Regulatory Challenge to U.S. Administrative Law, 37 N.Y.U. J. Int 695–762 (2006). Google Scholar öffnen
- William Jeremy Robison, Free at What Cost? Cloud Computing Privacy Under the Stored Communications Act, 98 Georgetown Law Journal 1195–1239 (2010). Google Scholar öffnen
- Martin Rost, Standardisierte Datenschutzmodellierung, 36 Datenschutz Datensich 433–438 (2012). Google Scholar öffnen
- Rothenberg, M., Jacobs, D., Updating the Law of Information Privacy: The New Framework of the European Union, 36 Harv. J. L. & Pub. Pol 606–652 (2013). Google Scholar öffnen
- John Mark Michael Rumbold & Barbara Pierscionek, The Effect of the General Data Protection Regulation on Medical Research, 19 Journal of medical Internet research e47 (2017). Google Scholar öffnen
- Sabino Cassese, Administrative Law without the State – The Challenge of Global Regulation, 37 N.Y.U. J. Int 663–694 (2005). Google Scholar öffnen
- Rekha Saluja, Cloud Computing: Challenges and New Developments, 5 International Journal of Science, Engineering and Computer Technology 173–176 (2015). Google Scholar öffnen
- Amedeo Santosuosso & Alessandra Malerba, Legal Interoperability as a Comprehensive Concept in Transnational Law, 6 Law, Inn Tech 51–73 (2014). Google Scholar öffnen
- G. Sartor & Viola de Azevedo Cunha, M., The Italian Google-Case. Privacy, Freedom of Speech and Responsibility of Providers for User-Generated Contents, 18 International Journal of Law and Information Technology 356–378 (2010). Google Scholar öffnen
- Giovanni Sartor, Doing justice to rights and values: teleological reasoning and proportionality. Artificial Intelligence and Law, 18 Artif Intell Law 175–215 (2010). Google Scholar öffnen
- Andrej Savin, Profiling and Automated Decision Making in the Present and New EU Data Protection Frameworks SSRN Journal (2014). Google Scholar öffnen
- Heinz-Dieter Schmelling, Motivation. Wie verhält sich die IT-Sicherheit zum IT-Outsourcing?, 40 Datenschutz und Datensicherheit – DuD 635–639 (2016). Google Scholar öffnen
- Klaus Schmidt & Alejandro Laje, The Proportionality and Solidarity Principles and Their Impact on Privacy Laws in German Jurisprudence, 5 Laws 27–38 (2016). Google Scholar öffnen
- T. Schultz, Carving up the Internet. Jurisdiction, Legal Orders, and the Private/Public International Law Interface, 19 European Journal of International Law 799–839 (2008). Google Scholar öffnen
- Paul Schwartz, Information Privacy in the Cloud, 161 University of Pennsylvania law review 1623–1662 (2013). Google Scholar öffnen
- Paul Schwartz, The EU-U.S. Privacy Collision: A Turn to Institutions and Procedures, 126 Harvard Law Review 1966–2009 (2013). Google Scholar öffnen
- Paul M. Schwartz, Preemption and Privacy. UC Berkeley Public Law Research Paper, 118 Yale Law Journal 904-947 (2009). Google Scholar öffnen
- Paul M. Schwartz & Daniel J. Solove, The PII Problem: Privacy and a New Concept of Personally Identifiable Information, 86 New York University Law Review 1814–1894 (2011). Google Scholar öffnen
- Jatinder Singh, Thomas Pasquier, Jean Bacon, Hajoon Ko & David Eyers, Twenty Security Considerations for Cloud-Supported Internet of Things, 3 IEEE Internet Things J. 269–284 (2016). Google Scholar öffnen
- Daniel J. Solove, A Taxonomy of Privacy, 154 University of Pennsylvania law review 477–560 (2006). Google Scholar öffnen
- Alexander Somek, The Concept of ‘Law’ in Global Administrative Law: A Reply to Benedict Kingsbury, 20 Eur J Int Law 985–995 (2009). Google Scholar öffnen
- Dawn Song, Elaine Shi, Ian Fischer & Umesh Shankar, Cloud Data Protection for the Masses Computer 39–45 (2012). Google Scholar öffnen
- John F. Sowa, Top-level ontological categories, 43 International Journal of Human-Computer Studies 669–685 (1995). Google Scholar öffnen
- Elen Stokes, Regulating Technologies: Legal Futures, Regulatory Frames and Technological Fixes by Roger Brownsword and Karen Yeung (eds), 73 The Modern Law Review 682–689 (2010). Google Scholar öffnen
- S. Subashini & V. Kavitha, A survey on security issues in service delivery models of cloud computing, 34 Journal of Network and Computer Applications 1–11 (2011). Google Scholar öffnen
- Clare Sullivan, Protecting digital identity in the cloud: Regulating cross border data disclosure, 30 Computer Law & Security Review 137–152 (2014). Google Scholar öffnen
- Nabil Sultan, Cloud computing. A democratizing force?, 33 International Journal of Information Management 810–815 (2013). Google Scholar öffnen
- Cass R. Sunstein, ON ANALOGICAL REASONING, 106 Harvard Law Review 741–791 (1993). Google Scholar öffnen
- Dan Svantesson, Protecting Privacy on the 'Borderless' Internet – Some Thoughts on Extraterritoriality and Transborder Data Flow, 19 Bond Law Review 168–187 (2007). Google Scholar öffnen
- Hassan Takabi, James B. D. Joshi & Gail-Joon Ahn, Security and Privacy Challenges in Cloud Computing Environments IEEE Security & Privacy 24–31 (2010). Google Scholar öffnen
- Brian Z. Tamanaha, Understanding Legal Pluralism: Past to Present, Local to Global, 30 Sydney L. Rev. 375–411 (2008). Google Scholar öffnen
- Omer Tene & Jules Polonetsky, Privacy in the Age of Big Data: A Time for Big Decisions, 64 Stan. L. Rev. Online 63–69 (2011). Google Scholar öffnen
- Omer Tene & Jules Polonetsky, Judged by the Tin Man: Individual Rights in the Age of Big Data, 11 J. on Telecomm. & High Tech. L. 351–368 (2013). Google Scholar öffnen
- Y. Tian, Current Issues of Cross-Border Personal Data Protection in the Context of Cloud Computing and Trans-Pacific Partnership Agreement. Join or Withdraw, 34 Wisconsin International Law Journal 367–408 (2016). Google Scholar öffnen
- Tridimas, T., & Gutierrez-Fons, J. A., EU Law, International Law, and Economic Sanctions against Terrorism: The Judiciary in Distress?, 32 Fordham International Law Journal 660–730 (2008). Google Scholar öffnen
- Hans-Heinrich Trute, Law and Knowledge – Remarks on a Debate in German Legal Science, 32 Ewha Journal of Social Sciences 34 (2016). Google Scholar öffnen
- Edwin Tucker, The Morality of Law, by Lon L. Fuller, 40 40 Indiana Law Journal 270 (1965) 270–279 (1965). Google Scholar öffnen
- Maria Tzanou, The EU as an emerging 'Surveillance Society'. The function creep case study and challenges to privacy and data protection, 4 ICL Journal (2010). Google Scholar öffnen
- W. Gregory Voss, European Union Data Privacy Law Developments, 70 Business Lawyer 253–260 (2014/2015). Google Scholar öffnen
- W. Gregory Voss, Looking at European Union Data Protection Law Reform Through a Different Prism. The Proposed EU General Data Protection Regulation Two Years Later, 17 Journal of Internet Law 1–3 (2014). Google Scholar öffnen
- Mladen A. Vouk, Cloud Computing – Issues, Research and Implementations, 16 CIT 235–246 (2008). Google Scholar öffnen
- David S. Wall, Digital Realism and the Governance of Spam as Cybercrime, 10 Eur J Crim Policy Res 309–335 (2004). Google Scholar öffnen
- Huaiqing Wang, Matthew K. O. Lee & Chen Wang, Consumer privacy concerns about Internet marketing, 41 Commun. ACM 63–70 (1998). Google Scholar öffnen
- Burke T. Ward & Janice C. Sipior, The Internet Jurisdiction Risk of Cloud Computing, 27 Information Systems Management 334–339 (2010). Google Scholar öffnen
- Robert Ware, The strategic use of American cyberlaw and cyberspace jurisprudence, 48 Managerial Law 303–321 (2006). Google Scholar öffnen
- Samuel D. Warren & Louis D. Brandeis, The Right to Privacy, IV Harvard Law Review 193–220 (1890). Google Scholar öffnen
- Rolf H. Weber, Accountability in the Internet of Things, 27 Computer Law & Security Review 133–138 (2011). Google Scholar öffnen
- Webster, J., & Watson, R. T., Analyzing the past to prepare for the future: Writing a literature review., 26 MIS quarterly 13–23 (2002). Google Scholar öffnen
- Christof Weinhardt, Arun Anandasivam, Benjamin Blau, Nikolay Borissov, Thomas Meinl, Wibke Michalk & Jochen Stößer, Cloud Computing – A Classification, Business Models, and Research Directions, 1 Bus. Inf. Syst. Eng. 391–399 (2009). Google Scholar öffnen
- Α. Ε. Whitley, P. L. Willcocks & W. Venters, Privacy and Security in the Cloud: A Review of Guidance and Responses, 22 Journal of International Technology and Information Management 75–92 (2013). Google Scholar öffnen
- James Q. Whitman, The Two Western Cultures of Privacy. Dignity versus Liberty, 113 The Yale Law Journal 1151–1221 (2004). Google Scholar öffnen
- Jonathan B. Wiener, The regulation of technology, and the technology of regulation, 26 Technology in Society 483–500 (2004). Google Scholar öffnen
- Andrew Keane Woods, Against Data Exceptionalism, 68 Stanford Law Review 729–789 (2016). Google Scholar öffnen
- Chaowei Yang, Qunying Huang, Zhenlong Li, Kai Liu & Fei Hu, Big Data and cloud computing. Innovation opportunities and challenges, 10 International Journal of Digital Earth 13–53 (2016). Google Scholar öffnen
- Zachary NJ Peterson, Mark Gondree, Robert Beverly, A position paper on data sovereignty: the importance of geolocating data in the cloud Proceedings of the 3rd USENIX conference on Hot topics in cloud computing (2011). Google Scholar öffnen
- Dimitrios Zissis & Dimitrios Lekkas, Addressing cloud computing security issues, 28 Future Generation Computer Systems 583–592 (2012). Google Scholar öffnen
- Lecture Google Scholar öffnen
- Dimitra Kamarinou, Christopher Millard & Jatinder Singh, Machine Learning with Personal Data (2016). Google Scholar öffnen
- Legal Commentary Google Scholar öffnen
- Dutch Lawyers ed., Privacy for the Homo Digitalis. Proposal for a New Regulatory Framework for Data Protection in the Light of Big Data and the Internet of Things (2016): Wolters Kluwer. Google Scholar öffnen
- Newspaper Articles Google Scholar öffnen
- Ibrahim Hasan, New EU data protection regulation Law Society Gazette (2016). Google Scholar öffnen
- C. Tuna, Ellison and Benioff Spar Over Cloud Credentials Wall Street Journal (2010). Google Scholar öffnen
- Press Releases Google Scholar öffnen
- eHealth Governance Initiative, DISCUSSION PAPER ON SEMANTIC AND TECHNICAL INTEROPERABILITY (2012). Google Scholar öffnen
- Digital Agenda in the Europe 2020 strategy (2012). Google Scholar öffnen
- Reports or Gray Literature Google Scholar öffnen
- Response to the UK Ministry of Justice’s Call for Evidence on the European Commission’s Data Protection Proposals (2012). Google Scholar öffnen
- DER HESSISCHE DATENSCHUTZBEAUFTRAGTE, Key data protection points for the trilogue on the General Data Protection Regulation (2015). Google Scholar öffnen
- Luciana Duranti, Trust in online records and data. Integrity in Government through Records Management: Essays in Honour of Anne Thurston. Google Scholar öffnen
- European Commission, Working Paper No. 2: Data protection laws in the EU: The difficulties in meeting the challenges posed by global social and technical developments (2010). Google Scholar öffnen
- European Parliament, Report on the First Report on the implementation of the Data Protection Directive (95/46/EC) (COM(2003) 265 – C5-0375/2003 – 2003/2153(INI)) (2004). Google Scholar öffnen
- Primavera De Filippi & Internet Policy Review, Foreign clouds in the European sky: how US laws affect the privacy of Europeans (2013): HIIG – Alexander von Humboldt Institute for Internet and Society. Google Scholar öffnen
- Inc. Gartner, Cloud Computing Confusion Leads to Opportunity (2008). Google Scholar öffnen
- Urs Gasser, Cloud Innovation and the Law: Issues, Approaches, and Interplay (2014). Google Scholar öffnen
- Graham Greenleaf, Major Changes in Asia Pacific Data Privacy Laws: 2011 Survey (2012). Google Scholar öffnen
- Douwe Korff, EC Study on Implementation of Data Protection Directive 95/46/EC (2008). Google Scholar öffnen
- Francesca Musiani & Internet Policy Review, Decentralised internet governance: the case of a ‘peer-to-peer cloud’ (2014): HIIG – Alexander von Humboldt Institute for Internet and Society. Google Scholar öffnen
- Tim O’Reilly & John Battelle, Web Squared: Web 2.0 Five Years On. Google Scholar öffnen
- Older Adults and Technology Use (2014). Google Scholar öffnen
- Neil Robinson, Lorenzo Valeri, Jonathan Cave, Tony Starkey, Hans Graux, Sadie Creese & Paul P. Hopkins, The Cloud: Understanding the Security, Privacy and Trust Challenges. Prepared for Unit F.5, Directorate-General Information Society and Media, European Commission (2012). Google Scholar öffnen
- Osvaldo Saldias & Internet Policy Review, Cloud-friendly regulation: The EU’s strategy towards emerging economies (2013): HIIG – Alexander von Humboldt Institute for Internet and Society. Google Scholar öffnen
- Johannes Thimm, Inseparable, but not equal. Assessing U.S.-EU relations in the wake of the NSA surveillance affair, 4/2014 (2014). Berlin. Google Scholar öffnen
- A. van Cleeff, W. Pieters & R. J. Wieringa, Security Implications of Virtualization: A Literature Study, vol. 3: IEEE. Google Scholar öffnen
- Daniel J. Weitzner, Harold Abelson, Tim Berners-Lee, Chris Hanson, James Hendler, Lalana Kagal, Deborah L. McGuinness, Gerald Jay Sussman & K. Krasnow Waterman, Transparent Accountable Data Mining: New Strategies for Privacy Protection (2006). Google Scholar öffnen
- Willcocks, Leslie P., Venters, Will and Whitley, Edgar A., Cloud and the future of business: from costs to innovation: part two: challenges (2012). London. Google Scholar öffnen
- M. Zhou, R. Zhang, W. Xie, W. Qian & A. Zhou, Security and Privacy in Cloud Computing: A Survey: IEEE. Google Scholar öffnen
- Special Issue Google Scholar öffnen
- Graham Greenleaf ed., GLOBAL DATA PRIVACY LAWS: 89 COUNTRIES, AND ACCELERATING. Special Supplement, Issue 115 (2012). Google Scholar öffnen




