Cover of book: IT Laws in the Era of Cloud-Computing
Book Titles Open Access Full access

IT Laws in the Era of Cloud-Computing

A Comparative Analysis between EU and US Law on the Case Study of Data Protection and Privacy
Authors:
Publisher:
 2018

Summary

This book documents the findings and recommendations of research into the question of how IT laws should develop on the understanding that today’s information and communication technology is shaped by cloud computing, which lies at the foundations of contemporary and future IT as its most widespread enabler. In particular, this study develops on both a comparative and an interdisciplinary axis, i.e. comparatively by examining EU and US law, and on an interdisciplinary level by dealing with law and IT. Focusing on the study of data protection and privacy in cloud environments, the book examines three main challenges on the road towards more efficient cloud computing regulation:understanding the reasons behind the development of diverging legal structures and schools of thought on IT lawensuring privacy and security in digital cloudsconverging regulatory approaches to digital clouds in the hope of more harmonised IT laws in the future.

Keywords



Bibliographic data

Copyright year
2018
ISBN-Print
978-3-8487-5362-8
ISBN-Online
978-3-8452-9562-6
Publisher
Nomos, Baden-Baden
Series
Schriften der Albrecht Mendelssohn Bartholdy Graduate School of Law
Volume
6
Language
English
Pages
378
Product type
Book Titles

Table of contents

ChapterPages
  1. Titelei/InhaltsverzeichnisPages 1 - 20 Download chapter (PDF)
  2. Download chapter (PDF)
      1. i. The European state of affairs
      2. ii. The US state of affairs
      3. iii. Current state of affairs in other countries
    1. b. Research question and structure of the project
  3. Download chapter (PDF)
    1. a. Introduction – scope of this chapter
    2. b. A brief history of the cloud
    3. c. The NIST definition of cloud computing; a starting point
      1. i. Cloud computing compared to traditional IT – Their main differences and why the cloud matters
      2. ii. Cloud computing environments compared to client-server systems
      3. iii. Cloud computing compared to outsourcing – The key differences
    4. e. Data handling needs and the parallel technological evolution – How developing computational requirements led to technological progress
      1. i. File hosting
      2. ii. Clustering
      3. iii. Grid Computing
      4. iv. Virtualization
      1. i. The cloud’s business model
      2. ii. The architecture of cloud computing systems
      1. i. The cloud’s compute model
      2. ii. Virtualization
      3. iii. Monitoring
      4. iv. Provenance
    5. i. The application model of the cloud
    6. j. The security model of the cloud
    7. k. What is cloud computing after all and why does it merit a new regulatory approach?
  4. Download chapter (PDF)
    1. a. Introduction – scope of the chapter
    2. b. How extensive is the influence of European data privacy standards outside Europe? Is it EU law that has been so influencing or is it more the entire European legal thinking?
    3. c. What is the main difference from Europe in USA’s arrangement of their regulatory framework for privacy and the internet?
    4. d. The ‘privacy collision’ between Europe and the USA: a brief historical overview
    5. e. Personal data privacy in Europe and the US: a pragmatic and an articulate approach
      1. i. EU’s approach towards cyber challenges
      2. ii. The US approach towards cyber challenges
      1. i. Privacy under the effect of the cloud in the US
      2. ii. Judicial obstacles
      3. iii. Legislative obstacles
      4. iv. Societal obstacles
    6. h. Europe’s combined approach towards the cloud and economic growth
      1. i. Regulating privacy and security of consumer sensitive data in the cloud; the US current status quo
      2. ii. Regulating privacy and security of consumer sensitive data in the cloud; the EU current status quo
      3. iii. The need for efficient protection of sensitive data also points towards regulatory reform in the cloud
  5. Download chapter (PDF)
    1. a. Introduction – scope of this chapter
    2. b. The most important policy views on aspects of cloud computing brought out so far and why they are not yet sufficient
    3. c. The European Data Protection Directive 95/46/EC; an assessment of its effects on the prevalent views about data protection and related IT technologies; are things different under the GDPR?
      1. i. Does the GDPR set up a truly universal legal framework for data transfer law?
      2. ii. What does the spirit of GDPR tell us about the longevity of the current overall EU data protection regime?
    4. e. GDPR and its readiness to respond to big scale uses of data in the cloud; the case of machine learning
    5. f. Vision for a cloud-based future
      1. i. Privacy and security viewed through the years and across major jurisdictions
      2. ii. Privacy issues particular to cloud computing technologies
      3. iii. Why does cloud computing call for a new regulatory framework?
  6. Download chapter (PDF)
    1. a. Introduction – scope of this chapter
    2. b. Internet Regulation: a paramount of unilateralism
    3. c. From governments to governance; learning to do laws for a borderless world
    4. d. So far, existing laws about cyberspace are bad laws. Lessons learnt?
    5. e. Lex informatica: The formulation of policy rules for the web through applied technology. Can it offer any useful insight for the conceptualization of a dedicated cloud computing regime?
    6. f. Sectoral codes of conduct: the most dedicated attempt to come up with cloud computing laws so far and how it could be improved
    7. g. Efforts undertaken so far on the front of sector-based regulation of IT and their common weakness
      1. i. Defining global administrative law
      2. ii. The general theory on global administrative law and its principles
      3. iii. Theoretical foundations of global administrative law based on US and EU administrative law
      1. i. The proposal
      2. ii. The problems of legal pluralism
    8. j. Can effective cloud computing regulation be achieved through international law? Not really.
    9. k. A comparatist approach and synthesis is the only way; moving forward to regulate cloud computing through legal pluralism
  7. Download chapter (PDF)
      1. PART I: Jurisdiction in the era of cloud computing
      1. i. Establishment – Art. 4 para. 1(a) DPD
      2. ii. International law – Art. 4 para. 1(b) DPD
      3. iii. Equipment – Art. 4 para. 1(c) DPD
      4. iv. Changes to current status quo by the upcoming GDPR
    1. b. Technology and internet jurisdiction: a process of parallel ‘give and take’
    2. c. From data protection law to international jurisdiction on the internet; adapting laws to modern needs and reality
    3. d. What is the problem with asserting jurisdiction over cloud-related cases under current EU laws?
    4. e. Steps to reduce jurisdictional disputes from the perspective of EU law
      1. i. The basics about determining jurisdiction under US law
      2. ii. Jurisdiction under the influence of technological evolution; practices for alleviating jurisdiction risks in the US and internationally over IT-related cases
      1. i. Virtual and physical environments
      2. ii. Accepting the inherent nature of cloud jurisdiction risk
      1. PART II: Accountability on the cloud
    5. a. Accountability: the essentials from data protection to cloud computing
    6. b. Accountability is not self-regulation; clearing the picture between two comparable but critically different concepts
    7. c. Accountability in the cloud cannot be sufficiently settled with existing EU laws
    8. d. Providing answers to the privacy challenges of cloud computing under US law; the importance of the Fourth Amendment principles
    9. e. Achieving effective regulation of the cyberspace: discussing particularities of the web and how these should be mirrored in modern laws about aspects of the digital world
    10. f. Tackling the issue of perspective in internet law; an essential step towards a pragmatic accountability regime
    11. g. The road to an accountable cloud computing goes through the road to an accountable internet: how to achieve a sound internet governance
    12. h. Effective accountability for cloud computing
    13. i. Accountability as a way to further reinforce privacy in the cloud
  8. Download chapter (PDF)
      1. PART I: THE RISKS ASSOCIATED WITH CLOUD COMPUTING
      1. i. United States v. Miller
      2. ii. The Electronic Communications Privacy Act (ECPA) – a step ahead but obscurity lingers
      3. iii. The USA PATRIOT Act
      4. iv. The HIPAA and compelled disclosures
      5. v. The Fair Credit Reporting Act
    1. b. Threats to privacy means threats to security: the two prominent issues that go hand in hand in cloud computing environments
    2. c. Privacy risks posed by the cloud put into question cornerstone elements of information privacy laws
    3. d. The other side of the coin: how cloud computing’s architectural advantages can turn into threats for privacy
    4. e. The affluence of consumer data on cloud computing and particular threats to them because of the cloud’s specificities
      1. PART II: CLOUD COMPLIANCE
    5. a. Introductory remarks on the concept of ‘cloud compliance’
    6. b. Effective regulation of technology: the need to define policy tools and policy actors
    7. c. Incorporating users’ privacy concerns into the rules governing design and deployment of cloud environments
    8. d. Pragmatic answers regarding the deployment of secure and privacy-proof cloud networks
    9. e. Incentivizing privacy and security by encouraging the adoption of privacy enhancing technologies
  9. Download chapter (PDF)
    1. a. Introduction – scope of this chapter
      1. i. The Firmware/Hardware layer
      2. ii. The Software Kernel layer
      3. iii. The Cloud Software Infrastructure layer
      4. iv. The Cloud Software Environment layer
      5. v. The Cloud Application layer (SaaS)
    2. c. Different uses but the same ontology: what does this mean for cloud computing regulatory principles?
      1. i. Data generation
      2. ii. Transfer
      3. iii. Use
      4. iv. Sharing
      5. v. Storage
      6. vi. Archival
      7. vii. Destruction
      1. i. On the hardware/firmware layer
      2. ii. On the software/kernel layer
      3. iii. On the cloud software infrastructure layer
      4. iv. On the PaaS and SaaS layers
      5. v. On the SaaS layer in particular
  10. Download chapter (PDF)
    1. a. Introduction – scope of this chapter
    2. b. Viewing cloud computing from the outside; what else is the cloud apart from its infrastructure and the science behind it?
      1. i. The customer (or user) of cloud computing services
      2. ii. The service provider
      3. iii. Infrastructure providers
      4. iv. Aggregate services providers (aggregators)
      5. v. The platform provider
      6. vi. The cloud services consultant
    3. d. The innovative nature of cloud computing business and the legal challenges raised as a result thereof
      1. i. Data protection
      2. ii. Data Security
      3. iii. Data retention
      4. iv. Consumer protection
      5. v. Intellectual Property
      6. vi. Competition
      7. vii. Trade
      8. viii. Jurisdiction, applicable law, enforcement
      9. ix. Compliance
      10. x. Transparency
      11. xi. Responsibility and liability
      12. xii. Infrastructure
      1. i. Challenges in conceptualizing cloud computing regulation
      2. ii. Challenges in implementing cloud computing regulation
      3. iii. Projecting challenges in the assessment phase of a regulation on the cloud
  11. Download chapter (PDF)
    1. a. Introduction – scope of this chapter
    2. b. Doing laws based on the local and global experience: the differences in approach and the need to combine both perspectives in the case of cloud computing
    3. c. The ability of law to learn and evolve; how to achieve law evolution in the case of cloud computing
    4. d. How proportionality and teleological reasoning can help cloud computing regulation make IT laws overall more efficient
    5. e. How technology itself can help establishing a sound system of governance in the field of cloud computing
    6. f. The key to achieving a sound system of governance in cloud computing regulation: legal interoperability and its significance as a concept in transnational law
    7. g. A brief summary of the trends on privacy regulation through time in a global context; the transit to a cloud computing regulation governance regime is not a free fall into the unknown
    8. h. Making a long-lasting governance regime a choice not a necessity
    9. i. Can the transatlantic divide on privacy be bridged? Why the extensive use of cloud computing technologies makes the call for convergence an urgent one?
  12. Download chapter (PDF)
    1. a. The driving forces that make the need for cloud computing regulation a pressing one
      1. i. Normative proposals
      2. ii. Governance proposals
      3. iii. Policy proposals
    2. c. Future challenges – insights for further research
  13. Download chapter (PDF)
    1. Court of Justice of the European Union
    2. US Courts
    3. US Supreme Court
    4. Lower US courts
    5. Other national courts
    6. Italy
  14. Download chapter (PDF)
    1. EU laws and statutes
    2. US laws and statutes
    3. United Nations
    4. Council of Europe
  15. Bibliographical indexPages 355 - 378 Download chapter (PDF)

Bibliography (427 entries)

  1. Audio or Video Documents Open Google Scholar
  2. Larry Ellison, Larry Ellison on cloud computing (2009), available at: https://www.youtube.com/watch?v=0FacYAI6DY0. Open Google Scholar
  3. Books Open Google Scholar
  4. P. E. Agre & M. Rotenberg, Technology and Privacy: The New Landscape (1998): MIT Press. Open Google Scholar
  5. Antony Anghie & C.G Weeramantry, Legal visions of the 21st century: essays in honour of judge Christopher Weeramantry (op. 1998). The Hague [etc.]: Kluwer Law International. Open Google Scholar
  6. Anne Arendt, Ulrich Dammann & Spiros Simitis, Bundesdatenschutzgesetz (2011). Baden-Baden: Nomos-Verl.Ges. Open Google Scholar
  7. I. Augsberg, Informationsverwaltungsrecht: Zur kognitiven Dimension der rechtlichen Steuerung von Verwaltungsentscheidungen (2014): Mohr Siebeck. Open Google Scholar
  8. Aharon Barak & Sari Bashi, Purposive Interpretation in Law (2011). Princeton: Princeton University Press. Open Google Scholar
  9. Christian Baun, Marcel Kunze, Jens Nimis & Stefan Tai, Cloud Computing (2011). Berlin, Heidelberg: Springer Berlin Heidelberg. Open Google Scholar
  10. C. J. Bennett, Regulating Privacy: Data Protection and Public Policy in Europe and the United States (1992): Cornell University Press. Open Google Scholar
  11. Colin J. Bennett & Charles D. Raab, The governance of privacy. Policy instruments in global perspective (2006). Cambridge, Mass.: MIT Press. Open Google Scholar
  12. Donald H. Berman & Carole D. Hafner, Representing teleological structure in case-based legal reasoning: the missing link (1993): ACM. Open Google Scholar
  13. M. Bovens, The Quest for Responsibility: Accountability and Citizenship in Complex Organisations (1998): Cambridge University Press. Open Google Scholar
  14. S. Brenner, Law in an Era of Smart Technology (2007): Oxford University Press. Open Google Scholar
  15. Stephen G. Breyer, Breaking the vicious circle. Toward effective risk regulation, vol. 1992 (1993). Cambridge, Mass.: Harvard University Press. Open Google Scholar
  16. R. Brownsword, E. Scotford & K. Yeung, The Oxford Handbook of Law, Regulation and Technology (2017): OUP Oxford. Open Google Scholar
  17. Eoghan Casey, Handbook of digital forensics and investigation (2010). London: Academic. Open Google Scholar
  18. V. Chang, Delivery and Adoption of Cloud Computing Services in Contemporary Organizations (2015): IGI Global. Open Google Scholar
  19. H. M. Collins, Tacit and explicit knowledge (2013). Chicago, London: The University of Chicago Press. Open Google Scholar
  20. N. Cox, Technology and Legal Systems (2016): Taylor & Francis. Open Google Scholar
  21. P. P. Craig & G. de Búrca, EU law. Text, cases, and materials (2015). Oxford, United Kingdom, New York, NY: Oxford University Press. Open Google Scholar
  22. Frank B. Cross, Theory and practice of statutory interpretation (2012). Stanford: Stanford University Press. Open Google Scholar
  23. Ulrich Dammann & Spiros Simitis, Bundesdatenschutzgesetz (2014). Baden-Baden: Nomos. Open Google Scholar
  24. Hans Delfs & Helmut Knebl, Introduction to cryptography. Principles and applications, 2007: 1 (2007). Berlin: Springer. Open Google Scholar
  25. J. Domingue, D. Fensel & J. A. Hendler, Handbook of Semantic Web Technologies (2011): Springer Berlin Heidelberg. Open Google Scholar
  26. Ronald Dworkin, Law's empire (1986). Cambridge, Mass.: Belknap Press. Open Google Scholar
  27. D. Dyzenhaus & T. Poole, Law, Liberty and State: Oakeshott, Hayek and Schmitt on the Rule of Law (2015): Cambridge University Press. Open Google Scholar
  28. H.S.P.L.C.E.L.P. Eeckhout & P.L.T. Tridimas, Yearbook of European Law 2009, v. 28 (2010): Oxford University Press, USA. Open Google Scholar
  29. Evelyn Ellis, The principle of proportionality in the laws of Europe (1999). Oxford, Portland, Or.: Hart Pub. Open Google Scholar
  30. Thomas Erl, Richardo Puttini & Zaigham Mahmood, Cloud computing. Concepts, technology, & architecture (2013). Upper Saddle River, NJ: Prentice Hall. Open Google Scholar
  31. Federico Fabbrini, Fundamental rights in Europe (2014). Oxford: Oxford University Press. Open Google Scholar
  32. Elgar Fleisch & Friedemann Mattern, Das Internet der Dinge. Ubiquitous Computing und RFID in der Praxis : Visionen, Technologien, Anwendungen, Handlungsanleitungen (2005). Berlin: Springer. Open Google Scholar
  33. M. Friedewald & R. J. Pohoryles, Privacy and Security in the Digital Age: Privacy in the Age of Super-Technologies (2016): Taylor & Francis. Open Google Scholar
  34. Brett M. Frischmann, Michael J. Madison & Katherine Jo Strandburg, Governing knowledge commons (2014). New York: Oxford University Press. Open Google Scholar
  35. Lon L. Fuller, The morality of law (1965). New Haven, Conn., London: Yale University Press. Open Google Scholar
  36. Borivoje Furht & Armando Escalante, Handbook of cloud computing (2010). New York: Springer. Open Google Scholar
  37. Peter Gola, Christoph Klug, Rudolf Schomerus & Barbara Körffer, Bundesdatenschutzgesetz. Kommentar (2010). München: C. H. Beck. Open Google Scholar
  38. Jack L. Goldsmith & Tim Wu, Who controls the Internet? Illusions of a borderless world (2008). New York, NY: Oxford University Press. Open Google Scholar
  39. Jean-Christophe Graz & Andreas Nölke, Transnational private governance and its limits, vol. 51 (2008). London, New York: Routledge. Open Google Scholar
  40. Adam Greenfield, Everyware. The dawning age of ubiquitous computing (2006). Berkeley, CA: New Riders. Open Google Scholar
  41. H. L. A. Hart, The concept of law (1998). Oxford: Clarendon Press. Open Google Scholar
  42. Friedrich A. von Hayek, The road to serfdom (2005). Princeton, N.J.: Recording for the Blind & Dyslexic. Open Google Scholar
  43. Uta Kohl, Jurisdiction and the Internet. A study of regulatory competence over online activity (2010). Cambridge: Cambridge University Press. Open Google Scholar
  44. E. Kosta, Consent in European Data Protection Law (2013): Brill. Open Google Scholar
  45. Steffen Kroschwald, Informationelle Selbstbestimmung in der Cloud. Datenschutzrechtliche Bewertung und Gestaltung des Cloud Computing aus dem Blickwinkel des Mittelstands (2016). Wiesbaden: Springer Vieweg. Open Google Scholar
  46. Christopher Kuner, Transborder Data Flows and Data Privacy Law (2013). Oxford University Press. Open Google Scholar
  47. L. Lessig, Code and other laws of cyberspace (1999): New York: Basic books. Open Google Scholar
  48. Edward H. Levi & Frederick F. Schauer, An introduction to legal reasoning (2013). Chicago: The University of Chicago Press. Open Google Scholar
  49. Ling Liu & M. Tamer Özsu, Encyclopedia of database systems (2009). New York: Springer. Open Google Scholar
  50. Andreas F. Lowenfeld, International litigation and the quest for reasonableness. Essays in private international law (1996). Oxford, New York: Clarendon Press; Oxford University Press. Open Google Scholar
  51. Christopher T. Marsden, Internet Co-Regulation. European Law, Regulatory Governance and Legitimacy in Cyberspace (2011). Cambridge: Cambridge University Press. Open Google Scholar
  52. Viktor Mayer-Schönberger & Kenneth Cukier, Big data. A revolution that will transform how we live, work, and think (2013). Boston: Houghton Mifflin Harcourt. Open Google Scholar
  53. McGraw-Hill, McGraw-Hill Dictionary of Scientific and Technical Terms (2003): McGraw-Hill. Open Google Scholar
  54. Jens Meierhenrich, Oliver Simons & Friedrich Balke, The Oxford Handbook of Carl Schmitt, vol. 1 (2015): Oxford University Press. Open Google Scholar
  55. Christopher Millard, Cloud Computing Law (2013). New York: Oxford University Press. Open Google Scholar
  56. V. Mitsilegas, European union and internal security. Guardian of the people? (2014). [Place of publication not identified]: Palgrave Macmillan. Open Google Scholar
  57. Andrew Murray, The regulation of cyberspace. Control in the online environment (2007). Milton Park, Abingdon [UK], New York, NY: Routledge-Cavendish. Open Google Scholar
  58. Nordic Council of Ministers, Information Security in Nordic Countries (1993): Nordic Council of Ministers. Open Google Scholar
  59. Christof Paar & Jan Pelzl, Understanding cryptography. A textbook for students and practitioners (2010). Berlin [u.a.]: Springer. Open Google Scholar
  60. John G. Palfrey & Urs Gasser, Born digital. Understanding the first generation of digital natives (2010). New York: BasicBooks. Open Google Scholar
  61. John G. Palfrey & Urs Gasser, Interop. The promise and perils of highly interconnected systems (2012). New York: Basic Books. Open Google Scholar
  62. Siani Pearson, Taking account of privacy when designing cloud computing services (2009): IEEE Computer Society. Open Google Scholar
  63. Siani Pearson & George Yee, Privacy and security for cloud computing (2013). London, New York: Springer. Open Google Scholar
  64. Norman Pelzl, Methodische Entwicklung von zukunftsorientierten Geschäftsmodellen im Cloud-Computing, Band 88 (2016). Lohmar: Eul Verlag. Open Google Scholar
  65. Stefan Poslad, Ubiquitous computing. Smart devices, environments and interactions (2009). Chichester, U.K.: Wiley. Open Google Scholar
  66. Hans Christian Röhl, Wissen, zur kognitiven Dimension des Rechts, vol. 9 (2010). Berlin: Duncker & Humblot. Open Google Scholar
  67. Alexander Rossnagel, Allianz von Medienrecht und Informationstechnik? Ordnung in digitalen Medien durch Gestaltung der Technik am Beispiel von Urheberschutz, Datenschutz, Jugendschutz und Vielfaltschutz; Dokumentation der Stiftungstagung (zugleich EMR-Workshop), der Alcatel SEL Stiftung für Kommunikationsforschung, des Instituts für Medienrecht (EMR), der Landeszentrale für politische Bildung (LpB) Baden-Württemberg, am 10. Mai 2001 im Landtag Baden-Württemberg, Stuttgart, Bd. 24 (2001). Baden-Baden: Nomos. Open Google Scholar
  68. Alexander Roßnagel, Datenschutz in einem informatisierten Alltag (2007). Berlin: Friedich-Ebert-Stiftung. Open Google Scholar
  69. Alexander Roßnagel, Tom Sommerlatte & Udo Winand, Digitale Visionen. Zur Gestaltung allgegenwärtiger Informationstechnologien (2008). Berlin, Heidelberg: Springer-Verlag. Open Google Scholar
  70. Andreas Schedler, Larry Jay Diamond & Marc F. Plattner, The self-restraining state. Power and accountability in new democracies (1999). Boulder, Colo.: Lynne Rienner Publishers. Open Google Scholar
  71. Gunnar Folke Schuppert & Andreas Vosskuhle, Governance von und durch Wissen, Bd. 12 (2008). Baden-Baden, Berlin: Nomos; Wissenschaftszentrum für Sozialforschung. Open Google Scholar
  72. S. Scoglio, Transforming Privacy: A Transpersonal Philosophy of Rights (1998): Praeger. Open Google Scholar
  73. V. Sharma, Information Technology Law and Practice (2011): Universal Law Publishing. Open Google Scholar
  74. Anne-Marie Slaughter, A New World Order (2009). Princeton: Princeton University Press. Open Google Scholar
  75. Christopher Slobogin, Privacy at risk. The new government surveillance and the Fourth Amendment (2007). Chicago: University of Chicago Press. Open Google Scholar
  76. S. S. Smith, Web-based Instruction: A Guide for Libraries (2006): American Library Association. Open Google Scholar
  77. E. Thomas Sullivan & Richard S. Frase, Proportionality principles in American law. Controlling excessive government actions (2009). Oxford, New York: Oxford University Press. Open Google Scholar
  78. Dan Jerker B. Svantesson, Private international law and the internet (2012). Alphen aan den Rijn, Frederick, MD: Kluwer Law International; Sold and distributed in North, Central and South America by Aspen Publishers. Open Google Scholar
  79. Peter P. Swire & Robert E. Litan, None of your business. World data flows, electronic commerce, and the European privacy directive (1998). Washington, D.C.: Brookings Institution Press. Open Google Scholar
  80. D. Tambini, D. Leonardi & C. T. Marsden, Codifying Cyberspace: Communications Self-regulation in the Age of Internet Convergence (2008): Routledge. Open Google Scholar
  81. Georgios Tselentis, Towards the future internet. Emerging trends from European research (2010). Amsterdam: IOS Press. Open Google Scholar
  82. Mariana Valverde, Law's Dream of a Common Knowledge (2009). Princeton: Princeton University Press. Open Google Scholar
  83. Ian Watson, The universal machine. From the dawn of computing to digital consciousness (2012). New York: Copernicus Books. Open Google Scholar
  84. Bill Williams, The economics of cloud computing (2012). Indianapolis, Ind.: Cisco Press. Open Google Scholar
  85. Hongji Yang & Xiaodong Liu, Software reuse in the emerging cloud computing era (2012). Hershey, PA: Information Science Reference. Open Google Scholar
  86. Liang-Jie Zhang & Qun Zhou, CCOA: Cloud Computing Open Architecture (2009): IEEE. Open Google Scholar
  87. K. S. Ziegler, Human Rights and Private Law: Privacy as Autonomy (2007): Bloomsbury Publishing. Open Google Scholar
  88. Tomasz Zurek & Michał Araszkiewicz, Modeling teleological interpretation (2013): ACM. Open Google Scholar
  89. Books, Edited Open Google Scholar
  90. Michael Backes & Peng Ning eds., Computer security – ESORICS 2009. 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009: proceedings, vol. 5789 (2009). Berlin [etc.]: SpringerLink. Open Google Scholar
  91. Giorgio Bongiovanni, Giovanni Sartor & Chiara Valentini eds., Reasonableness and Law, vol. 86 (2009). Dordrecht: Springer Netherlands. Open Google Scholar
  92. Martin Gilje Jaatun, Gansen Zhao & Chunming Rong eds., Cloud computing. First international conference, CloudCom 2009, Beijing, China, December 1-4, 2009: proceedings, vol. 5931 (2009). Berlin, New York: Springer. Open Google Scholar
  93. Helmut Krcmar, Jan Marco Leimeister, Alexander Roßnagel & Ali Sunyaev eds., Cloud-Services aus der Geschäftsperspektive (2016). Wiesbaden: Gabler. Open Google Scholar
  94. Steffen Kroschwald ed., Informationelle Selbstbestimmung in der Cloud. Datenschutzrechtliche Bewertung und Gestaltung des Cloud Computing aus dem Blickwinkel des Mittelstands (2016). Wiesbaden: Springer Vieweg. Open Google Scholar
  95. Gerald Münzl, Michael Pauly & Martin Reti eds., Cloud Computing als neue Herausforderung für Management und IT (2015). Berlin [Germany], Heidelberg [Germany]: Springer-Verlag. Open Google Scholar
  96. Alexander Roßnagel ed., Datenschutzaufsicht nach der EU-Datenschutz-Grundverordnung. Neue Aufgaben und Befugnisse der Aufsichtsbehörden (2017). Wiesbaden: Springer Fachmedien Wiesbaden. Open Google Scholar
  97. Marcel Schweiker, Joachim Hass, Anna Novokhatko & Roxana Halbleib eds., Messen und Verstehen in der Wissenschaft. Interdisziplinäre Ansätze (2017). Wiesbaden: Springer Fachmedien Wiesbaden. Open Google Scholar
  98. John R. Vacca ed., Security in the private cloud (2017). Boca Raton: Taylor & Francis, a CRC title, part of the Taylor & Francis imprint, a member of the Taylor & Francis Group, the academic division of T&F Informa, plc. Open Google Scholar
  99. Birgit Vogel-Heuser, Thomas Bauernhansl & Michael ten Hompel eds., Handbuch Industrie 4.0 Bd.4 (2017). Berlin, Heidelberg: Springer Berlin Heidelberg. Open Google Scholar
  100. Conference Proceedings Open Google Scholar
  101. 2008 Grid Computing Environments Workshop. Open Google Scholar
  102. 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing. Open Google Scholar
  103. 2012 IEEE 4th International Conference on Cloud Computing Technology and Science (CloudCom). Open Google Scholar
  104. IEEE INFOCOM 2010 – IEEE Conference on Computer Communications. Open Google Scholar
  105. International Workshop on Computational Autonomy (2003): Springer Berlin Heidelberg. Open Google Scholar
  106. 2012 International Conference on Computer Science and Electronics Engineering (2012): IEEE. Open Google Scholar
  107. 2012 International Conference on Computing, Electronics and Electrical Technologies (ICCEET) (2012): IEEE. Open Google Scholar
  108. ACM ed., Controlling data in the cloud: outsourcing computation without outsourcing control (2009): ACM. Open Google Scholar
  109. Jameela Al-Jaroodi & Shahram Latifi eds., ITNG 2010. Information Technology New Generations: proceedings of the Seventh International Conference on Information Technology :12-14, April 2009, Las Vegas, Nevada, USA (2010). Los Alamitos, Calif., Piscataway, N.J.: IEEE Computer Society; IEEE. Open Google Scholar
  110. Solon Barocas & Helen Nissenbaum eds., On Notice: The Trouble with Notice and Consent (2009). Open Google Scholar
  111. Elizabeth Chang ed., 24th IEEE International Conference on Advanced Information Networking and Applications (AINA), 2010. 20 – 23 April 2010, Perth, Australia; proceedings (2010). Piscataway, NJ, Piscataway, NJ: IEEE. Open Google Scholar
  112. IEEE ed., An audit logic for accountability (2005): IEEE. Open Google Scholar
  113. IEEE ed., 2010 19th IEEE International Workshop on Enabling Technologies. Infrastructures for Collaborative Enterprises (2010). [Place of publication not identified]: IEEE. Open Google Scholar
  114. KIIT University ed., 2015 International Conference on Computational Intelligence & Networks (CINE). Open Google Scholar
  115. Paulo Mendes ed., Proceedings of the 1st ACM workshop on User-provided networking challenges and opportunities (2009). New York, NY: ACM. Open Google Scholar
  116. Sascha Ossowski ed., Proceedings of the 31st Annual ACM Symposium on Applied Computing (2016). New York, NY: ACM. Open Google Scholar
  117. Alexander Roßnagel ed., Wolken über dem Rechtsstaat? Recht und Technik des Cloud Computing in Verwaltung und Wirtschaft, vol. 33 (2015). Baden-Baden: Nomos. Open Google Scholar
  118. IEEE Staff ed., 2011 IEEE International Conference on Services Computing (2011). [Place of publication not identified]: IEEE. Open Google Scholar
  119. Adrian Vermeule ed., Local and Global Knowledge in the Administrative State (2013). Open Google Scholar
  120. Gabriela Zanfir ed., What Happens in the Cloud Stays in the Cloud, or Why the Cloud's Architecture Should Be Transformed in 'Virtual Territorial Scope' (2013). Open Google Scholar
  121. Liang-Jie Zhang ed., World Conference on Services-I, 2009 (2009). Piscataway, NJ: IEEE. Open Google Scholar
  122. Contribution in Legal Commentary Open Google Scholar
  123. Daniel Halberstam, Constitutionalism and Pluralism in Marbury and Van Gend, in: U of Michigan Public Law Working Paper (2008). Open Google Scholar
  124. Contributions Open Google Scholar
  125. Bu-Qing Cao, Bing Li & Qi-Ming Xia, A Service-Oriented Qos-Assured and Multi-Agent Cloud Computing Architecture, in Cloud computing. First international conference, CloudCom 2009, Beijing, China, December 1-4, 2009: proceedings, 644–649 (Martin Gilje Jaatun, Gansen Zhao & Chunming Rong eds., 2009). Open Google Scholar
  126. Deyan Chen & Hong Zhao, Data Security and Privacy Protection Issues in Cloud Computing, in 2012 International Conference on Computer Science and Electronics Engineering, 647–651 (2012). Open Google Scholar
  127. Guilherme Da Cunha Rodrigues, Rodrigo N. Calheiros, Vinicius Tavares Guimaraes, Glederson Lessa dos Santos, Márcio Barbosa de Carvalho, Lisandro Zambenedetti Granville, Liane Margarida Rockenbach Tarouco & Rajkumar Buyya, Monitoring of cloud computing environments, in Proceedings of the 31st Annual ACM Symposium on Applied Computing, 378–383 (Sascha Ossowski ed., 2016). Open Google Scholar
  128. Tharam Dillon, Chen Wu & Elizabeth Chang, Cloud Computing: Issues and Challenges, in 24th IEEE International Conference on Advanced Information Networking and Applications (AINA), 2010. 20 – 23 April 2010, Perth, Australia; proceedings, 27–33 (Elizabeth Chang ed., 2010). Open Google Scholar
  129. Luciana Duranti, Adam Jansen, Giovanni Michetti, Mumma Courtney, Daryll Prescott, Corinne Rogers & Thibodeau Kenneth, Preservation as a Service for Trust, in Security in the private cloud, 47–72 (John R. Vacca ed., 2017). Open Google Scholar
  130. Niels Fallenbeck & Claudia Eckert, IT-Sicherheit und Cloud Computing, in Handbuch Industrie 4.0 Bd.4, 137–171 (Birgit Vogel-Heuser, Thomas Bauernhansl & Michael ten Hompel eds., 2017). Open Google Scholar
  131. Marc Fouquet, Heiko Niedermayer & Georg Carle, Cloud computing for the masses, in Proceedings of the 1st ACM workshop on User-provided networking challenges and opportunities, 31 (Paulo Mendes ed., 2009). Open Google Scholar
  132. Ines Houidi, Marouen Mechtri, Wajdi Louati & Djamal Zeghlache, Cloud Service Delivery across Multiple Cloud Platforms, in 2011 IEEE International Conference on Services Computing, 741–742 (IEEE Staff ed., 2011). Open Google Scholar
  133. Yashpalsinh Jadeja & Kirit Modi, Cloud computing – concepts, architecture and challenges, in 2012 International Conference on Computing, Electronics and Electrical Technologies (ICCEET), 877–880 (2012). Open Google Scholar
  134. S. Jandt, S. Kroschwald, A. Roβnagel & M. Wicker, Datenschutzkonformes Cloud-Computing, in Cloud-Services aus der Geschäftsperspektive, 207–266 (Helmut Krcmar, Jan Marco Leimeister, Alexander Roßnagel & Ali Sunyaev eds., 2016). Open Google Scholar
  135. Xiaolong Jin & Jiming Liu, From Individual Based Modeling to Autonomy Oriented Computation, in International Workshop on Computational Autonomy, 151–169 (2003). Open Google Scholar
  136. Andrea de Mauro, Marco Greco & Michele Grimaldi, What is big data? A consensual definition and a review of key research topics, in AIP Conference Proceedings, Volume 1644, Issue 1, 97–104 (2015). Open Google Scholar
  137. Fruzsina Molnár-Gábor & Jan O. Korbel, Regulierung neuer Herausforderungen in den Naturwissenschaften – Datenschutz und Datenaustausch in der translationalen genetischen Forschung, in Messen und Verstehen in der Wissenschaft. Interdisziplinäre Ansätze, 151–171 (Marcel Schweiker, Joachim Hass, Anna Novokhatko & Roxana Halbleib eds., 2017). Open Google Scholar
  138. Siani Pearson & Andrew Charlesworth, Accountability as a Way Forward for Privacy Protection in the Cloud, in Cloud computing. First international conference, CloudCom 2009, Beijing, China, December 1-4, 2009: proceedings, 131–144 (Martin Gilje Jaatun, Gansen Zhao & Chunming Rong eds., 2009). Open Google Scholar
  139. Siani Pearson, Vasilis Tountopoulos, Daniele Catteddu, Mario Sudholt, Refik Molva, Christoph Reich, Simone Fischer-Hubner, Christopher Millard, Volkmar Lotz, Martin Gilje Jaatun, Ronald Leenes, Chunming Rong & Javier Lopez, Accountability for cloud and other future Internet services, in 2012 IEEE 4th International Conference on Cloud Computing Technology and Science (CloudCom), 629–632. Open Google Scholar
  140. Deepak Puthal, B.P.S. Sahoo, Sambit Mishra & Satyabrata Swain, Cloud Computing Features, Issues, and Challenges: A Big Picture, in 2015 International Conference on Computational Intelligence & Networks (CINE), 116–123 (KIIT University ed.). Open Google Scholar
  141. Alexander Roßnagel, Datenschutzfragen des Cloud Computing, in Wolken über dem Rechtsstaat? Recht und Technik des Cloud Computing in Verwaltung und Wirtschaft, 19–52 (Alexander Roßnagel ed., 2015). Open Google Scholar
  142. Vijay Sarathy, Purnendu Narayan & Rao Mikkilineni, Next Generation Cloud Computing Architecture: Enabling Real-Time Dynamism for Shared Distributed Physical Infrastructure, in 2010 19th IEEE International Workshop on Enabling Technologies. Infrastructures for Collaborative Enterprises, 48–53 (IEEE ed., 2010). Open Google Scholar
  143. Wei-Tek Tsai, Xin Sun & Janaka Balasooriya, Service-Oriented Cloud Computing Architecture, in ITNG 2010. Information Technology New Generations: proceedings of the Seventh International Conference on Information Technology :12-14, April 2009, Las Vegas, Nevada, USA, 684–689 (Jameela Al-Jaroodi & Shahram Latifi eds., 2010). Open Google Scholar
  144. Cong Wang, Qian Wang, Kui Ren & Wenjing Lou, Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing, in IEEE INFOCOM 2010 – IEEE Conference on Computer Communications, 1–9. Open Google Scholar
  145. Kaiqi Xiong & Harry Perros, Service Performance and Analysis in Cloud Computing, in World Conference on Services-I, 2009, 693–700 (Liang-Jie Zhang ed., 2009). Open Google Scholar
  146. Lamia Youseff, Maria Butrico & Dilma Da Silva, Toward a Unified Ontology of Cloud Computing, in 2008 Grid Computing Environments Workshop, 1–10. Open Google Scholar
  147. Cheng Zeng, Xiao Guo, Weijie Ou & Dong Han, Cloud Computing Service Composition and Search Based on Semantic, in Cloud computing. First international conference, CloudCom 2009, Beijing, China, December 1-4, 2009: proceedings, 290–300 (Martin Gilje Jaatun, Gansen Zhao & Chunming Rong eds., 2009). Open Google Scholar
  148. Internet Documents Open Google Scholar
  149. M. Arif, A history of cloud computing, available at: http://www.computerweekly.com/feature/A-history-of-cloud-computing (18 February 2015). Open Google Scholar
  150. M. Armbrust, A. Fox, R. Griffith, A. Joseph D., R. Katz H., A. Konwinski, G. Lee, D. Patterson A., A. Rabkin, A. Stoica & M. Zaharia, Above the Clouds: A Berkeley View of Cloud Computing, available at: http://www.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS-2009-28.html (2 March 2015). Open Google Scholar
  151. Article 29 Working Party, Working document on determining the international application of EU data protection law to personal data processing on the Internet by non-EU based websites, available at: http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/index_en.htm. Open Google Scholar
  152. Article 29 Working Party, Opinion 3/2009 on the Draft Commission Decision on standard contractual clauses for the transfer of personal data to processors established in third countries, under Directive 95/46/EC (data controller to data processor), available at: http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/index_en.htm. Open Google Scholar
  153. Article 29 Working Party, Opinion 03/2013 on purpose limitation, available at: http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/index_en.htm (3 February 2015). Open Google Scholar
  154. Ozalp Babaoglu, M. Jelasity, Anne Marie Kermarrec, Alberto Montresor & Maarten van Steen, Operating Systems Review (ACM), available at: http://dl.acm.org/citation.cfm?doid=1151374.1151379. Open Google Scholar
  155. Francesca Bosco, Assessing Europe’s cyber challenges, available at: http://policyreview.info/articles/news/assessing-europes-cyber-challenges/355 (4 July 2016). Open Google Scholar
  156. Tobias Bräutigam, The Land of Confusion. International Data Transfers between Schrems and the GDPR. Open Google Scholar
  157. A. Cavoukian, Privacy by Design; The 7 Foundational Principles, available at: https://www.ipc.on.ca/wp-content/uploads/Resources/7foundationalprinciples.pdf. Open Google Scholar
  158. Centre for Information Policy Leadership, Data Protection Accountability: The Essential Elements A Document for Discussion, available at: http://www.huntonfiles.com/files/webupload/CIPL_Galway_Accountability_Paper.pdf (19 March 2015). Open Google Scholar
  159. European Commission, Unleashing the Potential of Cloud Computing in Europe, available at: http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=COM:2012:0529:FIN:EN:PDF (20 November 2014). Open Google Scholar
  160. Robert Gellman, Privacy in the Clouds: Risks to Privacy and Confidentiality from Cloud Computing, available at: https://www.worldprivacyforum.org/2011/11/resource-page-cloud-privacy/ (20 April 2015). Open Google Scholar
  161. Chris Hoofnagle, COMPARATIVE STUDY ON DIFFERENT APPROACHES TO NEW PRIVACY CHALLENGES, IN PARTICULAR IN THE LIGHT OF TECHNOLOGICAL DEVELOPMENTS. B.1 – UNITED STATES OF AMERICA, available at: http://ec.europa.eu/justice/policies/privacy/docs/studies/new_privacy_challenges/final_report_country_report_B1_usa.pdf (2 May 2016). Open Google Scholar
  162. Hunton Privacy Blog, Article 29 Working Party Clarifies Purpose Limitation Principle; Opines on Big and Open Data, available at: https://www.huntonprivacyblog.com/2013/04/09/article-29-working-party-clarifies-purpose-limitation-principle-opines-on-big-and-open-data/ (5 November 2015). Open Google Scholar
  163. International Working Group on Data Protection in Telecommunications, Working Paper on Cloud Computing – Privacy and data protection issues. “Sopot Memorandum”, available at: http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/index_en.htm#h2-3 (3 February 2015). Open Google Scholar
  164. Xenofon Kontargyris, From effective to efficient regulation of ICT (2): the big leap towards embracing vertical, apart from horizontal, interdisciplinarity, available at: http://www.juwiss.de/88-2016/ (13 September 2017). Open Google Scholar
  165. Xenofon Kontargyris, From effective to efficient regulation of ICT: time to build the backbone of information technology legislation, available at: http://www.juwiss.de/66-2016/. Open Google Scholar
  166. D. Linthicum, MSDN Documentation. Service Oriented Architecture (SOA), available at: https://msdn.microsoft.com/en-us/library/bb833022.aspx (4 November 2015). Open Google Scholar
  167. J. Locke, The Roots of Cloud Computing, available at: http://www.servercloudcanada.com/2013/10/the-roots-of-cloud-computing/ (11 January 2017). Open Google Scholar
  168. McAlpine C., Weigh Legal Risks of Cloud Computing, available at: http://www.baselinemag.com/c/a/Legal/Weigh-Legal-Risks-of-Cloud-Computing-869422 (19 February 2016). Open Google Scholar
  169. Peter Mell & Timothy Grance, The NIST Definition of Cloud Computing. Recommendations of the National Institute of Standards and Technology, available at: http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf (4 November 2015). Open Google Scholar
  170. National Telecommunications & Information Administration (NTIA), PRIVACY AND SELF-REGULATION IN THE INFORMATION AGE, available at: https://www.ntia.doc.gov/report/1997/privacy-and-self-regulation-information-age (4 May 2016). Open Google Scholar
  171. R. Peeva, File Hosting vs. Cloud Computing, available at: http://www.websitepulse.com/blog/file-hosting-vs-cloud-computing (4 November 2015). Open Google Scholar
  172. Antonio Regalado, Who Coined 'Cloud Computing'?, available at: https://www.technologyreview.com/s/425970/who-coined-cloud-computing/ (11 January 2017). Open Google Scholar
  173. Reidenberg, J. R., Schwartz, P. M., Data Protection Law and On-line Services: Regulatory Responses. Open Google Scholar
  174. Reilly, D., Wren, C., & Berry, T., Cloud computing: Forensic challenges for law enforcement. In Internet Technology and Secured Transactions (ICITST). Open Google Scholar
  175. Neil Robinson, Hans Graux, Maarten Botterman & Lorenzo Valeri, RAND Europe: Review of the European Data Protection Directive, available at: http://www.rand.org/pubs/technical_reports/TR710.html (13 February 2015). Open Google Scholar
  176. Paul M. Schwartz, Legal Access to Cloud Information. Data Shards, Data Localization, and Data Trusts. Open Google Scholar
  177. Jonathan Stuart Ward & Adam Barker, Undefined By Data. A Survey of Big Data Definitions, available at: http://arxiv.org/pdf/1309.5821. Open Google Scholar
  178. Journal Articles Open Google Scholar
  179. Divyakant Agrawal, Philip Bernstein, Elisa Bertino, Susan Davidson, Umeshwas Dayal, Michael Franklin, Johannes Gehrke, Laura Haas, Alon Halevy, Jiawei Han, H. V. Jagadish, Alexandros Labrinidis, Sam Madden, Yannis Papakonstantinou, Jignesh Patel, Raghu Ramakrishnan, Kenneth Ross, Cyrus Shahabi, Dan Suciu, Shiv Vaithyanathan & Jennifer Widom, Challenges and Opportunities with Big Data 2011-1 Cyber Center Technical Reports (2011). Open Google Scholar
  180. Divyakant Agrawal, Sudipto Das & Amr El Abbadi, Big data and cloud computing. Current state and future opportunities 530–533 (2011). Open Google Scholar
  181. Robert B. Ahdieh, The Visible Hand: Coordination Functions of the Regulatory State, 09 Emory University School of Law, Public Law and Legal Theory Research Paper Series 578–649 (2009). Open Google Scholar
  182. Michael Akehurst, Jurisdiction in International Law, 46 Brit. Y. B. Int'l L. 145–258 (1972). Open Google Scholar
  183. Robert Alexy, On the Structure of Legal Principles, 13 Ratio Juris 294–304 (2000). Open Google Scholar
  184. Ricardo Alonso, Wouter Dessein & Niko Matouschek, When Does Coordination Require Centralization?, 98 American Economic Review 145–179 (2008). Open Google Scholar
  185. Alfred Aman, A Global Perspective on Current Regulatory Reform: Rejection, Relocation, or Reinvention?, 2 2 Indiana Journal of Global Legal Studies 429 (1995) 429–464 (1995). Open Google Scholar
  186. Mauro Andreolini, Michele Colajanni, Marcello Pietri & Stefania Tosi, Adaptive, scalable and reliable monitoring of big data on clouds, 79-80 Journal of Parallel and Distributed Computing 67–79 (2015). Open Google Scholar
  187. Damon C. Andrews & John M. Newman, Personal Jurisdiction and Choice of Law in the Cloud, 73 Md. L. Rev. 313–388 (2013). Open Google Scholar
  188. Stephanos Androutsellis-Theotokis & Diomidis Spinellis, A survey of peer-to-peer content distribution technologies, 36 ACM Comput. Surv. 335–371 (2004). Open Google Scholar
  189. Kevin D. Ashley & Edwina L. Rissland, Law, learning and representation, 150 Artificial Intelligence 17–58 (2003). Open Google Scholar
  190. Marcos D. Assunção, Rodrigo N. Calheiros, Silvia Bianchi, Marco A.S. Netto & Rajkumar Buyya, Big Data computing and clouds. Trends and future directions, 79-80 Journal of Parallel and Distributed Computing 3–15 (2015). Open Google Scholar
  191. Nicholas Bagley & Richard L. Revesz, Centralized Oversight of the Regulatory State, 106 Columbia Law Review 1260–1330 (2006). Open Google Scholar
  192. Kenneth A. Bamberger & Deirdre K. Mulligan, Privacy on the Books and on the Ground, 63 Stanford Law Review 247–316 (2011). Open Google Scholar
  193. Merve Bayramusta & V. Aslihan Nasir, A fad or future of IT? A comprehensive literature review on the cloud computing research, 36 International Journal of Information Management 635–644 (2016). Open Google Scholar
  194. Patricia L. Bellia, Federalization in Information Privacy Law, 118 Yale Law Journal 868–890 (2009). Open Google Scholar
  195. Trevor Bench-Capon & Giovanni Sartor, A model of legal reasoning with cases incorporating theories and values. AI and Law, 150 Artificial Intelligence 97–143 (2003). Open Google Scholar
  196. Y. Benkler, Internet regulation: a case study in the problem of unilateralism, 11 European Journal of International Law 171–185 (2000). Open Google Scholar
  197. Paul Schiff Berman, Cyberspace and the State Action Debate: The Cultural Value of Applying Constitutional Norms to 'Private' Regulation, 71 University of Colorado Law Review 1263–1310 (2000). Open Google Scholar
  198. Paul Schiff Berman, Global Legal Pluralism, 80 S. Cal. L. Rev. 1155–1238 (2006). Open Google Scholar
  199. Paul Schiff Berman, The New Legal Pluralism, 5 Annual Review of Law and Social Science 225–242 (2009). Open Google Scholar
  200. J. Bing, Data Protection, jurisdiction and the choice of law Privacy Laws & Policy Reporter 92–98 (1999). Open Google Scholar
  201. Julia Black, Constructing and contesting legitimacy and accountability in polycentric regulatory regimes, 2 Regulation & Governance 137–164 (2008). Open Google Scholar
  202. D. Scott Blake, Let’s Be Reasonable: Fourth Amendment Principles in the Digital Age, 5 SEVENTH CIRCUIT REV. 491–531 (2010). Open Google Scholar
  203. P. Blume, Transborder data flow: is there a solution in sight?, 8 International Journal of Law and Information Technology 65–86 (2000). Open Google Scholar
  204. Martin Boodman, The Myth of Harmonization of Laws, 39 The American Journal of Comparative Law 699–724 (1991). Open Google Scholar
  205. Scott Brewer, Exemplary Reasoning. Semantics, Pragmatics, and the Rational Force of Legal Argument by Analogy, 109 Harvard Law Review 923–1028 (1996). Open Google Scholar
  206. Grainne de Burca, The EU, the European Court of Justice and the International Legal Order after Kadi. Harvard International Law Journal, 1 Fordham Law Legal Studies Research 1–51 (2009). Open Google Scholar
  207. Rajkumar Buyya, Chee Shin Yeo, Srikumar Venugopal, James Broberg & Ivona Brandic, Cloud computing and emerging IT platforms. Vision, hype, and reality for delivering computing as the 5th utility, 25 Future Generation Computer Systems 599–616 (2009). Open Google Scholar
  208. L. A. Bygrave, Privacy protection in a global context–a comparative overview, 47 Scandinavian Studies in Law 319–348 (2004). Open Google Scholar
  209. Lee A. Bygrave, Aytomated Profiling, 17 Computer Law & Security Review 17–24 (2001). Open Google Scholar
  210. Eve M. Caudill & Patrick E. Murphy, Consumer Online Privacy. Legal and Ethical Issues, 19 Journal of Public Policy & Marketing 7–19 (2000). Open Google Scholar
  211. Everton Cavalcante, Jorge Pereira, Marcelo Pitanga Alves, Pedro Maia, Roniceli Moura, Thais Batista, Flavia C. Delicato & Paulo F. Pires, On the interplay of Internet of Things and Cloud Computing. A systematic mapping study, 89-90 Computer Communications 17–33 (2016). Open Google Scholar
  212. Anupam Chander & Uyen P. Le, Breaking the Web. Data Localization vs. the Global Internet Emory Law Journal, Forthcoming 53 (2014). Open Google Scholar
  213. Andrew Charlesworth, Clash of the Data Titans? US and EU Data Privacy Regulation, 6 European Public Law 253–274 (2000). Open Google Scholar
  214. Jiahong Chen, How the best-laid plans go awry. The (unsolved) issues of applicable law in the General Data Protection Regulation, 6 International Data Privacy Law 310–323 (2017). Open Google Scholar
  215. Fa-Chang Cheng & Wen-Hsing Lai, The Impact of Cloud Computing Technology on Legal Infrastructure within Internet—Focusing on the Protection of Information Privacy, 29 2012 International Workshop on Information and Electronics Engineering 241–251 (2012). Open Google Scholar
  216. Annalisa Ciampi, The Potentially Competing Jurisdiction of the European Court of Human Rights and the European Court of Justice, 28 Yearbook of European Law 601–609 (2009). Open Google Scholar
  217. David Cole & Federico Fabbrini, Bridging the Transatlantic Divide? The United States, the European Union, and the Protection of Privacy Across Borders. iCourts Working Paper Series, No. 33, 2015 International Journal of Constitutional Law (2015). Open Google Scholar
  218. David Couillard, Defogging the Cloud: Applying Fourth Amendment Principles to Evolving Privacy Expectations in Cloud Computing, 93 Minnesota Law Review 2205–2239 (2009). Open Google Scholar
  219. Frank B. Cross, Law and trust, 93 The Georgetown Law Journal 1457–1545 (2005). Open Google Scholar
  220. Dara Hallinan, Michael Friedewald, Paul McCarthy, Citizens’ Perceptions of Data Protection and Privacy in Europe, 28 Computer Law and Security Review 263–272 (2012). Open Google Scholar
  221. Jennifer C. Daskal, The Un-Territoriality of Data, 125 Yale Law Journal 326–398 (2015). Open Google Scholar
  222. Primavera De Filippi, Primavera De Filippi & Luca Belli, Law of the Cloud v Law of the Land: Challenges and Opportunities for Innovation, 3 European Journal of Law and Technology 156–173 (2012). Open Google Scholar
  223. Lothar Determann, What Happens in the Cloud: Software as a Service and Copyrights, 29 Berkeley Technology Law Journal 1096–1129 (2015). Open Google Scholar
  224. Dias, Renata Dalle Molle Araujo, The Potential Impact of the EU General Data Protection Regulation on Pharmacogenomics Research, 36 Med. & L. 43–58 (2017). Open Google Scholar
  225. Hoang T. Dinh, Chonho Lee, Dusit Niyato & Ping Wang, A survey of mobile cloud computing. Architecture, applications, and approaches, 13 Wirel. Commun. Mob. Comput. 1587–1611 (2013). Open Google Scholar
  226. Colin S. Diver, Statutory Interpretation in the Administrative State, 133 University of Pennsylvania law review 549–599 (1985). Open Google Scholar
  227. Benoit Dupont, Cybersecurity Futures: How Can We Regulate Emergent Risks? Technology Innovation Management Review 6–11 (2013). Open Google Scholar
  228. Baudouin. Dupret, Legal pluralism, plurality of laws, and legal practices, 1 European Journal of Legal Studies (2007). Open Google Scholar
  229. Luciana Duranti & Corinne Rogers, Trust in digital records. An increasingly cloudy legal area, 28 Computer Law & Security Review 522–531 (2012). Open Google Scholar
  230. Clarence A. Dykstra, The Quest for Responsibility, 33 The American Political Science Review 1–25 (1939). Open Google Scholar
  231. M. J. Eger, Emerging Restrictions on Transnational Data Flows: Privacy Protection or Non-Tariff Trade Barriers, 10 Law & Pol 1055–1105 (1978). Open Google Scholar
  232. William N. Eskridge & Philip P. Frickey, Statutory Interpretation as Practical Reasoning, 42 Stanford Law Review 321–384 (1990). Open Google Scholar
  233. John A. Ferejohn & Barry R. Weingast, A positive theory of statutory interpretation, 12 International Review of Law and Economics 263–279 (1992). Open Google Scholar
  234. Ian Foster, Yong Zhao, Ioan Raicu & Shiyong Lu, Cloud Computing and Grid Computing 360-Degree Compared,” IEEE Grid Computing Environments (GCE08) 2008, co-located with IEEE/ACM Supercomputing 2008 2012 ACM/IEEE 13TH INTERNATIONAL CONFERENCE ON GRID COMPUTING 1–10. Open Google Scholar
  235. Susan Freiwald & Patricia Bellia, The Fourth Amendment Status of Stored E-mail: The Law Professors' Brief in Warshak v. United States Journal Articles 559–588 (2007). Open Google Scholar
  236. A. Froomkin, Of Governments and Governance, 14 Berkeley Technology Law Journal 618–633 (1999). Open Google Scholar
  237. Lon L. Fuller, Positivism and Fidelity to Law. A Reply to Professor Hart, 71 Harvard Law Review 630–672 (1958). Open Google Scholar
  238. Amir Gandomi & Murtaza Haider, Beyond the hype. Big data concepts, methods, and analytics, 35 International Journal of Information Management 137–144 (2015). Open Google Scholar
  239. Ruth Gavison, Privacy and the Limits of Law, 89 The Yale Law Journal 421–471 (1980). Open Google Scholar
  240. Wesley Gee, Internet Tracking: Stalking or a Necessary Tool for Keeping the Internet Free, 20 CommLaw Conspectus 223–252 (2011). Open Google Scholar
  241. Tom Geller, In privacy law, it's the U.S. vs. the world, 59 Commun. ACM 21–23 (2016). Open Google Scholar
  242. M. Gillen, Internet Co-Regulation: European Law, Regulatory Governance and Legitimacy in Cyberspace, 20 International Journal of Law and Information Technology 147–149 (2012). Open Google Scholar
  243. J. Goldring, Globalisation, National Sovereignty and the Harmonisation of Laws, 3 Uniform Law Review – Revue de droit uniforme 435–451 (1998). Open Google Scholar
  244. Graham Greenleaf, Global Data Privacy Laws: Forty Years of Acceleration. UNSW Law Research Paper No. 2011-36 Privacy Laws and Business International Report 11–17 (2011). Open Google Scholar
  245. Graham Greenleaf, The Influence of European Data Privacy Standards Outside Europe: Implications for Globalisation of Convention 108, 2 International Data Privacy Law 68–92 (2012). Open Google Scholar
  246. John Griffiths, What is Legal Pluralism?, 18 The Journal of Legal Pluralism and Unofficial Law 1–55 (1986). Open Google Scholar
  247. Dieter Grimm, Proportionality in Canadian and German Constitutional Jurisprudence, 57 University of Toronto Law Journal 383–397 (2007). Open Google Scholar
  248. Neil Gunningham & Joseph Rees, Industry Self‐Regulation: An Institutional Perspective, 19 Law & Policy 363–414 (1997). Open Google Scholar
  249. Marit Hansen, Datenschutz nach dem Summer of Snowden, 38 Datenschutz Datensich 439–444 (2014). Open Google Scholar
  250. Tor-Inge Harbo, The Function of the Proportionality Principle in EU Law, 16 European Law Journal 158–185 (2010). Open Google Scholar
  251. Carol Harlow, Global Administrative Law: The Quest for Principles and Values, 17 Eur J Int Law 187–214 (2006). Open Google Scholar
  252. Ibrahim Abaker Targio Hashem, Ibrar Yaqoob, Nor Badrul Anuar, Salimah Mokhtar, Abdullah Gani & Samee Ullah Khan, The rise of “big data” on cloud computing. Review and open research issues, 47 Information Systems 98–115 (2015). Open Google Scholar
  253. Friedrich A. von Hayek, The Use of Knowledge in Society, 35 The American Economic Review 519–530 (1945). Open Google Scholar
  254. Alden Heintz, The Dangers of Regulation, 29 J Communication 129–134 (1979). Open Google Scholar
  255. Paul de Hert & Vagelis Papakonstantinou, The new General Data Protection Regulation. Still a sound system for the protection of individuals?, 32 Computer Law & Security Review 179–194 (2016). Open Google Scholar
  256. Mireille Hildebrandt, Profiling and the rule of law, 1 IDIS 55–70 (2008). Open Google Scholar
  257. Dennis D. Hirsch, In Search of the Holy Grail: Achieving Global Privacy Rules Through Sector-Based Codes of Conduct, 74 Ohio State Law Journal 1030–1069 (2013). Open Google Scholar
  258. D. Hofman, Duranti L. & E. How, Trust in the Balance. Data Protection Laws as Tools for Privacy and Security in the Cloud, 10 Algorithms 47 (2017). Open Google Scholar
  259. W. K. Hon, C. Millard & I. Walden, The problem of 'personal data' in cloud computing: what information is regulated? -The cloud of unknowing, 1 International Data Privacy Law 211–228 (2011). Open Google Scholar
  260. W. K. Hon, C. Millard & I. Walden, Who is responsible for 'personal data' in cloud computing? --The cloud of unknowing, Part 2, 2 International Data Privacy Law 3–18 (2012). Open Google Scholar
  261. W. Kuan Hon, Julia Hörnle & Christopher Millard, Data Protection Jurisdiction and Cloud Computing. When are Cloud Users and Providers Subject to EU Data Protection Law? The Cloud of Unknowing, Part 3, 26 International Review of Law, Computers & Technology (2012). Open Google Scholar
  262. W. Kuan Hon & Christopher Millard, Data Export in Cloud Computing. How Can Personal Data Be Transferred Outside the EEA? The Cloud of Unknowing, Part 4, 9 SCRIPT-ed (2011). Open Google Scholar
  263. W. Kuan Hon, Christopher Millard & Ian Walden, The Problem of 'Personal Data' in Cloud Computing – What Information is Regulated? The Cloud of Unknowing, Part 1, 1 International Data Privacy Law 211–228 (2011). Open Google Scholar
  264. J. Hoover, Compliance in the Ether: Cloud Computing, Data Security and Business Regulation, 8 Journal of Business & Technology Law 255–273 (2013). Open Google Scholar
  265. Gerrit Hornung, Regulating privacy enhancing technologies: seizing the opportunity of the future European Data Protection Framework, 26 Innovation: The European Journal of Social Science Research 181–196 (2013). Open Google Scholar
  266. Peter Hustinx, Privacy by design. Delivering the promises, 3 IDIS 253–255 (2010). Open Google Scholar
  267. Kristina Irion, Government Cloud Computing and the Policies of Data Sovereignty, 4 Policy and Internet 40–71 (2012). Open Google Scholar
  268. Paul T. Jaeger, Jimmy Lin & Justin M. Grimes, Cloud Computing and Information Policy: Computing in a Policy Cloud?, 5 Journal of Information Technology & Politics 269–283 (2008). Open Google Scholar
  269. Paul T. Jaeger, Jimmy Lin, Justin M. Grimes & Shannon N. Simmons, Where is the cloud? Geography, economics, environment, and jurisdiction in cloud computing, 14 First Monday (2009). Open Google Scholar
  270. David R. Johnson, Susan P. Crawford & John G. Palfrey, The accountable net: Peer production of internet governance, 9 Berkman Center for Internet & Society at Harvard Law School Virginia Journal of Law and Technology 1–32 (2004). Open Google Scholar
  271. David R. Johnson & David G. Post, Law And Borders--The Rise of Law in Cyberspace, 48 Stanford Law Review 1367–1402 (1996). Open Google Scholar
  272. Richard Jones, Legal Pluralism and the Adjudication of Internet Disputes, 13 International Review of Law, Computers & Technology 49–68 (1999). Open Google Scholar
  273. Amin Jula, Elankovan Sundararajan & Zalinda Othman, Cloud computing service composition. A systematic literature review, 41 Expert Systems with Applications 3809–3824 (2014). Open Google Scholar
  274. Margot Kaminski, Why trade is not the place for the EU to negotiate privacy Internet Policy Review (2015). Open Google Scholar
  275. Sean P. Kanuck, Information Warefare: New Challenges for Public International Law, 37 Harv. Int'l LJ 272–568 (1996). Open Google Scholar
  276. Orin Kerr, The Case for the Third-Party Doctrine, 107 Michigan Law Review 561–601 (2009). Open Google Scholar
  277. Orin S. Kerr, The Problem of Perspective in Internet Law, 91 Georgetown Law Journal 357–405 (2003). Open Google Scholar
  278. Orin S. Kerr, The Fourth Amendment and New Technologies: Constitutional Myths and the Case for Caution, 102 Michigan Law Review 102–183 (2004). Open Google Scholar
  279. Orin S. Kerr, The Fourth Amendment and the Global Internet, 67 Stanford Law Review 285–329 (2014). Open Google Scholar
  280. Orin S. Kerr, The Next Generation Communications Privacy Act, 162 University of Pennsylvania law review 373–419 (2014). Open Google Scholar
  281. Ido Kilovaty, Freedom to Hack SSRN Journal (2017). Open Google Scholar
  282. Won Kim, Cloud computing architecture, 9 IJWGS 287–303 (2013). Open Google Scholar
  283. Nancy J. King & V. T. Raja, What Do They Really Know About Me in the Cloud? A Comparative Law Perspective on Protecting Privacy and Security of Sensitive Consumer Data, 50 Am Bus Law J 413–482 (2013). Open Google Scholar
  284. Benedict Kingsbury, The Concept of ‘Law’ in Global Administrative Law, 20 Eur J Int Law 23–57 (2009). Open Google Scholar
  285. Benedict Kingsbury, Nico Krisch & Richard Stewart, The Emergence of Global Administrative Law, 68 Law and Contemporary Problems 15–62 (2005). Open Google Scholar
  286. Alfred Kobsa, Privacy-enhanced personalization, 50 Commun. ACM 24–33 (2007). Open Google Scholar
  287. B.-J. Koops, The trouble with European data protection law, 4 International Data Privacy Law 250–261 (2014). Open Google Scholar
  288. Jonathan G. S. Koppell, Pathologies of Accountability. ICANN and the Challenge of “Multiple Accountabilities Disorder”, 65 Public Administration Review 94–108 (2005). Open Google Scholar
  289. N. Krisch, The Pluralism of Global Administrative Law, 17 European Journal of International Law 247–278 (2006). Open Google Scholar
  290. Nir Kshetri, Privacy and security issues in cloud computing. The role of institutions and institutional evolution, 37 Telecommunications Policy 372–386 (2013). Open Google Scholar
  291. W. Kuan Hon & C. Millard, Cloud Computing vs. Traditional Outsourcing – Key Differences, 23 Computers & Law (2012). Open Google Scholar
  292. C. Kuner, Data Protection Law and International Jurisdiction on the Internet (Part 1), 18 International Journal of Law and Information Technology 176–193 (2010). Open Google Scholar
  293. C. Kuner, Data Protection Law and International Jurisdiction on the Internet (Part 2), 18 International Journal of Law and Information Technology 227–247 (2010). Open Google Scholar
  294. Christopher Kuner, Internet Jurisdiction and Data Protection Law: An International Legal Analysis (Part 1), 18 International Journal of Law and Information Technology 176–202 (2010). Open Google Scholar
  295. Christopher Kuner, Internet Jurisdiction and Data Protection Law: An International Legal Analysis (Part 2), 18 International Journal of Law and Information Technology 227–257 (2010). Open Google Scholar
  296. Michèle Lamont, Rethinking Expertise. By Harry Collins and Robert Evans. Chicago. University of Chicago Press, 2007. Pp. 153. $37.50, 115 American Journal of Sociology 569–571 (2009). Open Google Scholar
  297. Stefanie Leimeister, Markus Böhm, Christoph Riedl & Helmut Krcmar, The Business Perspective of Cloud Computing: Actors, Roles and Value Networks ECIS 2010 Proceedings (2010). Open Google Scholar
  298. Philip Leith, The socio-legal context of privacy, 2 IJC 105–136 (2006). Open Google Scholar
  299. Lawrence Lessig, Law Regulating Code Regulating Law, 35 Loyola University Chicago Law Journal 1–14 (2003). Open Google Scholar
  300. Lawrence Lessig & Paul Resnick, Zoning speech on the Internet: A legal and technical model, 98 Michigan Law Review 395–431 (1999). Open Google Scholar
  301. R. K. Lippert & K. Walby, Governing Through Privacy. Authoritarian Liberalism, Law, and Privacy Knowledge, 12 Law, Culture and the Humanities 329–352 (2016). Open Google Scholar
  302. E. Douglas Litowitz, Internal versus external perspectives in law: toward mediation, 26 Florida State University Law Review 127–150 (1998). Open Google Scholar
  303. Volker Lüdemann, Alfred Scheerhorn, Christin Sengstacken & Daniel Brettschneider, Systemdatenschutz im Smart Grid, 39 Datenschutz Datensich 93–97 (2015). Open Google Scholar
  304. Marcel Machill, Thomas Hart & Bettina Kaltenhäuser, Structural development of Internet self‐regulation, 4 INFO 39–55 (2002). Open Google Scholar
  305. Giandomenico Majone, Policy Harmonization. Limits and Alternatives, 16 Journal of Comparative Policy Analysis: Research and Practice 4–21 (2014). Open Google Scholar
  306. Earl M. Maltz, Statutory Interpretation and Legislative Power: The Case for a Modified Intentionalist Approach, 63 Tul. L. Rev. 1–28 (1988). Open Google Scholar
  307. F. A. Mann & Académie de droit international de La Haye., The doctrine of international jurisdiction revisited after twenty years, 186 Recueil des cours = Collected courses 9–116 (1984). Open Google Scholar
  308. Sean Marston, Zhi Li, Subhajyoti Bandyopadhyay, Juheng Zhang & Anand Ghalsasi, Cloud computing — The business perspective, 51 Decision Support Systems 176–189 (2011). Open Google Scholar
  309. Viktor Mayer-Schonberger & Yann Padova, Regime Change: Enabling Big Data through Europe, XVII The Columbia Science & Technology Law Review 315–335 (2016). Open Google Scholar
  310. S. Meachem, Cloud With a Chance of Regulation, 57 ITNOW 18–21 (2015). Open Google Scholar
  311. Aron Mefford, Lex Informatica: Foundations of Law on the Internet, 5 Indiana Journal of Global Legal Studies 211–237 (1997). Open Google Scholar
  312. Raul Mendez, Google case in Italy, 1 International Data Privacy Law 137–139 (2011). Open Google Scholar
  313. Sally Engle Merry, Legal Pluralism, 22 Law & Society Review 869–896 (1988). Open Google Scholar
  314. Ralf Michaels, Global Legal Pluralism, 5 Annual Review of Law & Social Science (2009). Open Google Scholar
  315. L. Moerel, Back to basics: when does EU data protection law apply?, 1 International Data Privacy Law 92–110 (2011). Open Google Scholar
  316. Jesús Montes, Alberto Sánchez, Bunjamin Memishi, María S. Pérez & Gabriel Antoniu, GMonE. A complete approach to cloud monitoring, 29 Future Generation Computer Systems 2026–2040 (2013). Open Google Scholar
  317. Menno Mostert, Annelien L. Bredenoord, Biesaart, Monique C I H & Delden, Johannes J M van, Big Data in medical research and EU data protection law. Challenges to the consent or anonymise approach, 24 European Journal of Human Genetics 956–960 (2016). Open Google Scholar
  318. Milton Mueller, ICANN and Internet governance: sorting through the debris of “self‐regulation”, 1 info 497–520 (1999). Open Google Scholar
  319. Richard Mulgan, 'Accountability'. An Ever-Expanding Concept?, 78 Public Administration 555–573 (2000). Open Google Scholar
  320. Nancy J. King, V.T. Raja, What Do They Really Know About Me in the Cloud? A Comparative Law Perspective on Protecting Privacy and Security of Sensitive Consumer Data, 50 American Business Law Journal 413–482 (2013). Open Google Scholar
  321. Michael R. Nelson, The Cloud, the Crowd, and Public Policy, 25 Issues in science and technology 71–76 (2009). Open Google Scholar
  322. Eva Nieuwdorp, The pervasive discourse, 5 Comput. Entertain. 13 (2007). Open Google Scholar
  323. John T. Noonan, THE CONCEPT OF LAW. By H. L. A. Hart. Oxford: Oxford University Press, 1961. Pp. viii, 263. 21s, 7 Am. J. Juris. 169–177 (1962). Open Google Scholar
  324. Olof Nyrén, Magnus Stenbeck & Henrik Grönberg, The European Parliament proposal for the new EU General Data Protection Regulation may severely restrict European epidemiological research, 29 European Journal of Epidemiology 227–230 (2014). Open Google Scholar
  325. David W. Opderbeck, Encryption Policy and Law Enforcement in the Cloud, 49 Connecticut Law Review (2017). Open Google Scholar
  326. Mike P. Papazoglou & Willem-Jan van den Heuvel, Service oriented architectures. Approaches, technologies and research issues, 16 The VLDB Journal 389–415 (2007). Open Google Scholar
  327. Siani Pearson & Nick Wainwright, An interdisciplinary approach to accountability for future internet service provision, 1 IJTMCC 52–72 (2013). Open Google Scholar
  328. Nicholas Platten, Protectors of Privacy: Regulating Data in the Global Economy – By A.L. Newman, 48 JCMS: Journal of Common Market Studies 453–454 (2010). Open Google Scholar
  329. Reinhard Posch, Neue Herausforderungen für eine Informations- und Datensicherungsstrategie, 2014 Strategie und Sicherheit (2014). Open Google Scholar
  330. Henry Prakken, An exercise in formalising teleological case-based reasoning. Artificial Intelligence and Law, 10 Artificial Intelligence and Law 113–133 (2002). Open Google Scholar
  331. Charles D. Raab & Paul de Hert, The Regulation of Technology: Policy Tools and Policy Actors TILT Law & Technology Working Paper Series (2007). Open Google Scholar
  332. Joseph Raz, Legal Principles and the Limits of Law, 81 The Yale Law Journal 823–854 (1972). Open Google Scholar
  333. Chris Reed, How to Make Bad Law: Lessons from Cyberspace, 73 The Modern Law Review 903–932 (2010). Open Google Scholar
  334. Christopher Rees, Who owns our data?, 30 Computer Law & Security Review 75–79 (2014). Open Google Scholar
  335. Joel Reidenberg, Lex Informatica: The Formulation of Information Policy Rules through Technology, 76 Tex. L. Rev. 553–593 (1997). Open Google Scholar
  336. Joel Reidenberg, Resolving Conflicting International Data Privacy Rules in Cyberspace, 52 Stan. L. Rev. 1315–1371 (1999). Open Google Scholar
  337. Joel Reidenberg, Technology and Internet Jurisdiction, 153 University of Pennsylvania law review 1951–1974 (2005). Open Google Scholar
  338. Gustavo Ribeiro, No Need to Toss a Coin: Conflicting Scientific Expert Testimonies and Intellectual Due Process, 12 Law, Probability and Risk 1–44 (2013). Open Google Scholar
  339. Richard B. Stewart, The Global Regulatory Challenge to U.S. Administrative Law, 37 N.Y.U. J. Int 695–762 (2006). Open Google Scholar
  340. William Jeremy Robison, Free at What Cost? Cloud Computing Privacy Under the Stored Communications Act, 98 Georgetown Law Journal 1195–1239 (2010). Open Google Scholar
  341. Martin Rost, Standardisierte Datenschutzmodellierung, 36 Datenschutz Datensich 433–438 (2012). Open Google Scholar
  342. Rothenberg, M., Jacobs, D., Updating the Law of Information Privacy: The New Framework of the European Union, 36 Harv. J. L. & Pub. Pol 606–652 (2013). Open Google Scholar
  343. John Mark Michael Rumbold & Barbara Pierscionek, The Effect of the General Data Protection Regulation on Medical Research, 19 Journal of medical Internet research e47 (2017). Open Google Scholar
  344. Sabino Cassese, Administrative Law without the State – The Challenge of Global Regulation, 37 N.Y.U. J. Int 663–694 (2005). Open Google Scholar
  345. Rekha Saluja, Cloud Computing: Challenges and New Developments, 5 International Journal of Science, Engineering and Computer Technology 173–176 (2015). Open Google Scholar
  346. Amedeo Santosuosso & Alessandra Malerba, Legal Interoperability as a Comprehensive Concept in Transnational Law, 6 Law, Inn Tech 51–73 (2014). Open Google Scholar
  347. G. Sartor & Viola de Azevedo Cunha, M., The Italian Google-Case. Privacy, Freedom of Speech and Responsibility of Providers for User-Generated Contents, 18 International Journal of Law and Information Technology 356–378 (2010). Open Google Scholar
  348. Giovanni Sartor, Doing justice to rights and values: teleological reasoning and proportionality. Artificial Intelligence and Law, 18 Artif Intell Law 175–215 (2010). Open Google Scholar
  349. Andrej Savin, Profiling and Automated Decision Making in the Present and New EU Data Protection Frameworks SSRN Journal (2014). Open Google Scholar
  350. Heinz-Dieter Schmelling, Motivation. Wie verhält sich die IT-Sicherheit zum IT-Outsourcing?, 40 Datenschutz und Datensicherheit – DuD 635–639 (2016). Open Google Scholar
  351. Klaus Schmidt & Alejandro Laje, The Proportionality and Solidarity Principles and Their Impact on Privacy Laws in German Jurisprudence, 5 Laws 27–38 (2016). Open Google Scholar
  352. T. Schultz, Carving up the Internet. Jurisdiction, Legal Orders, and the Private/Public International Law Interface, 19 European Journal of International Law 799–839 (2008). Open Google Scholar
  353. Paul Schwartz, Information Privacy in the Cloud, 161 University of Pennsylvania law review 1623–1662 (2013). Open Google Scholar
  354. Paul Schwartz, The EU-U.S. Privacy Collision: A Turn to Institutions and Procedures, 126 Harvard Law Review 1966–2009 (2013). Open Google Scholar
  355. Paul M. Schwartz, Preemption and Privacy. UC Berkeley Public Law Research Paper, 118 Yale Law Journal 904-947 (2009). Open Google Scholar
  356. Paul M. Schwartz & Daniel J. Solove, The PII Problem: Privacy and a New Concept of Personally Identifiable Information, 86 New York University Law Review 1814–1894 (2011). Open Google Scholar
  357. Jatinder Singh, Thomas Pasquier, Jean Bacon, Hajoon Ko & David Eyers, Twenty Security Considerations for Cloud-Supported Internet of Things, 3 IEEE Internet Things J. 269–284 (2016). Open Google Scholar
  358. Daniel J. Solove, A Taxonomy of Privacy, 154 University of Pennsylvania law review 477–560 (2006). Open Google Scholar
  359. Alexander Somek, The Concept of ‘Law’ in Global Administrative Law: A Reply to Benedict Kingsbury, 20 Eur J Int Law 985–995 (2009). Open Google Scholar
  360. Dawn Song, Elaine Shi, Ian Fischer & Umesh Shankar, Cloud Data Protection for the Masses Computer 39–45 (2012). Open Google Scholar
  361. John F. Sowa, Top-level ontological categories, 43 International Journal of Human-Computer Studies 669–685 (1995). Open Google Scholar
  362. Elen Stokes, Regulating Technologies: Legal Futures, Regulatory Frames and Technological Fixes by Roger Brownsword and Karen Yeung (eds), 73 The Modern Law Review 682–689 (2010). Open Google Scholar
  363. S. Subashini & V. Kavitha, A survey on security issues in service delivery models of cloud computing, 34 Journal of Network and Computer Applications 1–11 (2011). Open Google Scholar
  364. Clare Sullivan, Protecting digital identity in the cloud: Regulating cross border data disclosure, 30 Computer Law & Security Review 137–152 (2014). Open Google Scholar
  365. Nabil Sultan, Cloud computing. A democratizing force?, 33 International Journal of Information Management 810–815 (2013). Open Google Scholar
  366. Cass R. Sunstein, ON ANALOGICAL REASONING, 106 Harvard Law Review 741–791 (1993). Open Google Scholar
  367. Dan Svantesson, Protecting Privacy on the 'Borderless' Internet – Some Thoughts on Extraterritoriality and Transborder Data Flow, 19 Bond Law Review 168–187 (2007). Open Google Scholar
  368. Hassan Takabi, James B. D. Joshi & Gail-Joon Ahn, Security and Privacy Challenges in Cloud Computing Environments IEEE Security & Privacy 24–31 (2010). Open Google Scholar
  369. Brian Z. Tamanaha, Understanding Legal Pluralism: Past to Present, Local to Global, 30 Sydney L. Rev. 375–411 (2008). Open Google Scholar
  370. Omer Tene & Jules Polonetsky, Privacy in the Age of Big Data: A Time for Big Decisions, 64 Stan. L. Rev. Online 63–69 (2011). Open Google Scholar
  371. Omer Tene & Jules Polonetsky, Judged by the Tin Man: Individual Rights in the Age of Big Data, 11 J. on Telecomm. & High Tech. L. 351–368 (2013). Open Google Scholar
  372. Y. Tian, Current Issues of Cross-Border Personal Data Protection in the Context of Cloud Computing and Trans-Pacific Partnership Agreement. Join or Withdraw, 34 Wisconsin International Law Journal 367–408 (2016). Open Google Scholar
  373. Tridimas, T., & Gutierrez-Fons, J. A., EU Law, International Law, and Economic Sanctions against Terrorism: The Judiciary in Distress?, 32 Fordham International Law Journal 660–730 (2008). Open Google Scholar
  374. Hans-Heinrich Trute, Law and Knowledge – Remarks on a Debate in German Legal Science, 32 Ewha Journal of Social Sciences 34 (2016). Open Google Scholar
  375. Edwin Tucker, The Morality of Law, by Lon L. Fuller, 40 40 Indiana Law Journal 270 (1965) 270–279 (1965). Open Google Scholar
  376. Maria Tzanou, The EU as an emerging 'Surveillance Society'. The function creep case study and challenges to privacy and data protection, 4 ICL Journal (2010). Open Google Scholar
  377. W. Gregory Voss, European Union Data Privacy Law Developments, 70 Business Lawyer 253–260 (2014/2015). Open Google Scholar
  378. W. Gregory Voss, Looking at European Union Data Protection Law Reform Through a Different Prism. The Proposed EU General Data Protection Regulation Two Years Later, 17 Journal of Internet Law 1–3 (2014). Open Google Scholar
  379. Mladen A. Vouk, Cloud Computing – Issues, Research and Implementations, 16 CIT 235–246 (2008). Open Google Scholar
  380. David S. Wall, Digital Realism and the Governance of Spam as Cybercrime, 10 Eur J Crim Policy Res 309–335 (2004). Open Google Scholar
  381. Huaiqing Wang, Matthew K. O. Lee & Chen Wang, Consumer privacy concerns about Internet marketing, 41 Commun. ACM 63–70 (1998). Open Google Scholar
  382. Burke T. Ward & Janice C. Sipior, The Internet Jurisdiction Risk of Cloud Computing, 27 Information Systems Management 334–339 (2010). Open Google Scholar
  383. Robert Ware, The strategic use of American cyberlaw and cyberspace jurisprudence, 48 Managerial Law 303–321 (2006). Open Google Scholar
  384. Samuel D. Warren & Louis D. Brandeis, The Right to Privacy, IV Harvard Law Review 193–220 (1890). Open Google Scholar
  385. Rolf H. Weber, Accountability in the Internet of Things, 27 Computer Law & Security Review 133–138 (2011). Open Google Scholar
  386. Webster, J., & Watson, R. T., Analyzing the past to prepare for the future: Writing a literature review., 26 MIS quarterly 13–23 (2002). Open Google Scholar
  387. Christof Weinhardt, Arun Anandasivam, Benjamin Blau, Nikolay Borissov, Thomas Meinl, Wibke Michalk & Jochen Stößer, Cloud Computing – A Classification, Business Models, and Research Directions, 1 Bus. Inf. Syst. Eng. 391–399 (2009). Open Google Scholar
  388. Α. Ε. Whitley, P. L. Willcocks & W. Venters, Privacy and Security in the Cloud: A Review of Guidance and Responses, 22 Journal of International Technology and Information Management 75–92 (2013). Open Google Scholar
  389. James Q. Whitman, The Two Western Cultures of Privacy. Dignity versus Liberty, 113 The Yale Law Journal 1151–1221 (2004). Open Google Scholar
  390. Jonathan B. Wiener, The regulation of technology, and the technology of regulation, 26 Technology in Society 483–500 (2004). Open Google Scholar
  391. Andrew Keane Woods, Against Data Exceptionalism, 68 Stanford Law Review 729–789 (2016). Open Google Scholar
  392. Chaowei Yang, Qunying Huang, Zhenlong Li, Kai Liu & Fei Hu, Big Data and cloud computing. Innovation opportunities and challenges, 10 International Journal of Digital Earth 13–53 (2016). Open Google Scholar
  393. Zachary NJ Peterson, Mark Gondree, Robert Beverly, A position paper on data sovereignty: the importance of geolocating data in the cloud Proceedings of the 3rd USENIX conference on Hot topics in cloud computing (2011). Open Google Scholar
  394. Dimitrios Zissis & Dimitrios Lekkas, Addressing cloud computing security issues, 28 Future Generation Computer Systems 583–592 (2012). Open Google Scholar
  395. Lecture Open Google Scholar
  396. Dimitra Kamarinou, Christopher Millard & Jatinder Singh, Machine Learning with Personal Data (2016). Open Google Scholar
  397. Legal Commentary Open Google Scholar
  398. Dutch Lawyers ed., Privacy for the Homo Digitalis. Proposal for a New Regulatory Framework for Data Protection in the Light of Big Data and the Internet of Things (2016): Wolters Kluwer. Open Google Scholar
  399. Newspaper Articles Open Google Scholar
  400. Ibrahim Hasan, New EU data protection regulation Law Society Gazette (2016). Open Google Scholar
  401. C. Tuna, Ellison and Benioff Spar Over Cloud Credentials Wall Street Journal (2010). Open Google Scholar
  402. Press Releases Open Google Scholar
  403. eHealth Governance Initiative, DISCUSSION PAPER ON SEMANTIC AND TECHNICAL INTEROPERABILITY (2012). Open Google Scholar
  404. Digital Agenda in the Europe 2020 strategy (2012). Open Google Scholar
  405. Reports or Gray Literature Open Google Scholar
  406. Response to the UK Ministry of Justice’s Call for Evidence on the European Commission’s Data Protection Proposals (2012). Open Google Scholar
  407. DER HESSISCHE DATENSCHUTZBEAUFTRAGTE, Key data protection points for the trilogue on the General Data Protection Regulation (2015). Open Google Scholar
  408. Luciana Duranti, Trust in online records and data. Integrity in Government through Records Management: Essays in Honour of Anne Thurston. Open Google Scholar
  409. European Commission, Working Paper No. 2: Data protection laws in the EU: The difficulties in meeting the challenges posed by global social and technical developments (2010). Open Google Scholar
  410. European Parliament, Report on the First Report on the implementation of the Data Protection Directive (95/46/EC) (COM(2003) 265 – C5-0375/2003 – 2003/2153(INI)) (2004). Open Google Scholar
  411. Primavera De Filippi & Internet Policy Review, Foreign clouds in the European sky: how US laws affect the privacy of Europeans (2013): HIIG – Alexander von Humboldt Institute for Internet and Society. Open Google Scholar
  412. Inc. Gartner, Cloud Computing Confusion Leads to Opportunity (2008). Open Google Scholar
  413. Urs Gasser, Cloud Innovation and the Law: Issues, Approaches, and Interplay (2014). Open Google Scholar
  414. Graham Greenleaf, Major Changes in Asia Pacific Data Privacy Laws: 2011 Survey (2012). Open Google Scholar
  415. Douwe Korff, EC Study on Implementation of Data Protection Directive 95/46/EC (2008). Open Google Scholar
  416. Francesca Musiani & Internet Policy Review, Decentralised internet governance: the case of a ‘peer-to-peer cloud’ (2014): HIIG – Alexander von Humboldt Institute for Internet and Society. Open Google Scholar
  417. Tim O’Reilly & John Battelle, Web Squared: Web 2.0 Five Years On. Open Google Scholar
  418. Older Adults and Technology Use (2014). Open Google Scholar
  419. Neil Robinson, Lorenzo Valeri, Jonathan Cave, Tony Starkey, Hans Graux, Sadie Creese & Paul P. Hopkins, The Cloud: Understanding the Security, Privacy and Trust Challenges. Prepared for Unit F.5, Directorate-General Information Society and Media, European Commission (2012). Open Google Scholar
  420. Osvaldo Saldias & Internet Policy Review, Cloud-friendly regulation: The EU’s strategy towards emerging economies (2013): HIIG – Alexander von Humboldt Institute for Internet and Society. Open Google Scholar
  421. Johannes Thimm, Inseparable, but not equal. Assessing U.S.-EU relations in the wake of the NSA surveillance affair, 4/2014 (2014). Berlin. Open Google Scholar
  422. A. van Cleeff, W. Pieters & R. J. Wieringa, Security Implications of Virtualization: A Literature Study, vol. 3: IEEE. Open Google Scholar
  423. Daniel J. Weitzner, Harold Abelson, Tim Berners-Lee, Chris Hanson, James Hendler, Lalana Kagal, Deborah L. McGuinness, Gerald Jay Sussman & K. Krasnow Waterman, Transparent Accountable Data Mining: New Strategies for Privacy Protection (2006). Open Google Scholar
  424. Willcocks, Leslie P., Venters, Will and Whitley, Edgar A., Cloud and the future of business: from costs to innovation: part two: challenges (2012). London. Open Google Scholar
  425. M. Zhou, R. Zhang, W. Xie, W. Qian & A. Zhou, Security and Privacy in Cloud Computing: A Survey: IEEE. Open Google Scholar
  426. Special Issue Open Google Scholar
  427. Graham Greenleaf ed., GLOBAL DATA PRIVACY LAWS: 89 COUNTRIES, AND ACCELERATING. Special Supplement, Issue 115 (2012). Open Google Scholar

Similar publications

from the topics "Data Protection Law & Information Law & Digital Law", "Law General, Comprehensive Works and Collections"
Cover of book: Data Act und Datenschutz
Book Titles No access
Marc-Philipp Geiselmann
Data Act und Datenschutz
Cover of book: Die Rolle des Gerichts im Rahmen des Prozessvergleichs
Book Titles No access
Adomas Jankauskis
Die Rolle des Gerichts im Rahmen des Prozessvergleichs
Cover of book: Kostenübersichtstabellen
Book Titles No access
Manfred Schmeckenbecher, Karin Scheungrab
Kostenübersichtstabellen
Cover of book: Taschen-Definitionen
Educational Book No access
Nomos Verlag
Taschen-Definitionen
Cover of book: Das Afterpfandrecht
Book Titles No access
Michael Moser
Das Afterpfandrecht