هذه الوحدة التعليمية هي مورد مرجعي للمحاضرين
قراءات متقدمة
يُوصى الطلبة الراغبون في الاطلاع على مزيد من التفاصيل عن مواضيع هذه الوحدة، ويُوصى المدرسون القائمون بتدريس هذه الوحدة التعليمية بقراءة المراجع التالية:
- Brunton, Finn and Helen Nissbaum. (2015). Obfuscation: A User's Guide for Privacy and Protest. MIT Press.
- Chatelain, Yannick. (2018). Darknet: faut-il démanteler la revente illégale de la liberté de s'exprimer et de s'informer? The Conversation, 5 July 2018.
- Gerry, Felicity, Julia Muraszkiewicz, and Niovi Vavoula. (2016). The role of technology in the fight against human trafficking: Reflections on privacy and data protection concerns. Computer Law & Security Review, Vol. 32(2), 205-217.
- Joyce, Daniel. (2015). Privacy in the Digital Era: Human Rights Online? Melbourne Journal of International Law, Vol.16, 270-285.
- Koops Bert-Jaap, Bryce Clayton Newell, Tjerk Timan, Ivan Škorvánek, Tomislav Chokrevski, and Maša Galič. (2017). A typology of privacy. University of Pennsylvania Journal of International Law, Vol. 38(2), 483-575.
- McCallister, Erika, Timothy Grance, Karen A. Scarfone. (2010). Guide to Protecting the Confidentiality of Personally Identifiable Information (PII) . NIST.
- NIST. (2017). Security and Privacy Controls for Information Systems and Organizations. Draft NIST Special Publication 800-53 .
- Security.org. A Guide to Securing Confidential Personal Data Both Online and Offline.
- Stewart, Katherine. Looking Backward, Moving Forward: What Must be Remembered When Resolving the Right to be Forgotten. Brooklyn Journal of International Law, Vol. 42(2), 843-886.
- Summers, Sarah J., Christian Schwarzenegger, Gian Ege, and Finlay Young. (2014). The Emergence of EU Criminal Law: Cyber Crime and the Regulation of the Information Society. Hart.
- Tikkinen-Piri, Christina, Anna Rohunen, and Jouni Markula. (2018). EU General Data Protection Regulation: Changes and implications for personal data collecting companies. Computer Law & Security Review, Vol. 34(1), 134-153.
- Vaciago, Giuseppe. (2012). ISPs and Civil Liberties: The "Reasonable Expectation of Privacy" of Twitter's User from People v. Harris. Computer Law Review International, Vol. 13(5), 137-141.
التالي: تقييم أداء الطلبة
العودة إلى الأعلى