References
- Abbott, Kenneth W., and Duncan Snidal. 2000. “Hard and Soft Law in International Governance.” International Organization 54 (3): 421–456. doi: 10.1162/002081800551280
- Article 29 Working Party. 1999. “ Recommendation 1/99 on Invisible and Automatic Processing of Personal Data on the Internet Performed by Software and Hardware.” http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/1999/wp17_en.pdf.
- Article 29 Working Party. 2000a. “ Working Document Privacy on the Internet – An Integrated EU Approach to On-line Data Protection.” http://ec.europa.eu/justice/policies/privacy/docs/wpdocs/2000/wp37en.pdf.
- Article 29 Working Party. 2000b. “ Opinion 7/2000 on the European Commission Proposal for a Directive of the European Parliament and of the Council Concerning the Processing of Personal Data and the Protection of Privacy in the Electronic Communications Sector.” http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2000/wp36_en.pdf.
- Article 29 Working Party. 2002. “ Opinion 2/2002 on the Use of Unique Identifiers in Telecommunication Terminal Equipments: The example of IPv6.” http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2002/wp58_en.pdf.
- Article 29 Working Party. 2003. “ Opinion 3/2003 on the European Code of Conduct of FEDMA for the Use of Personal Data in Direct Marketing.” http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2003/wp77_en.pdf.
- Article 29 Working Party. 2004. “ Opinion 5/2004 on Unsolicited Communications for Marketing Purposes Under Article 13 of Directive 2002/58/EC.” http://ec.europa.eu/justice/policies/privacy/docs/wpdocs/2004/wp90_en.pdf.
- Article 29 Working Party. 2006. “ Opinion 2/2006 on Privacy Issues Related to the Provision of Email Screening Services.” http://ec.europa.eu/justice/policies/privacy/docs/wpdocs/2006/wp118_en.pdf.
- Article 29 Working Party. 2007. “ Opinion 4/2007 on the Concept of Personal Data.” http://ec.europa.eu/justice/policies/privacy/docs/wpdocs/2007/wp136_en.pdf.
- Article 29 Working Party. 2010. “ Opinion 2/2010 on Online Behavioural Advertising.” http://ec.europa.eu/justice/policies/privacy/docs/wpdocs/2010/wp171_en.pdf.
- Asscher, Lodewijk F., and Sjo Anne Hoogcarspel. 2006. Regulating Spam: A European Perspective after the Adoption of the E-Privacy Directive. Hague: Asser Press.
- Berners-Lee, Tim, Roy Fielding, and Henrik Frystyk. 1996. Hypertext Transfer Protocol--HTTP/1.0. No. RFC 1945. IETF. https://tools.ietf.org/html/rfc1945.
- Brunton, Finn. 2013. Spam: A Shadow History of the Internet. Cambridge: MIT Press.
- Bucher, Taina. 2014. “About a Bot: Hoax, Fake, Performance art.” M/C Journal 17 (3). http://journal.media-culture.org.au/index.php/mcjournal/article/viewArticle/814.
- Coleman, E. Gabriella. 2013. Coding Freedom: The Ethics and Aesthetics of Hacking. Princeton, NJ: Princeton University Press.
- Council of Europe. 1950. “Convention for the Protection of Human Rights and Fundamental Freedoms.” http://www.echr.coe.int/Documents/Convention_ENG.pdf.
- Debusseré, Frederic. 2005. “The EU E-Privacy Directive: A Monstrous Attempt to Starve the Cookie Monster?.” The International Journal of Law and Information Technology 13 (1): 70–97. doi: 10.1093/ijlit/eai003
- DeNardis, Laura. 2007. “The History of Computer Security.” In The History of Information Security: A Comprehensive Handbook, edited by Karl De Leeuw and Jan Bergstra, 681–705. Amsterdam: Elsevier.
- Elmer, Greg. 2003. Profiling Machines: Mapping the Personal Information Economy. Cambridge: MIT Press.
- Eurobarometer. 1997. “ Information Technology and Data Privacy.” http://ec.europa.eu/COMMFrontOffice/PublicOpinion/index.cfm/Survey/getSurveyDetail/yearFrom/1973/yearTo/1997/surveyKy/164.
- Eurobarometer. 2003. “ Data Protection.” http://ec.europa.eu/COMMFrontOffice/PublicOpinion/index.cfm/Survey/getSurveyDetail/yearFrom/1973/yearTo/2003/surveyKy/325.
- Eurobarometer. 2008. “ Data Protection in the European Union Citizens’ Perceptions Analytical Report.” http://ec.europa.eu/COMMFrontOffice/PublicOpinion/index.cfm/Survey/getSurveyDetail/yearFrom/2008/yearTo/2009/surveyKy/667/p/2.
- European Commission. 2001. “ Unsolicited Commercial Communications and Data Protection.” http://ec.europa.eu/justice/data-protection/document/studies/files/20010202_spamstudy_en.pdf.
- European Commission. 2004. “ Communication from the Commission to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions on Unsolicited Commercial Communications or ‘spam’.” http://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52004DC0028&from=EN.
- Federation of European Direct Marketing. 2003. “ European Code of Practice for the Use of Personal Data in Direct Marketing.” http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2003/wp77-annex_en.pdf.
- Galloway, Alexander R. 2004. Protocol: How Control Exists after Decentralization. Cambridge: MIT press.
- Gehl, Robert W. 2013. “The Computerized Socialbot Turing Test: New Technologies of Noopower.” doi:10.2139/ssrn.2280240.
- Goldberg, Matthew A. 2005. “Googling of Online Privacy: Gmail, Search-Engine Histories and the New Frontier of Protecting Private Information on the Web.” The Lewis & Clark Law Review 9: 249–272.
- Goodman, Joseph W. 2006. Telecommunications Policy-Making in the European Union. Cheltenham: Edward Elgar.
- Kierkegaard, Sylvia Mercado. 2005. “How the Cookies (almost) Crumbled: Privacy & Lobbyism.” Computer Law & Security Review 21 (4): 310–322. doi: 10.1016/j.clsr.2005.06.002
- Kristol, David M., and Lou Montulli. 1997. “ RFC 2109 – HTTP State Management Mechanism.” IETF. https://www.ietf.org/rfc/rfc2109.txt.
- Lessig, Lawrence. 1999. Code and Other Laws of Cyberspace. New York: Basic Books.
- Lindberg, G. 1999. “ RFC 2505 – Anti-Spam Recommendations for SMTP MTAs.” IETF. https://tools.ietf.org/html/rfc2505.
- Lovink, Geert. 2011. Networks Without a Cause: A Critique of Social Media. Cambridge: Polity Press.
- McStay, Andrew. 2013. “I Consent: An Analysis of the Cookie Directive and its Implications for UK Behavioral Advertising.” New Media & Society 15 (4): 596–611. doi: 10.1177/1461444812458434
- Moustakas, Evangelos, Chandrasekaran Ranganathan, and Penny Duquenoy. 2005. “Combating Spam Through Legislation: A Comparative Analysis of US and European Approaches.” 2nd Conference on Email and Anti-Spam (CEAS 2005) - Stanford University, Palo Alto, CA, USA in Cooperation with the International Association for Cryptologic Research and the IEEE Technical Committee on Security and Privacy, July 21–22.
- Mueller, Milton L. 2010. Networks and States: The Global Politics of Internet Governance. Cambridge: MIT Press.
- OECD Task Force on Spam. 2005. Anti-Spam Regulation. http://www.oecd.org/sti/ieconomy/35670414.pdf.
- Parikka, Jussi, and Tony D. Sampson, eds. 2009. The Spam Book: On Viruses, Porn, and Other Anomalies from the Dark Side of Digital Culture. New York: Hampton Press.
- Postel, Jon. 1981. “Internet Protocol.” IETF. http://tools.ietf.org/html/rfc791?AFRICACIEL=djc4hn3j5o9hjth7cdv1q8v936.
- Sarikakis, Katharine. 2004. “Ideology and Policy: Notes on the Shaping of the Internet.” First Monday 9 (8), http://www.ojphi.org/ojs/index.php/fm/article/view/1167/1087. doi: 10.5210/fm.v9i8.1167
- Schryen, Guido. 2007. Anti-Spam Measures. Berlin: Springer.
- Schwartz, John. 2001. “Giving the Web a Memory Cost its Users Privacy.” New York Times, September 4. http://www.nytimes.com/2001/09/04/technology/04COOK.html?pagewanted=1.
- Senden, Linda AJ. 2005. “Soft Law, Self-Regulation and Co-regulation in European Law: Where do They Meet?” Electronic Journal of Comparative Law 9 (1). http://ejcl.org/91/art91-3.html.
- Shah, Rajiv C., and Jay P. Kesan. 2009. “Recipes for Cookies: How Institutions Shape Communication Technologies.” New Media & Society 11 (3): 315–336. doi: 10.1177/1461444808101614
- Smit, Edith G., Guda Van Noort, and Hilde A. M. Voorveld. 2014. “Understanding Online Behavioural Advertising: User Knowledge, Privacy Concerns and Online Coping Behaviour in Europe.” Computers in Human Behavior 32: 15–22. doi: 10.1016/j.chb.2013.11.008
- Smith, Richard M. 1999. “The Web Bug FAQ.” EFF. https://w2.eff.org/Privacy/Marketing/web_bug.html.
- Tene, Omer, and Jules Polenetsky. 2012. “To Track or Do Not Track: Advancing Transparency and Individual Control in Online Behavioral Advertising.” Minnesota Journal of Law, Science & Technology 13 (1): 282–321.
- Turow, Joseph. 2012. The Daily you: How the New Advertising Industry is Defining Your Identity and Your Worth. New Haven, CT: Yale University Press.