Yoo, Christopher S., The Changing Patterns of Internet Usage, 63 Fed.Comm. L.J. 67 (2010).
Wugmeister, Miriam, Karin Retzer & Cynthia Rich, Global Solution forCross-border Data Transfers: Making the Case for CorporatePrivacy Rules, 38 Geo. J. Int'l L. 449 (2007).
Wittow, Mark H. & Daniel J. Buller, Cloud Computing: Emerging LegalIssues for Access to Data, Anywhere, Anytime, 14 No. 1 J.Internet L. 1 (2010).
Whitman, James Q., The Two Western Cultures of Privacy: DignityVersus Liberty, 113 Yale L.J. 1151 (2004).
Warren, Samuel D. & Louis D. Brandeis, The Right to Privacy, 4 Harv.L. Rev. 193 (1890).
Vouk, Mladen A., Cloud Computing-Issues, Research andImplementations, 16 J. Computing & Info. Tech. 235 (2008).
Van Hoboken, Joris V. J. & Ira S. Rubinstein, Privacy and Security inthe Cloud: Some Realism about Technical Solutions toTransnational Surveillance in the Post-Snowden Era, 66 Me.L. Rev. 487 (2014).
Uniting and Strengthening America by Providing Appropriate ToolsRequired to Intercept and Obstruct Terrorism Act of 2001(USA PATRIOT Act).
United States Internationl Trade Commission, Policy Challenges of Cross-BorderCloud Computing, Journal of International Commerce and Economy,2012.
Transfers of personal data to third countries: Applying Article 26 (2) ofthe EU Data Protection Directive to Binding Corporate Rulesfor International Data Transfers, adopted on June 3, 2003.
Stavridis, James & Elton C. Parker III, Sailing the Cyber Sea, Issue 65, 2ndquarter 2012.http://www.carlisle.army.mil/dime/documents/Sailing%20the%20Cybersea%20Stavridis.pdf.
Speta, James B., A Common Carrier Approach to InternetInterconnection, 54 Fed. Comm. L.J. 225 (2002).
Soghoian, Christopher, Caught in the Cloud: Privacy, Encryption, andGovernment Back Doors in the Web 2.0 Era, 8 J. Telecomm. &High Tech. L. 359 (2010).
Smith, Delbert D., The Interdependence of Computer and CommunicationsServices and Facilities: A Question of Federal Regulations, 117 U. Pa.L. Rev. 829 (1969).
Sluijs, Jasper P., Pierre Larouche & Wolf Sauter, Cloud Computing in the EUPolicy Sphere, 2011.
Schwartz, Paul M., European Data Protection Law and Restrictions onInternational Data Flows, 80 Iowa L. Rev. 471 (1995).
Ryan, W. Michael & Christopher M. Loeffler, Insights into Cloud Computing, 22No. 11 Intell. Prop. & Tech. L.J. 22 (2010).
Robison, Jeremy, Free at What Cost?: Cloud Computing Privacy Under theStored Communications Act, 98 Geo. L.J. 1195 (2010).
Robinson, Gustavus H., The Pubulic Utility Concept in American Law, 41Harv. L. Rev. 277 (1928).
Reilly, Steven M., Losing My Edge: The Copyrigh Implicationsn ofAudioblogging and Why Blogs Matter to the Music Industry, 12Vand. J. Ent. & Tech. L. 439 (2010).
Reidenberg Joel R. & Francoise Gamet-Pol, The Fundamental Role ofPrivacy and Confidence in the Network, 30 Wake Forest L.Rev. 105 (1995).
Rashbaum, Kenneth N., Bennett B. Borden & Theresa H. Beaumont,Outrun the Lions: A Practical Framework for Aanaysis of LegalIssues in the Evolution of Cloud Computing, 12 Ave Maria L.Rev. 71 (2014).
Proposal for a Regulation of the European Parliament and of thecouncil on the protection of individuals with regard to theprocessing of personal data and on the free movement of suchdata (General Data Protection Regulation).
Opinion 05/2012 on Cloud Computing 17, (EC) No. 01037/12, WP 196(2012), Article 29 Data Protection Working Party,
OECD Guidelines on the Protection of Privacy and Transborder Flows ofPersonal Data.
O'Reilly, James T., Homeland Security and The Future of Privacy Rights:A Commentary, 55-Jun Fed.Law. (2008).
Newman, John M., Copyright Freeconomics, 66 Vand. L. Rev. 1409(2013).
Narkiewicz, David, Legal Tech Forecast: Cloudy, with Only a Chance ofPurchasing New Sosftware, 32-APR Pa. Law. 56 (2010).
Narayanan, Vineeth, Harnessing the Cloud: International Law Implications ofCloud-Com[uting, 12 Chi. J. Int'l L. 783 (2012).
Mowbray, Miranda, The Fog over the Grimpen Mire: CloudComputing and the Law, Technology and Society, Vol. 6, no.1(2009).
Millstein, Julian S. & Matthew King, Cloud Computing and Outsourcing:Is Data Lost in the Fog?, 981 PLI/Pat 173 (2009).
Miller, Michael, Cloud Computing: Web-Based Applications That Changethe Way You Work and Collaborate Online, Que. 2008.
Mell, Peter & Tim Grance, The NIST Definition of Cloud Computing,Version 15, Nat'l Inst. Standards & Tech., 2009,http://www.nist.gov/itl/cloud/upload/cloud-def-v15.pdf.
McAllister, Breck P., Lord Hale and Business Affected with A Public Interest,43 Harv. L. Rev. 759 (1930).
Mary Meeker, David Joseph & Anant Thaker, Technology Trends, MorganStanley, 2008.
Martinez, Jenny S., Process and Substance in the “War on Terror”, 108Colum. L. Rev. 1013 (2008).
Martin, Timothy D., Hey! You! Get Off of My Cloud: Defining andProtecting the Metes and Bounds of Privacy, Security, andProperty in Cloud Computing, 92 J. Pat. & Trademark Off. Soc'y283 (2010).
M. Armbrust, A. Fox, R. Griffith, A. Joseph, R. Katz, A. Konwinski, G.Lee, D. Patterson, A. Rabkin, I. Stoica & M. Zaharia, Above theClouds: A Berkeley View of Cloud Computing, Technical ReportNo. UCB/EECS-2009-28, University of California at Berkley,USA, Feb. 10, 2009.
Lemley, Mark A., Antitrust and the Internet Standardization Problem,28 Conn. L. Rev. 1041 (1996).
Lanois, Paul, Caught in the Clouds: The WEB 2.0, Cloud Computing, andPrivacy?, 9 Nw. J. Tech. & Intell. Prop. 29 (2010).
Lametti, David, The Cloud: Bondless Digital Potential or Enclosure 3.0?, 17Va. J.L. & Tech. 190 (2012).
Kono, Toshiyuki & Paulius Jurcys, International Jurisdiction over CopyrightInfringements in the Cloud, 2012.
King, Nancy J. & V.T. Raja, What Do THey Really Know About Mein the Cloud? A Comparative Law Perspective on ProtectingPrivacy and Security of Sensitive Consumer Data, 50 Am.Bus. L.J. 413 (2013).
Kesan, Jay P. Carol M. Hayes & Masooda N. Bashir, Information Privacyand Data Control in Cloud Computing: Consumers, PrivacyPreferences, and Market Efficiency, 70 Wash. & Lee L. Rev.341 (2013).
Kemp, Richard, Trends in Information Technology Law: LookingAhead to 2010, 15 No. 1 Cyberspace Law. 9 (2010).
John Soma, Melodi Mosley Gates & Michael Smith, Bit-Wise but PrivacyFoolish: Smarter E-Messaging Technologies Call for a Return toCore Privacy Principles, 20 ALB. L.J. SCI. & Tech. 487 (2010).
Irwin, Manley R., The Computer Utility: Competition or Regulation?, 76Yale L. J. 1299 (1967).
Hondius, Frits W., Data Law in europe, 16 Stan. J. Int'l L. 87, 89 (1980).
Hon, W. Kuan & Christopher Millard, Cloud Computing vs TraditionalOutsourcing ?Key Differences, 4 (2012).
Harshbarger, Jared A., Cloud Computing Providers and Data SecurityLaws: Building Trust with United States Companies, 16 J.Tech. L. & Pol'y, 229 (2011).
Guidelines for the Regulation of Computerized Personal Data Files.
Greenleaf, Graham, The Influence of European Data Privacy StandardsOutside Europe: Implications for Globalization of Convention108, 2 Int'l Data Privacy L. 68 (2012).
Goodman, Ellen P. & Anne H. Chen, Modeling Policy for New PublicService Media Networks, 24 Harv. J.L. & Tech. 111 (2010).
Froomkin, A. Michael, Flood Control on the Information Ocean: Livingwith Anonymity, Digital Cash, and Distributed Databases, 15J.L. & Com. 395 (1996).
European Union Agency for Fundamental Rights & Council of Europe,Handbook on European Data Protection Law, 2014.
EU Data Protection Directive 95/46/EC.
Dial, Audra A. & John M. Moye, Trade Secrets in the Cloud:Assessing and Mitigating the Risks, 17 No. 11 J. Internet L. 1(2014).
Denny, William R., Survey of Recent Developments in the Law ofCloud Computing and Software as a Service Agreement, 66Bus. Law. 237 (2010).
Data Protection Act 1998.
Cross Border Privacy Rules.
Couillard, David A., Defogging the Cloud: Applying FourthAmendment Principles to Evolving Privacy Expectations inCloud Computing, 93 Minn. L. Rev. 2205 (2009).
Convention for the Protection of Individuals with regard to AutomaticProcessing of Personal Data.
Cole, Patrick E., New Challenges to the U.S. Multinational Corporarionin the European Economic Community: Data Protection Laws,17 N.Y.U. J. Int'l L. & Pol. 893 (1985).
Cohen, Julie E., Examined Lives: Informational Privacy and theSubject as Object, 52 Stan. L. Rev. 1373 (2000).
Charter of Fundamental Rights of the European Union.
Chander, Anupam & Uyen P. Le, Data Nationalism, 64 Emory L.J. 677(2015).
Carey, Peter, Data Protection Third Edition, A Practical Guide to UKand EU Law, Oxford Univerity Press, 2009.
Buyya, Rajkumar, Rajiv Ranjan & Rodrigo N. Calheiros, Modeling andSimulation of Scalable Cloud Computing Environments and theCloudSim Toolkit: Challenges and Opportunities, 7 Proc. HighPerformance Computing & Simulation Conf. 1 (2009).
Bundesdatenschutzgesetz.
Boone, M. Scott, The Past, Present, and Future of Computing and ItsImpact on Digital Rights Management, Mich. St. L. Rev. 413(2008).
Blau, George L., Seeing Through Clouds, 36-APR Wyo. Law. 42(2013).
Billings, John T., European Protectionism in Cloun Computing:Addressing Concerns over the Patriot Act, 21 CommLawConspectus 211 (2012).
Bickerstaff, Steve, Shackles on the Giant, 78 Tex. L. Rev. 1, 85 (1999).
Besunder, Alison Arden, Best Practices for Data Protection andPrivacy Leading Lawyers on Creating A Data ProtectionStrategy, Dealing with Security Breaches, and AnalyzingRecent Trend in Legislation-Assisting Business Clients withKey Data Protection and Privacy Considerations, 2009 WL4026403.
Baun, Christian, Marcel Kunze, Jens Nimis & Stefan Tai, CloudComputing, Springer-Verlag, 2010.
Barnhill, David S., Cloud Computing and Stored Communications:Another Look at Quon v. Arch Wireless, 25 Berkeley Tech.L.J. 621 (2010).
Baker, Jennifer, European Distrust of US Data Security CreatesMarket For Local Cloud Service: Europeans Worried Aboutthe US Patriot Act Prefer to Keep Their Data in the EU,2011.
Bainbridge, David, Data Protection Law Second Edition, XPL, 2005.
Andrews, Damon C. & John M. Newman, Personal Jurisdiction andChoice of Law in the Cloud, http://ssrn.com/abstract=222767.
Rajkumar, Chee Shin Yeo & Srikumar Venugopal, MarketorientedCloud Computing: Vision, Hype, and Reality for Delivering IT Servicesas Computing Utilities, Proceedings of the 10th IEEE InternationalConference on High Performance Computing and Communications,2008.
Paul M., Preemption and Privacy, 118 Yale L.J. 902 (2009).
Paul M., Information Privacy in the Cloud, 161 U. Pa. L. Rev.1623 (2013).
Paul M., From Victorian Secrets to Cyberspace Shaming, 76 U.Chi. L. Rev. 1407 (2009).
Mark A. & David McGowan, Legal Implications of NetworkEconomic Effects, 86 Cal. L. Rev. 479 (1998).