Academic and related sources
1997. Technology and Privacy: The New Landscape. Cambridge, MA, MIT Press.
2003. Why Privacy Isn’t Everything: Feminist Reflections on Personal Accountability. Lanham, MD, Rowman & Littlefield.
1991. How Privacy Got Its Gender. Northern Illinois Law Review 10: 441–71.
2007. Super Crunchers: How Anything Can Be Predicted. London, John Murray.
2009. Total Recall: How the E-Memory Revolution Will Change Everything. New York, Dutton.
2010a. Collaborative Consent: Harnessing the Strengths of the Internet for Consent in the Online Environment. International Review of Law, Computers & Technology 24: 287–98.
2010b. Web 2.5: The Symbiotic Web. International Review of Law, Computers & Technology 24: 25–37.
2011b. Rise and Phall: Lessons from the Phorm Saga, in , , and (eds.) Computers, Privacy and Data Protection: An Element of Choice. Dordrecht, Springer: 269–83.
2014. The EU, the US and the Right to be Forgotten, in , and (eds.) Computers, Privacy and Data Protection – Reloading Data Protection. Dordrecht, Springer: 61–77.
2000. Weaving the Web: The Original Design and Ultimate Destiny of the World Wide Web by its Inventor. New York, HarperCollins Publishers.
1998. The Transparent Society: Will Technology Force Us to Choose Between Privacy and Freedom?Reading, MA, Addison-Wesley.
2010. Communications Data Retention in an Evolving Internet. International Journal of Law and Information Technology 19.
2012. Government Access to Private-Sector Data in the United Kingdom. International Data Privacy Law 2: 9.
2010. A Study on the Lack of Enforcement of Data Protection Acts, in and (eds.) Next Generation Society. Technological and Legal Issues. Berlin, Springer, pp. 3–12.
, , , and
1997. Privacy in the Information Age. Washington, DC, Brookings Institution Press.
1998. The Extended Mind. Analysis 58: 10–23.
2007. Animal Rights and Animal Experiments: An Interest-Based Approach. Res Publica 13: 26.
2012. Configuring the Networked Self: Law, Code, and The Play of Everyday Practice. New Haven, CT., Yale University Press.
1987. Persuasive Advertising, Autonomy, and the Creation of Desire. Journal of Business Ethics 6: 413–18.
2009. ‘It All Happened So Slowly’ – On Controlling Function Creep in Forensic DNA Databases. International Journal of Law, Crime and Justice 37: 83–103.
1997. Re-engineering the Right to Privacy: How Privacy Has Been Transformed from a Right to a Commodity, in and (eds.) Technology and Privacy: The New Landscape. Cambridge, MA, MIT Press, pp. 143–65.
2000. Law and the Internet: A Framework for Electronic Commerce. Oxford, Hart.
1999. What is Identity (as We Now Use the Word)?Mimeo, Inc., Stanford University.
1818. Memoirs of the Life and Writings of Benjamin Franklin. London, Henry Colburn.
2012. The Chilling Effect of Counter-Terrorism Measures: A Comparative Analysis of Electronic Surveillance Laws in Europe and the USA, in , , and (eds.) Freedom of Expression – Essays in Honour of Nicolas Bratza – President of the European Court of Human Rights. Oisterwijk, Wolf Legal Publishers, pp. 463–81.
1993. The Panoptic Sort: A Political Economy of Personal Information, Boulder, CO, Westview.
2006. Can Human Rights Survive?Cambridge University Press.
1982. Human Rights: Essays on Justification and Applications. London, University of Chicago Press.
2009. Detecting Influenza Epidemics Using Search Engine Query Data. Nature 457: 1012–14.
, , , , and
2008. Function Creep – Defined and Still Dangerous in Australia’s Revised ID Card Bill. Computer Law & Security Report 24: 56–65.
1955. Are There Any Natural Rights?Philosophical Review 64: 175–91.
2001. Philippic.com. California Law Review 90: 70.
2001. Regulating Reproduction: Law, Technology and Autonomy. Oxford, Hart.
1990. Utilitarianism and Distributive Justice: Jeremy Bentham and the Civil Law. Oxford, Clarendon.
2010. FRA and the European Convention on Human Rights – A Paradigm Shift in Swedish Electronic Surveillance Law, in (ed.) Nordic Yearbook of Law and Information Technology. Bergen, Fagforlaget, pp. 96–134.
2000. Values for a Godless Age: The Story of the UK’s New Bill of Rights. London, Penguin.
2013. The Way to Luxembourg: National Court Decisions on the Compatibility of the Data Retention Directive with the Rights to Privacy and Data Protection. SCRIPTed 10: 24.
2011. Surveillance or Security? The Real Risks Posed by New Wiretapping Technologies. Cambridge, MA, The MIT Press.
2006. Code: Version 2.0. New York, Basic Books.
1981. After Virtue: A Study in Moral Theory. London, Duckworth.
2008. Internet Filtering: Rhetoric, Legitimacy, Accountability and Responsibility, in and (eds.) Regulating Technologies. Oxford, Hart Publishing, pp. 109–24.
2009. Delete: The Virtue of Forgetting in the Digital Age. Princeton University Press.
, , , and
1982. On Liberty. Harmondsworth, Penguin.
2003. Virtual Inequality: Beyond the Digital Divide. Washington, DC, Georgetown University Press.
2004. Should States Have a Right to Informational Privacy? In and (eds.) Human Rights in the Digital Age. London, The Glasshouse Press, pp. 191–202.
2006. The Regulation of Cyberspace: Control in the Online Environment, Milton Park, Abingdon, UK, and New York, Routledge-Cavendish.
2011. Transparency, Scrutiny and Responsiveness: Fashioning a Private Space. Political Quarterly 83: 509–14.
2013. Information Technology Law: The Law and Society, 2nd ed., Oxford University Press.
2008. Robust De-anonymization of Large Sparse Datasets. IEEE Symposium on Security and Privacy.
2010. Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford, CA, Stanford Law Books.
2001. Digital Divide: Civic Engagement, Information Poverty, and the Internet Worldwide. Cambridge University Press.
2010. Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization. UCLA Law Review 57: 1701–78.
1791. Rights of Man: Being an Answer to Mr. Burke’s Attack on the French Revolution. Dublin, s.n.
2011. The Filter Bubble: What the Internet is Hiding From You. London, Viking.
1998. Economic Analysis of Law, Boston, MA, Aspen Law & Business.
2008. Review of Information Security at HM Revenue and Customs. London, HMSO.
1999. Collected Papers. Cambridge, MA, Harvard University Press.
1986. The Morality of Freedom. Oxford, Clarendon.
2004. Internet Law: Text and Materials. Cambridge University Press.
2010. Think Global, Act Local: Extraterritoriality in Cyberspace. Working Paper Series, Queen Mary University of London School of Law.
2012. Making Laws for Cyberspace. Oxford University Press.
2005. The Course of Recognition. Cambridge, MA, Harvard University Press.
1993. Human Rights, Rationality and Sentimentality, in and (eds.) On Human Rights: Oxford Amnesty Lectures. Oxford: BasicBooks: 167–85.
2012. The Right to be Forgotten. Stanford Law Review Online, 64.
2000. Privacy as Intellectual Property. Stanford Law Review 52: 1125–75.
2012. Safety First: the Ryan Giggs Superinjunction Part 2 of March 2012. Communications Law 17: 3.
2007. ‘I’ve Got Nothing to Hide’ and Other Misunderstandings of Privacy. San Diego Law Review 44: 745–72.
2011. Nothing to Hide: The False Tradeoff Between Privacy and Security. New Haven, CT, Yale University Press.
2007. Republic.com 2.0. Princeton University Press.
1997. Weaving Technology and Policy Together To Maintain Confidentiality. Journal of Law, Medicine and Ethics 25: 98–110.
1992. The Ethics of Authenticity. Cambridge, MA, Harvard University Press.
1994. Reasonable Care: Legal Perspectives on the Doctor–Patient Relationship. Oxford, Clarendon Press;New York, Oxford University Press.
2013. Me, Myself and I: Aggregated and Disaggregated Identities on Social Networking Services. Journal of International Commercial Law and Technology 8: 118–33.
2013. The Draft EU General Data Protection Regulation: Costs and Paradoxes of Explicit Consent. Washington, DC, Future of Privacy Forum.
2008. Data Sharing Review Report. London, Ministry of Justice.
2008. The Sex Offender ‘Register’: A Case Study in Function Creep. The Howard Journal 47: 227–37.
1996. Life on the Screen: Identity in the Age of the Internet. London, Weidenfeld & Nicolson.
2009. Americans Reject Tailored Advertising. Annenberg, University of Pennsylvania.
, , , and
2011. The Googlization of Everything: (And Why We Should Worry), Berkeley, University of California Press.
2005. Predicting Online-Purchasing Behaviour. European Journal of Operational Research 166: 557–75.
2009. Data Retention in the UK: Pragmatic and Proportionate, or a Step too Far?Computer Law & Security Review 25: 325–34.
1890. The Right to Privacy. Harvard Law Review 4: 193–220.