Privacy Law Search

International legal search engine on data privacy

Bibliography

PRIVACY AND DATA PROTECTION LAW

General Books

Bennett, C. J., & Raab, C. D. (2006). The Governance of Privacy: Policy Instruments in Global Perspective MIT Press.

Bygrave, L. A. (2014). Data Privacy Law: An International Perspective. Oxford University Press.

Greenleaf, G. (2014). Asian Data Privacy Laws: Trade and Human Rights Perspectives. Oxford University Press.

Kuner, C. (2020). Transborder Data Flows and Data Privacy Law (2nd ed.). Oxford University Press.

Solove, D. J., & Schwartz, P. M. (2020). Information Privacy Law (7th ed.). Aspen Publishers.

Articles

Bakare, S. S., Adeniyi, A. O., Akpuokwe, C. U., & Eneh, N. E. (2024). Data privacy laws and compliance: a comparative review of the EU GDPR and USA regulations. Computer Science & IT Research Journal, 5(3), 528-543.

Bamberger, K. A., & Mulligan, D. K. (2011). "Privacy on the Books and on the Ground". Stanford Law Review, 63, 247-316.

Custers, B., Louis, L., Spinelli, M. and Terzidou, K. (2022). "Quis custodiet ipsos custodes? Data protection in the judiciary in EU and EEA Member States". International Data Privacy Law, 12(2), 93–112.

De Hert, P., & Papakonstantinou, V. (2012). "The New General Data Protection Regulation: Still a Sound System for the Protection of Individuals?". Computer Law & Security Review, 28(2), 130-142.

González Fuster, G. (2014). "The Emergence of Personal Data Protection as a Fundamental Right of the EU". Springer.

Hildebrandt, M. (2020). "Privacy and Data Protection - Law for Computer Scientists and Other Folk". Oxford Academic, 99-162.

Lynskey, O. (2015). "The Foundations of EU Data Protection Law". Oxford University Press.

Popowicz-Pazdej, A. (2021). "The proportionality principle in privacy and data protection law". Journal of Data Protection & Privacy, 4 (3), 322-331.

Schwartz, P. M. (2013). "The EU-US Privacy Collision: A Turn to Institutions and Procedures". Harvard Law Review, 126(7), 1966-2009.

Solove, D. J., & Schwartz, P. M. (2020). Information privacy law. Aspen Publishing.

Reports and White Papers

European Commission. (2020). "Data Protection in the EU".

Future of Privacy Forum (FPF). (2020). "Comparative Study on GDPR and CCPA".

International Association of Privacy Professionals (IAPP). (2021). "Global Legislative Predictions".

Organisation for Economic Co-operation and Development (OECD). (2013). "OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data".

United Nations Conference on Trade and Development (UNCTAD). (2016). "Data Protection Regulations and International Data Flows: Implications for Trade and Development".

DATA TRANSFER: INTERNATIONAL CERTIFICATION FRAMEWORKS

Books

Heye, J., & Huber, M. (2017). ISO 9001:2015 – A Complete Guide to Quality Management Systems.

Hoyle, D. (2009). ISO 9000 Quality Systems Handbook (6th ed.).

ISO. (2015). ISO/IEC 27001:2013 – Information Technology – Security Techniques – Information Security Management Systems – Requirements.

Jung, W., & Mo, J. P. T. (2018). International Standards for Design and Manufacturing: Quality Management and International Best Practices.

Krut, R., & Gleckman, H. (1998). ISO 14001: A Missed Opportunity for Sustainable Global Industrial Development.

Journal Articles

Bernardo, M., Simon, A., Tarí, J. J., & Molina-Azorín, J. F. (2015). "Benefits of Management Systems Integration: A Literature Review". Journal of Cleaner Production, 94, 260-267.

da Silva, P. P. M., & Mendes, G. H. S. (2019). "The Impact of ISO 9001:2015 Certification on Organizational Performance: A Quantitative Study". Total Quality Management & Business Excellence, 30(11-12), 1380-1395.

Gochhayat, S. P., Lal, C., Sharma, L., Sharma, D. P., Gupta, D., Saucedo, J. A. M., & Kose, U. (2020). Reliable and secure data transfer in IoT networks. Wireless Networks, 26(8), 5689-5702.

Heras-Saizarbitoria, I., & Boiral, O. (2013). "ISO 9001 and ISO 14001: Towards a Research Agenda on Management System Standards". International Journal of Management Reviews, 15(1), 47-65.

Marimon, F., Heras-Saizarbitoria, I., & Casadesús, M. (2010). "ISO 9000 and ISO 14000 Standards: A Projection Model for the Decline Phase". Total Quality Management & Business Excellence, 21(3), 235-248.

Matus, K. J., & Veale, M. (2022). Certification systems for machine learning: Lessons from sustainability. Regulation & Governance, 16(1), 177-196.

Rodríguez-Escobar, J. A., & González-Benito, J. (2012). "The Effect of Advanced Logistics and ISO 9000 on the Financial Performance of the Firm". Production Planning & Control, 23(6), 457-472.

Reports and Standards

British Standards Institution (BSI). (2018). "BS 10012:2017+A1:2018 Data Protection – Specification for a Personal Information Management System".

European Commission. (2020). "EU Cybersecurity Act: Overview of Certification Framework".

International Electrotechnical Commission (IEC). (2013). "ISO/IEC 27001:2013 Information Security Management".

International Organization for Standardization (ISO). (2015). "ISO 9001:2015 Quality Management Systems – Requirements".

ISO. (2021). "ISO Survey of Certifications – 2020".

CYBERSECURITY

Books

Brenner, S. W. (2014). Cybercrime and the Law: Challenges, Issues, and Outcomes. Northeastern University Press.

Clarke, R. A., & Knake, R. K. (2014). Cyber War: The Next Threat to National Security and What to Do About It. Ecco.

Goodman, M., & Lin, H. (2018). A Framework for Understanding Cybersecurity Law and Policy. Harvard University Press.

Schjolberg, S. (2020). Cybercrime Law: The Legal Response to Cybercrime. Bookboon.

Walden, I. (2019). Computer Crimes and Digital Investigations (3rd ed.). Oxford University Press.

Journal Articles

Hathaway, O. A., & Crootof, R. (2012). "The Law of Cyber-Attack". California Law Review, 100(4), 817-886.

Reidenberg, J. R. (2014). "Resolving Conflicting International Data Privacy Rules in Cyberspace". Stanford Law Review, 52(5), 1315-1371.

Sarker, I. H., Kayes, A. S. M., Badsha, S., Alqahtani, H., Watters, P., & Ng, A. (2020).

Cybersecurity data science: an overview from machine learning perspective. Journal of Big data, 7, 1-29.

Sofaer, A. D., & Goodman, S. E. (2001). "Cyber Crime and Security: The Transnational Dimension". Transnational Law & Contemporary Problems, 11(2), 199-225.

Svantesson, D. J. B. (2013). "Extraterritoriality in Data Privacy Law". Masaryk University Journal of Law and Technology, 7(1), 87-98.

Taherdoost, H. (2022). "Understanding Cybersecurity Frameworks and Information Security Standards—A Review and Comprehensive Overview". Electronics 11(14), 2181.

Wylde, V., Rawindaran, N., Lawrence, J., Balasubramanian, R., Prakash, E., Jayal, A., ... & Platts, J. (2022). Cybersecurity, data privacy and blockchain: A review. SN computer science, 3(2), 127.

Reports and White Papers

Council of Europe. (2001). "Convention on Cybercrime (Budapest Convention)".

European Union Agency for Cybersecurity (ENISA). (2020). "ENISA Threat Landscape Report 2020".

International Telecommunication Union (ITU). (2018). "Global Cybersecurity Index (GCI) 2018".

National Institute of Standards and Technology (NIST). (2018). "Framework for Improving Critical Infrastructure Cybersecurity".

World Economic Forum. (2020). "Global Risk Report 2020".