Skip to main content Accessibility help
Hostname: page-component-7479d7b7d-767nl Total loading time: 0 Render date: 2024-07-14T15:21:46.336Z Has data issue: false hasContentIssue false


Published online by Cambridge University Press:  01 August 2018

Paul Bernal
University of East Anglia
Get access


Image of the first page of this content. For PDF version, please use the ‘Save PDF’ preceeding this image.'
The Internet, Warts and All
Free Speech, Privacy and Truth
, pp. 276 - 284
Publisher: Cambridge University Press
Print publication year: 2018

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)


Primary Sources

Abelson, Harold, Anderson, Ross, Bellovin, Steven M. et al., 2015, ‘Keys Under Doormats: Mandating Insecurity by Requiring Government Access to All Data and Communications’, online at Scholar
Aguiar, Luis and Martens, Bertin, 2013, ‘Digital Music Consumption on the Internet: Evidence from Clickstream Data’, Digital Economy Working Paper 2013/04, Institute for Prospective Technological Studies.Google Scholar
Arendt, Hannah, 1951, The Origins of Totalitarianism, London: Penguin Classics Edition, 2017.Google Scholar
Austen, Jane, 1813, Pride and Prejudice, Whitehall: T. Egerton.Google Scholar
Bakunin, Mikhail, 1871, ‘What Is Authority?’, online at Scholar
Ball, James, 2017, Post-Truth: How Bullshit Conquered the World, London: Biteback Publishing Limited.Google Scholar
Bambauer, Jane R., 2014, ‘Is Data Speech?Stanford Law Review, Vol. 66, 2014.Google Scholar
Barendt, Eric, 2005, Freedom of Speech, Oxford: Oxford University Press.Google Scholar
Bastos, M. T. and Mercea, D., 2017, ‘The Brexit Botnet and User-Generated Hyperpartisan News’, Social Science Computer Review, 118, 2017, online at Scholar
Bauer, Joseph P., 2010, ‘Copyright and the First Amendment: Comrades, Combatants, or Uneasy Allies?Washington and Lee Law Review, Vol. 67, 831.Google Scholar
Bernal, P. A., 2010, ‘Web 2.5: The Symbiotic Web’, International Review of Law, Computers & Technology, Vol. 24, No. 1, March 2010.Google Scholar
Bernal, P. A., 2011, ‘A Right to Delete?’, European Journal of Law and Technology, Vol. 2, No. 2, 2011.Google Scholar
Bernal, P. A., 2014a, ‘Internet Privacy Rights: Rights to Protect Autonomy’, Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Bernal, P. A., 2014b, ‘The EU, the US and the Right to Be Forgotten’: Chapter 4 in Reloading Data Protection: Multidisciplinary Insights and Contemporary Challenges, Springer.Google Scholar
Bernal, P. A., 2016, ‘Data Gathering, Surveillance and Human Rights: Recasting the Debate’, Journal of Cyber Policy, Vol. 1, No. 2, 2016.CrossRefGoogle Scholar
Bierce, Ambrose, 1911, ‘The Devil’s Dictionary’, 1911 edition, Cleveland, Ohio: The World Publishing Company.Google Scholar
Blaine, Timothy and Boyer, Pascal, 2018, ‘Origins of Sinister Rumors: A Preference for Threat-Related Material in the Supply and Demand of Information’, Evolution and Human Behavior, Vol. 39, No. 1, 6775.CrossRefGoogle Scholar
Bond, Robert M., Fariss, Christopher J., Jones, Jason J. et al., 2012, ‘A 61-Million-Person Experiment in Social Influence and Political Mobilization’, Nature, Vol. 489, 2012.CrossRefGoogle ScholarPubMed
boyd, danah, 2014, It’s Complicated: The Social Lives of Networked Teens, New Haven and London: Yale University Press.Google Scholar
Caliskan, Aylin, Bryson, Joanna J. and Narayanan, Arvind, 2017, ‘Semantics Derived Automatically from Language Corpora Contain Human-like Biases’, Science, Vol. 356, No. 6334, 183186, online at Scholar
Carrier, Michael A. 2012, ‘SOPA, PIPA, ACTA, TPP: An Alphabet Soup of Innovation Stifling Copyright Legislation and Agreements’, 11 Northwestern Journal of Technology and Intellectual Property, Vol. 11, 2012–2013, iii.Google Scholar
Cheng, Justin, Danescu-Niculescu-Mizil, Cristian and Leskovec, Jure, 2015, ‘Antisocial Behavior in Online Discussion Communities’, Proceedings of the Ninth International AAAI Conference on Web and Social Media, online at Scholar
Cho, C.H., Martens, M.L., Kim, H. et al., 2011, ‘Astroturfing Global Warming: It Isn’t Always Greener on the Other Side of the Fence’, Journal of Business Ethics, Vol. 104, No. 571, 2011, online at Scholar
Clarke, Arthur C., 1973, Profiles of the Future, London: Indigo.Google Scholar
Clarke, Harold D., Goodwin, Matthew and Whiteley, Paul, 2017, ‘Brexit: Why Britain Voted to Leave the European Union’, Cambridge: Cambridge University Press.Google Scholar
Clifford, Damian and Ausloos, Jef, 2017, ‘Data Protection and the Role of Fairness’, CiTiP Working Paper 29/2017.Google Scholar
Cohen, Julie E., 2012, ‘Configuring the Networked Self: Law, Code and the Play of Everyday Practice’, New Haven and London: Yale University Press.Google Scholar
Cole, Simon A. and Dioso-Villa, Rachel, 2009, ‘Investigating the CSI Effect: Media and Litigation Crisis in Criminal Law Symposium: Media, Justice, and the Law’, Stanford Law Review, Vol. 6, 13351373.Google Scholar
Coleman, Gabriella, 2014, Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous, London and New York: Verso.Google Scholar
Coward, Barry, 1991, Cromwell: Profiles in Power, Harlow: Pearson Education Limited.Google Scholar
D’Ancona, Matthew, 2017, Post Truth: The New War on Truth and How to Fight Back, London: Ebury Press.Google Scholar
Dawes, Robyn M., 1979, ‘The Robust Beauty of Improper Linear Models in Decision Making’, American Psychologist, July 1979.Google Scholar
Desborough, James, 2017, Inside Gamergate: A Social History of the Gamer Revolt, Postmortem Studios.Google Scholar
Dunning, D., 2005, Self-Insight: Roadblocks and Detours on the Path to Knowing Thyself, New York: Psychology Press, online at Scholar
Edwards, Lilian and Veale, Michael, 2017, ‘Slave to the Algorithm? Why a “Right to an Explanation” Is Probably Not the Remedy You Are Looking For’, Duke Law & Technology Review, Vol. 16, No. 18, 23 May 2017.Google Scholar
Engstrom, Evan and Feamster, Nick, 2017, ‘The Limits of Filtering: A Look at the Functionality & Shortcomings of Content Detection Tools’, online at Scholar
Erskine, Thomas, 1797, ‘On Limitations to Freedom of Speech’, online at Scholar
Evans, J. A. S., 1968, ‘Father of History or Father of Lies; The Reputation of Herodotus’, The Classical Journal, Vol. 64, No. 1, October 1968, 1117.Google Scholar
Fallin, A., Grana, R. and Glantz, S. A., 2013, ‘“To Quarterback Behind the Scenes, Third-Party Efforts”: The Tobacco Industry and the Tea Party’, BMJ Tobacco Control, online at– Scholar
Fazio, Lisa K., Brashier, Nadia M., Payne, B. Keith and Marsh, Elizabeth J., 2015, ‘Knowledge Does Not Protect against Illusory Truth’, Journal of Experimental Psychology: General, Vol 144, No. 5, October 2015, 9931002.Google Scholar
Foer, Franklin, 2017, World without Mind: The Existential Threat of Big Tech, London: Jonathan Cape.Google Scholar
Frankfurt, Harry G., 2005, On Bullshit, Princeton, New Jersey and Oxford: Princeton University Press.Google Scholar
Froomkin, A. M., 1997, ‘The Internet as a Source of Regulatory Arbitrage’, in Kahin, B. and Nesson, C., eds., Borders in Cyberspace, MIT Press, 1997.Google Scholar
Galloway, Scott, 2017, The Four: The Hidden DNA of Amazon, Apple, Facebook, and Google, New York: Portfolio/Penguin.Google Scholar
Garcia, David, 2017, ‘Leaking Privacy and Shadow Profiles in Online Social Networks’, Science Advances, Vol. 3, no. 8.Google Scholar
Garton Ash, Timothy, 2009, The File, London: Atlantic Books.Google Scholar
Geiger, R.S., 2011, ‘The Lives of Bots’, in Lovink, G and Tkacz, N., eds., Critical Point of View: A Wikipedia Reader, Amsterdam: Institute of Network Cultures, online at Scholar
Giulietti, Corrado, Tonin, Mirco and Vlassopoulos, Michael, 2017, ‘Racial Discrimination in Local Public Services: A Field Experiment in the US’, Journal of the European Economic Association, 2017 (forthcoming).Google Scholar
Harcourt, Bernard E., 2015, Exposed: Desire and Disobedience in the Digital Age, Cambridge, Mass. and London: Harvard University Press.Google Scholar
Van Hoboken, Joris, 2013, ‘The Proposed Right to Be Forgotten Seen from the Perspective of Our Right to Remember,’ Freedom of Expression Safeguards in a Converging Information Environment, June 2013.Google Scholar
Horten, Monica, 2016, The Closing of the Net, Cambridge: Polity Press.Google Scholar
Howard, Philip N., Kollanyi, Bence, Bradshaw, Samantha and Neudert, Lisa-Maria, 2017, ‘Social Media, News and Political Information during the US Election: Was Polarizing Content Concentrated in Swing States?’ Data Memo from The Project on Computational Propaganda, Oxford Internet Institute, online at Scholar
Joh, Elizabeth E., 2017, ‘The Undue Influence of Surveillance Technology Companies on Policing’, N.Y.U.L. Review Online, Vol. 92.Google Scholar
Johnson, D. and Post, D., 1996, ‘Law and Borders: The Rise of Law in Cyberspace’, 48 Stanford Law Review 1367 (1996).Google Scholar
Kahan, Dan M., 2017, ‘Misinformation and Identity-Protective Cognition’, Yale Law & Economics Research Paper No. 587 (October 2, 2017), online at Scholar
Kahan, Dan M., Peters, E., Dawson, E. C. and Slovic, P., 2017, ‘Motivated Numeracy and Enlightened Self-Government’, Behavioural Public Policy 1, 2017, 5486.Google Scholar
Klang, Matthias, 2005, ‘Virtual Sit-Ins, Civil Disobedience and Cyberterrorism’, in Murray, A. D. and Klang, M., eds., Human Rights in the Digital Age, London: The Glasshouse Press.Google Scholar
Kosinski, Michal, Stillwell, David and Graepel, Thore, 2013, ‘Private Traits and Attributes Are Predictable from Digital Records of Human Behaviour’, PNAS, Vol. 110, No. 15, 2013.Google Scholar
Kramera, Adam D. I., Guillory, Jamie E. and Hancock, Jeffrey T., 2014, ‘Experimental Evidence of Massive-Scale Emotional Contagion through Social Networks’, PNAS, Vol. 111 No. 24, 2014.Google Scholar
Kulk, Stefan and Zuiderveen Borgesius, Frederik J., 2014, ‘Google Spain v. González: Did the Court Forget About Freedom of Expression?’ European Journal of Risk Regulation (2014).Google Scholar
Laidlaw, Emily B., 2012, ‘The Responsibilities of Free Speech Regulators: An Analysis of the Internet Watch Foundation’, International Journal of Law and Information Technology, Volume 20, Issue 4, 1 December 2012.CrossRefGoogle Scholar
Laidlaw, Emily B., 2015, Regulating Speech in Cyberspace: Gatekeepers, Human Rights and Corporate Responsibility, Cambridge: Cambridge University Press.Google Scholar
Lam, S. K., Uduwage, A., Dong, Z. et al., 2011, ‘WP: Clubhouse?: An Exploration of Wikipedia’s Gender Imbalance’, in Ortega, F. and Forte, A., eds., Int. Sym. Wikis, 110. ACM.Google Scholar
Lessig, L., 1999, Code and Other Laws of Cyberspace, New York: Basic Books.Google Scholar
Lessig, L., 2006, Code 2.0, New York: Basic Books.Google Scholar
Leta Jones, Meg (writing as Ambrose, M.) and Ausloos, F., 2013, ‘The Right to Be Forgotten Across the Pond’, TRPC, Journal of Information Policy, Volume 3 (2013).Google Scholar
Leta Jones, Meg (writing as Ambrose, Meg Leta), 2013, ‘It’s About Time: Privacy, Information Life Cycles, and the Right to Be Forgotten’, Stanford Technology Law Review, Vol. 16, No. 2, Winter 2013.Google Scholar
Leta Jones, Meg, 2016, Ctrl+Z: The Right to Be Forgotten, New York and London: New York University Press.Google Scholar
Light, Duncan, 2017, The Dracula Dilemma: Tourism, Identity and the State in Romania, London: Routledge.Google Scholar
Lyon, David, 2007, Surveillance Studies: An Overview, Cambridge: Polity Press.Google Scholar
Lyon, Thomas P. and Maxwell, John W., 2004, ‘Astroturf, Interest Group Lobbying and Corporate Strategy’, Journal of Economics & Management Strategy, Vol. 13. No. 4, 2004.Google Scholar
Mantilla, Karla, 2013, ‘Gendertrolling: Misogyny Adapts to New Media’, Feminist Studies 39, no. 2, 2013.Google Scholar
Mantilla, Karla, 2015, Gendertrolling: How Misogyny Went Viral, Santa Barbara: Praeger.CrossRefGoogle Scholar
Marcuse, Herbert, 1969, ‘Repressive Tolerance’, in A Critique of Pure Tolerance, Boston: Beacon Press.Google Scholar
Marthews, Alex and Tucker, Catherine E., 2017, ‘Government Surveillance and Internet Search Behavior’ (February 17, 2017). On SSRN: Scholar
Marx, Gary T., 2016, Windows into the Soul: Surveillance and Society in an Age of High Technology, Chicago: The University of Chicago Press.CrossRefGoogle Scholar
Matz, S. C., Kosinski, M, Nave, G. and Stillwell, D. J., 2017, ‘Psychological Targeting as an Effective Approach to Digital Mass Persuasion’, Proceedings of the National Academy of Sciences of the United States of America.Google Scholar
Mayer-Schönberger, Viktor, 2009, Delete: The Virtue of Forgetting in the Digital Age, Princeton: Princeton University Press.Google Scholar
McNally, Raymond T., 1991, ‘An Historical Appraisal of the Image of Vlad Țepeş in Contemporary Romanian Folklore’, in Dracula: Essays on the Life and Times of Vlad Țepeş, Treptow, Kurt W. (ed.), New York: Columbia University Press.Google Scholar
Mill, J. S., 1859, On Liberty, Seattle: Amazon Classics Edition.Google Scholar
Moreham, N. A., 2006, ‘Privacy in Public Places’, Cambridge Law Journal, 65(3), 606.Google Scholar
Morozov, Evgeny, 2012, The Net Delusion: How Not to Liberate the World, London: Penguin.Google Scholar
Morozov, Evgeny, 2013, To Save Everything, Click Here: Technology, Solutionism and the Urge to Fix Problems That Don’t Exist, London: Penguin.Google Scholar
Morrill, John, 2007, Oliver Cromwell, Oxford: Oxford University Press.Google Scholar
Mota, Sue Ann, 2002, ‘The U.S. Supreme Court Addresses the Child Pornography Prevention Act and Child Online Protection Act in Ashcroft v. Free Speech Coalition and Ashcroft v. American Civil Liberties Union’, Federal Communications Law Journal: Vol. 55: Iss. 1, Article 4.Google Scholar
Munger, Kevin, 2017, ‘Tweetment Effects on the Tweeted: Experimentally Reducing Racist Harassment’, Political Behavior (2017) 39: 629.Google Scholar
Murray, A. D., 2016, Information Technology Law: The Law and Society, 3rd edn, Oxford: Oxford University Press.Google Scholar
Narayanan, Arvind and Shmatikov, Vitaly, 2008, ‘Robust De-Anonymization of Large Sparse Datasets’, Proceedings of the IEEE Symposium on Security and Privacy, pp. 111125.Google Scholar
Nissenbaum, Helen, 2010, Privacy in Context: Technology, Policy and the Integrity of Social Life, Stanford: Stanford Law Books.Google Scholar
Naughton, John, 2000, A Brief History of the Future: The Origins of the Internet, London: Phoenix.Google Scholar
Ohm, Paul, 2009, ‘Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization’, UCLA Law Review, Vol. 57, p. 1701, 2010.Google Scholar
Pariser, Eli, 2011, The Filter Bubble: What the Internet Is Hiding from You, London: Viking.Google Scholar
Pasquale, Frank, 2015, The Black Box Society: The Secret Algorithms that Control Money and Information, Cambridge Mass. and London: Harvard University Press.Google Scholar
Patrick, J. J., 2017, Alternative War, Cynefin Road.Google Scholar
Penney, Jonathon W., 2016, ‘Chilling Effects: Online Surveillance and Wikipedia Use’, Berkeley Technology Law Journal, 2016 Vol 31, Issue 1.Google Scholar
Penney, Jonathon W., 2017, ‘Internet Surveillance, Regulation, and Chilling Effects Online: A Comparative Case Study’, Internet Policy Review, 2017, Volume 6, Issue 2.CrossRefGoogle Scholar
Pennycook, G., Cannon, T. D. and Rand, D. G., 2017, ‘Prior Exposure Increases Perceived Accuracy of Fake News’, online at Scholar
Pennycook, G. and Rand, D. G., 2017, ‘Who Falls for Fake News? The Roles of Analytic Thinking, Motivated Reasoning, Political Ideology, and Bullshit Receptivity’, Yale University Working Paper, September 2017, online at Scholar
Phillips, Witney, 2015, This Is Why We Can’t Have Nice Things: Mapping the Relationship between Online Trolling and Mainstream Culture, Cambridge Mass. and London: The MIT Press.Google Scholar
Popper, Karl, 1966, The Open Society and Its Enemies: Volume 1, The Spell of Plato, 5th Edn (revised), London: Routledge.Google Scholar
Powles, Julia and Hodson, Hal, 2017, Google, DeepMind and healthcare in an age of algorithms, Health and Technology, Vol.7, Issue 4, pp. 351367, 2017.Google Scholar
Pratchett, Terry, 2014, Unseen Academicals, London: Corgi.Google Scholar
Presser, L., Hruskova, M., Rowbottom, H., Kancir, J., 2015, ‘Care.Data and Access to UK Health Records: Patient Privacy and Public Trust’, Technology Science. 2015081103. August 11, 2015, online at Scholar
Quinn, Zoë, 2017, Crash Override: How GamerGate [Nearly] Destroyed My Life, and How We Can Win the Fight against Online Hate, New York: Public Affairs.Google Scholar
Reed, C., 2004, Internet Law: Text and Materials, 2nd Edn, Cambridge: Cambridge University Press.Google Scholar
Reidenberg, J, 1998, ‘Lex Informatica: The Formation of Information Policy Rules Through Technology’, 76 Texas Law Review 553, (1998).Google Scholar
Richards, Neil, 2015, Intellectual Privacy: Rethinking Civil Liberties in the Digital Age, Oxford: Oxford University Press.Google Scholar
Rost, K., Stahel, L. and Frey, B. S., 2016, ‘Digital Social Norm Enforcement: Online Firestorms in Social Media’, PLoS ONE 11 (6):e0155923, online at Scholar
Saini, Angela, 2017, Inferior: How Science Got Women Wrong – and the New Research That’s Rewriting the Story, London: Fourth Estate.Google Scholar
Satre, Jean-Paul, 1948, Anti-Semite and Jew, New York: Schoeken Books.Google Scholar
Schneier, Bruce, 2015, Data and Goliath, New York and London: W. W. Norton and Company.Google Scholar
Schweitzer, N. J. and Saks, Michael J., 2007, ‘The CSI Effect: Popular Fiction About Forensic Science Affects the Public’s Expectations About Real Forensic Science’, 47 Jurimetrics Journal, 2007, 357364.Google Scholar
Selinger, Evan and Hartzog, Woodrow, 2014, Obscurity and Privacy, Routledge Companion to Philosophy of Technology, Pitt, Joseph and Shew, Ashley, eds., Routledge.Google Scholar
Shifman, Limor, 2011, ‘An Anatomy of a YouTube Meme’, New Media & Society 14 (2)187203, 2011.Google Scholar
Solove, Daniel J., 2008, Understanding Privacy, Cambridge Mass. and London: Harvard University Press.Google Scholar
Solove, Daniel J., 2011, Nothing to Hide: The False Tradeoff between Privacy and Security, New Haven and London: Yale University Press.Google Scholar
Stoycheff, Elizabeth, 2016, Under Surveillance: Examining Facebook’s Spiral of Silence Effects in the Wake of NSA Internet Monitoring, Journalism and Mass Communication Quarterly, March 2016.Google Scholar
Sunstein, Cass, 2001,, Princeton: Princeton University Press.Google Scholar
Sunstein, Cass, 2007, 2.0, Princeton: Princeton University Press.Google Scholar
Sweeney, Latanya, 2000, ‘Simple Demographics Often Identify People Uniquely’, Data Privacy Working Paper 3. Pittsburgh Carnegie Mellon University,Google Scholar
Tarleton, Gillespie, 2010, ‘The Politics of “Platforms”’, New Media and Society, 12 (3)347364, 2010.Google Scholar
Tene, Omer and Wolf, Christopher, 2013, The Draft EU General Data Protection Regulation: Costs and Paradoxes of Explicit Consent, Washington, DC: Future of Privacy Forum.Google Scholar
Tkacz, Nathaniel, 2015, Wikipedia and the Politics of Openness, Chicago: University of Chicago Press.Google Scholar
Treptow, Kurt W, 2000, Vlad III Dracula: The Life and Times of the Historical Dracula, Iaşi, Portland, Oxford: The Center for Romanian Studies.Google Scholar
Vaidhynathan, Siva, 2011, The Googlization of Everything: (And Why We Should Worry), Berkeley and Los Angeles: University of California Press.Google Scholar
Volokh, Eugene and Falk, Donald M., 2012, ‘First Amendment Protection for Search Engine Results,’ online at Scholar
Wagner, Claudia, Garcia, David, Jadidi, Mohsen and Strohmaier, Markus, 2015, ‘It’s a Man’s Wikipedia? Assessing Gender Inequality in an Online Encyclopedia’, Association for the Advancement of Artificial Intelligence (, online at Scholar
Walpole, Horace, 1764, Anecdotes of Painting in England, with Some Account of the Principal Artists, London: Ward, Lock, & Co.Google Scholar
Warren, Samuel D. and Brandeis, Louis D., 1890, ‘The Right to Privacy’, Harvard Law Review, Vol. IV. No. 5.Google Scholar
Waugh, Evelyn, 1938, Scoop, 2003 edition, London: Penguin.Google Scholar
Yiannopoulos, Milo, 2017, Dangerous, Dangerous Books (self-published).Google Scholar
Youyou, Wu, Kosinski, Michal and Stillwell, David, 2015, ‘Computer-Based Personality Judgments Are More Accurate Than Those Made By Humans,” Proceedings of the National Academy of Sciences of the United States of America, Vol 112, No. 4, 2015.Google Scholar
Zittrain, Jonathan, 2008, The Future of the Internet: And How to Stop It, London: Penguin.Google Scholar

Secondary Sources

The Burton Review: ‘Report into the Loss of MOD Personal Data’, April 2008, online at Scholar
The House of Lords EU Sub-Committee on Home Affairs, Health and Education. Report on the Right to Be Forgotten, July 2014, online at Scholar
Intellectual Property Office: Online Copyright Infringement Tracker Latest wave of research (March 2017), online at: Scholar
Joint Report of Europol and the EU Intellectual Property Office, 2017 Situation Report Counterfeiting and Piracy in the European Union: online at Scholar
Anderson, David QC, 2016, ‘Bulk Powers Review – Report’, online at Scholar
Anderson, David QC, 2017, ‘Attacks in London and Manchester 2017, Independent Assessment of the MI5 and Police Internal Reviews’, online at Scholar
Sir Cullen, Michael and Reddy, Dame Patsy, 2016, ‘Report of the First Independent Review of Intelligence and Security in New Zealand’, Scholar
Home Affairs Select Committee Report ‘Hate Crime: abuse, hate and extremism online’, May 2017. Scholar
Intelligence and Security Committee of Parliament Report ‘Privacy and Security: A modern and transparent legal framework’, March 2015.Google Scholar
Report of the Joint Committee on the Draft Investigatory Powers Bill. Online at Scholar

Save book to Kindle

To save this book to your Kindle, first ensure is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the or variations. ‘’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

  • Bibliography
  • Paul Bernal, University of East Anglia
  • Book: The Internet, Warts and All
  • Online publication: 01 August 2018
  • Chapter DOI:
Available formats

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

  • Bibliography
  • Paul Bernal, University of East Anglia
  • Book: The Internet, Warts and All
  • Online publication: 01 August 2018
  • Chapter DOI:
Available formats

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

  • Bibliography
  • Paul Bernal, University of East Anglia
  • Book: The Internet, Warts and All
  • Online publication: 01 August 2018
  • Chapter DOI:
Available formats