Cloud
1. Open forum Accademy, March 2012, Brussels, Belgium.
http://openforumacademy.org/library/ofa-research/Report%20of%20the%20Cloud%20Computing%20Workshop_Final_V1.1.pdf
2. Jurisdictional Aspects of Cloud Computing
Cristos Velasco San Martin, (2009)
http://www.coe.int/t/dghl/cooperation/economiccrime/cybercrime/Documents/Reports-Presentations/2079%20if09%20pres%20cristos%20cloud.pdf
Cloud Computing
Digital Forensics
Digital Evidence on Mobile Devices
Eoghan Casey and Benjamin Turnbull (Elsevier, 2009)
http://www.elsevierdirect.com/companions/9780123742681/Chapter_20_Final.pdf
Digital Evidence: A Guide to Forensics Readiness for Organisations, Security Advisers and Lawyers:
Peter Sommer (IAAC, 2012)
http://www.iaac.org.uk/_media/DigitalInvestigations2012.pdf
Commentary: Defining digital forensics, in Forensics Magazine
Ken Zatiko (Forensics Magazine, 2007)
http://www.forensicmag.com/node/128.182
Caught in the cloud: privacy, encryption, and government back doors in the web 2.0 era,
Christopher Soghoian (Journal on Telecommunications and High Technology Law, 2010)
http://files.cloudprivacy.net/cloud-paper-draft-seville.pdf
*Thanks to DFA (http://www.perfezionisti.it/) for his help on this section
Digital Evidence
Digital Evidence: Beware of Assuming Too Much
Stephen Mason, (2011)
http://www.scl.org/site.aspx?i=ed20347
Cybercrime
1. Understanding cybercrime: a guide for developing countries
ITU, (draft March 2011)
http://www.itu.int/ITU-D/cyb/cybersecurity/docs/ITU_Guide_A5_14092011_rev.pdf
Privacy
Delete: The Virtue of Forgetting in the Digital Age
Viktor Mayer-Schönberger (Princeton University Press 2009)
http://press.princeton.edu/titles/8981.html
Digital Privacy: Theory, Technologies, and Practices
Alessandro Acquisti (Auerbach Pubn 2007)
http://books.google.it/books/about/Digital_Privacy.html?id=Ye11dQQ5CbcC&redir_esc=y
Nothing to hide: The false Tradeoff Between Privacy and Security
Daniel J. Solove (Yale University Press, 2011)
http://yalepress.yale.edu/book.asp?isbn=9780300172317
Privacy in Context: Technology, Policy, and the Integrity of Social Life
Helen Nissenbaum (Stanford University Press, 2009)
http://www.sup.org/ancillary.cgi?isbn=0804752362;gvp=1
Privacy’s Other Path: Recovering the Law of Confidentiality
Daniel J. Solove – Neil M. Richards (Georgetown Law Journal, 2007)
http://papers.ssrn.com/sol3/papers.cfm?abstract_id=969495