Recommended readings

Cloud Computing

Digital Forensics

Digital Evidence on Mobile Devices
Eoghan Casey and Benjamin Turnbull (Elsevier, 2009)
http://www.elsevierdirect.com/companions/9780123742681/Chapter_20_Final.pdf

Digital Evidence: A Guide to Forensics Readiness for Organisations, Security Advisers and Lawyers:
Peter Sommer (IAAC, 2012)
http://www.iaac.org.uk/_media/DigitalInvestigations2012.pdf

Commentary: Defining digital forensics, in Forensics Magazine
Ken Zatiko (Forensics Magazine, 2007)
http://www.forensicmag.com/node/128.182

Caught in the cloud: privacy, encryption, and government back doors in the web 2.0 era,
Christopher Soghoian (Journal on Telecommunications and High Technology Law, 2010)
http://files.cloudprivacy.net/cloud-paper-draft-seville.pdf

*Thanks to DFA (http://www.perfezionisti.it/) for his help on this section

Digital Evidence

Digital Evidence: Beware of Assuming Too Much
Stephen Mason, (2011)
http://www.scl.org/site.aspx?i=ed20347

Cybercrime

1. Understanding cybercrime: a guide for developing countries
ITU, (draft March 2011)
http://www.itu.int/ITU-D/cyb/cybersecurity/docs/ITU_Guide_A5_14092011_rev.pdf

Privacy

Delete: The Virtue of Forgetting in the Digital Age
Viktor Mayer-Schönberger (Princeton University Press 2009)
http://press.princeton.edu/titles/8981.html

Digital Privacy: Theory, Technologies, and Practices
Alessandro Acquisti (Auerbach Pubn 2007)
http://books.google.it/books/about/Digital_Privacy.html?id=Ye11dQQ5CbcC&redir_esc=y

Nothing to hide: The false Tradeoff Between Privacy and Security
Daniel J. Solove (Yale University Press, 2011)
http://yalepress.yale.edu/book.asp?isbn=9780300172317

Privacy in Context: Technology, Policy, and the Integrity of Social Life
Helen Nissenbaum (Stanford University Press, 2009)
http://www.sup.org/ancillary.cgi?isbn=0804752362;gvp=1

Privacy’s Other Path: Recovering the Law of Confidentiality
Daniel J. Solove – Neil M. Richards (Georgetown Law Journal, 2007)
http://papers.ssrn.com/sol3/papers.cfm?abstract_id=969495