Acquisti, Alessandro, and Jens Grossklags, Privacy Attitudes and Privacy Behavior, in ECONOMICS OF INFORMATION SECURITY 165 (L. Jean Camp and Stephen Lewis eds., 2004).
Adams, Marilyn McCord, Forgiveness: A Christian Model, 8 FAITH & PHIL. 277 (1991).
Alexandra Wallace, Student in Anti-Asian Rant, Says She’ll Leave UCLA, THE HUFFINGTON POST (Mar. 19, 2011), http://www.huffingtonpost.com/2011/03/19/alexandra-wallace-student_n_837925.html.
ALTMAN, IRWIN, THE ENVIRONMENT AND SOCIAL BEHAVIOR: PRIVACY, PERSONAL SPACE, TERRITORY, AND CROWDING (1975).
Altman, Irwin, Privacy Regulation: Culturally Universal or Culturally Specific?, 33 J. SOC. ISSUES 66 (1977).
Ambrose, Meg Leta, It’s about Time: Privacy, Information Life Cycles, and the Right to Be Forgotten, 16 STAN. TECH. L. REV. 369 (2014).
Ambrose, Meg Leta, Speaking of Forgetting: Analysis of Possible Non-EU Responses to the Right to Be Forgotten and Speech Exception, 38:8 TELECOMMUN. POL’Y 800 (2014).
Ambrose, Meg Leta, You Are What Google Says You Are: The Right to Be Forgotten and Information Stewardship, 17 INT’L REV. INFO. ETHICS (July 2012).
Ambrose, Meg Leta, and Jef Ausloos, The Right to Be Forgotten across the Pond, 3 J. INFO. POL’Y 1 (2013).
Ambrose, Meg Leta, Nicole Friess, and Jill Van Matre, Seeking Digital Redemption: The Future of Forgiveness in the Internet Age, 29 SANTA CLARA COMPUTER & HIGH TECH. L.J. 99 (2012).
Andrade, Norberto Nuno Gomes de, Oblivion: The Right to Be Different . . . from Oneself—Reproposing the Right to Be Forgotten, 13 IDP 122 (2012).
Angwin, Julia, The Web’s New Gold Mine: Your Secrets, WALL ST. J. (July 30, 2010), http://online.wsj.com/article/SB10001424052748703940904575395073512989404.html.
Ardia, David S., Freedom of Speech, Defamation, and Injunctions, 55 WM. & MARY L. REV. 1 (2013).
Article 29 Data Protection Working Party, Guidelines on the Implementation of the Court of Justice of the European Union Judgment on “Google Spain and Inc. v. Agencia Española de Protección de Datos (AEPD) and Mario Costeja González,” C-131/12, 14/EN WP 225 (Nov. 26, 2014).
Article 29 Data Protection Working Party, Opinion 5/2009 on Online Social Networking (WP 163) (Dec. 6, 2009).
Article 29 Data Protection Working Party, Working Document on Determining the International Application of EU Data Protection Law to Personal Data Processing on the Internet by Non-EU Based Web Sites, 5035/01/EN/Final, WP 56 (May 30, 2002).
Ausloos, Jef, The “Right to Be Forgotten”—Worth Remembering?, 28 COMPUTER L. & SEC. REV. 143 (2012).
Bambauer, Jane, Is Data Speech?, 66 STAN. L. REV. 57 (2014).
Bannon, Liam J., Forgetting as a Feature, Not a Bug: The Duality of Memory and Implications for Ubiquitous Computing, 2 CODESIGN 3 (2006).
Barbas, Samantha, The Death of the Public Disclosure Tort: A Historical Perspective, 22 YALE J. L. & HUMAN. 171 (2010).
Barilleaux, Ryan J., The President, “Intermestic” Issues, and the Risks of Policy Leadership, 15:4 PERSPECTIVES ON THE PRESIDENCY 754 (1985).
Barnes, Bill, Nothing but Net, SLATE (Feb. 28, 1997), http://www.slate.com/articles/technology/webhead/1997/02/nothing_but_net.html.
BARNES, JULIAN, FLAUBERT’S PARROT (1984).
BATTELLE, JOHN, THE SEARCH: HOW GOOGLE AND ITS RIVALS REWROTE THE RULES OF BUSINESS AND TRANSFORMED OUR CULTURE (2006).
Battle, Cynthia L., and Ivan W. Miller, Families and Forgiveness, in HANDBOOK OF FORGIVENESS 233 (Everett L. Worthington Jr. ed., 2005).
Baumeister, Roy F., Ellen Bratslavsky, Catrin Finkenauer, and Kathleen D. Vohs, Bad Is Stronger than Good, 5 REV. GEN. PSYCHOL. 323 (2001).
Baumeister, Roy F., Julie Juola Exline, and Kristin L. Sommer, The Victim Role, Grudge Theory, and Two Dimensions of Forgiveness, in DIMENSIONS OF FORGIVENESS: PSYCHOLOGICAL RESEARCH & THEOLOGICAL PERSPECTIVES 79 (Everett L. Worthington Jr. ed., 1998).
BELL, GORDON, AND JIM GEMMELL, TOTAL RECALL: HOW THE E-MEMORY REVOLUTION WILL CHANGE EVERYTHING (2009).
Benhow, S. Mary P., File Not Found: The Problem of Changing URLs for the World Wide Web, 8 INTERNET RESEARCH: NETWORK APPLICATIONS & POL’Y 247 (1998).
BENKLER, YOCHAI, THE WEALTH OF NETWORKS: HOW SOCIAL PRODUCTION TRANSFORMS MARKETS AND FREEDOM (2007).
Benn, Stanley I., Privacy, Freedom, and Respect for Persons, in PRIVACY, NOMOS XIII: YEARBOOK OF THE AMERICAN SOCIETY FOR POLITICAL AND LEGAL PHILOSOPHY 1 (J. Ronald Pennock and John W. Chapman eds., 1971).
BENNETT, COLIN J., AND CHARLES RAAB, THE GOVERNANCE OF PRIVACY: POLICY INSTRUMENTS IN GLOBAL PERSPECTIVE (2006).
Bennett, Steven C., The “Right to Be Forgotten”: Reconciling EU and US Perspectives, 30 BERKELEY J. INT’L L. 161 (2012).
Bernal, Paul Alexander, A Right to Delete?, 2:2 EUR. J. L. & TECH. (2011), http://ejlt.org/article/view/75/144.
BEUC (European Consumers’ Organisation), A Comprehensive Approach on Personal Data Protection in the European Union: European Commission’s Communication (Jan. 24, 2011), http://ec.europa.eu/justice/news/consulting_public/0006/contributions/organisations/beuc_en.pdf.
Bezanson, Randall P., The Libel Tort Today, 45 WASH. & LEE L. REV. 535 (1988).
Bhagwat, Ashutosh, Sorrel v. IMS Health: Details, Detailing, and the Death of Privacy, 36 VT. L. REV. 855 (2012).
Bibas, Stephanos, Forgiveness in Criminal Procedure, 4 OHIO ST. J. CRIM. L. 329 (2007).
Bielski, Zosia, If a Teacher’s Decades-Old Erotic Films Can Resurface Online, What Rights Should We Have to Digital Privacy?, GLOBE AND MAIL (Oct. 22, 2014), http://www.theglobeandmail.com/life/relationships/if-a-teachers-decades-old-erotic-films-can-resurface-online-what-rights-should-we-have-to-digital-privacy/article21218588/.
Bijker, Wiebe E., Thomas P. Hughes, Trevor Pinch, and Deborah G. Douglas, eds., THE SOCIAL CONSTRUCTION OF TECHNOLOGICAL SYSTEMS: NEW DIRECTIONS IN THE SOCIOLOGY AND HISTORY OF TECHNOLOGY (2012).
Borris, Eileen R., Forgiveness and the Healing of Nations, in PARALLEL EVENT OF THE 55TH COMMISSION ON THE STATUS OF WOMEN, UNIVERSAL PEACE FEDERATION (2011), http://www.upf.org/education/speeches/3464-eileen-r-borris-forgiveness-and-the-healing-of-nations.
boyd, danah, Why Youth (Heart) Social Network Sites: The Role of Networked Publics in Teenage Social Life, in MACARTHUR FOUNDATION SERIES ON DIGITAL LEARNING—YOUTH, IDENTITY, AND DIGITAL MEDIA 119 (David Buckingham ed., 2008).
boyd, danah, and Eszter Hargittai, Facebook Privacy Settings: Who Cares?, 15 FIRST MONDAY (2010), http://firstmonday.org/article/view/3086/2589.
boyd, danah, Eszter Hargittai, Jason Schultz, and John Palfrey, Why Parents Help Their Children Lie to Facebook about Age: Unintended Consequences of the “Children’s Online Privacy Protection Act,” 16 FIRST MONDAY (2011), http://firstmonday.org/ojs/index.php/fm/article/view/3850.
Bradford, Anu, The Brussels Effect, 107 NW. U. L. REV. 1 (2012).
Brandimarte, Laura, Discounting the Past: Bad Weighs Heavier than Good (2010), unpublished manuscript, available at http://heinz.cmu.edu/research/384full.pdf.
Brewington, Brian E., and George Cybenko, How Dynamic Is the Web?, 33 COMPUTER NETWORKS 257 (2000).
BRILLOUIN, LEON, SCIENCE AND INFORMATION THEORY (2d ed., 1962).
BRIN, DAVID, THE TRANSPARENT SOCIETY: WILL TECHNOLOGY FORCE US TO CHOOSE BETWEEN PRIVACY AND FREEDOM? (1999).
Briton Guilty of Running Vice Ring, BBC NEWS (Oct. 23, 2003), http://news.bbc.co.uk/2/hi/uk_news/3206355.stm.
Bullying Statistics, Bullying and Suicide, http://www.bullyingstatistics.org/content/bullying-and-suicide.html (accessed June 23, 2015).
Burgess, Ann Wolbert, and Lynda Lytle Holmstrom, Rape Trauma Syndrome, 131 AM. J. PSYCHIATRY 981 (1974).
Cahn, Edmond, The Firstness of the First Amendment, 65 YALE L.J. 464 (1956).
Capurro, Rafael, and Birger Hjorland, The Concept of Information, 37 ANN. REV. INFO. SCI. & TECH. 343 (2003).
Castellano, Pere Simón, The Right to Be Forgotten under European Law: A Constitutional Debate, 16 LEX ELECTRONICA (2012).
Cavoukian, Ann, and Jeff Jonas, Privacy by Design in the Age of Big Data, PRIVACY BY DESIGN (2012), http://privacybydesign.ca/content/uploads/2012/06/pbd-big_data.pdf.
Chancé, Caroline, and Carol A. F. Umhoefer, France: Right to Be Forgotten—Application of the Balancing Test Derived from the Google v. Costeja Case, LEXOLOGY (Feb. 10, 2015).
Chander, Anupam, Youthful Indiscretion in an Internet Age, in THE OFFENSIVE INTERNET: SPEECH, PRIVACY, AND REPUTATION 124 (Saul Levmore and Martha C. Nussbaum eds., 2010).
Cho, Daegon, Soodong Kim, and Alessandro Acquisti, Empirical Analysis and User Behaviors: The Impact of Real Name Policy, in PROC. OF 45TH HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCE (HICSS 2012).
Cho, Junghoo, and Hector Garcia-Molina, The Evolution of the Web and Implications for an Incremental Crawler, in PROC. OF THE 26TH INT’L CONF. ON VERY LARGE DATA BASES 200 (2000).
Citron, Danielle Keats, Cyber Civil Rights, 89 B.U. L. REV. 61 (2009).
Citron, Danielle Keats, and Mary Anne Franks, Criminalizing Revenge Porn, 49 WAKE FOREST L. REV. 345 (2014).
Cockburn, Bruce, The Trouble with Normal, on THE TROUBLE WITH NORMAL (True North 1983).
Cohen, Jonathan R., Apology and Organizations: Exploring an Example from Medical Practice, 27 FORDHAM URB. L.J. 1447 (2000).
COHEN, JULIE E., CONFIGURING THE NETWORKED SELF: LAW, CODE, AND THE PLAY OF EVERYDAY PRACTICE (2012).
Cohen, Julie E., What Privacy Is For, 126 HARV. L. REV. 1904 (2013).
Cohen, Patricia, Questioning Privacy Protections in Research, N.Y. TIMES (Oct. 23, 2011), http://www.nytimes.com/2011/10/24/arts/rules-meant-to-protect-human-research-subjects-cause-concern.html?pagewanted=all.
College Gossip Website Shuts Down, Citing Economy. USA TODAY (Feb. 5, 2009). http://www.usatoday.com/tech/webguide/Internetlife/2009–02–05-juicycampus_N.htm.
Committee on Civil Liberties, Justice and Home Affairs, Rapporteur Jan Philipp Albrect, Rapporteur’s Report on Draft Report of General Data Protection Regulation, COM(2012)0011–C7 0025/2012–2012/0011(COD) (Dec. 17, 2012).
Common Sense with Phineas and Ferb. Disney Channel television broadcast Jan. 27, 2010.
Cosgrove, Charles H., The Declaration of Independence in Constitutional Interpretation: A Selective History and Analysis, 32 U. RICH. L. REV. 107 (1998).
Council of Europe, Convention for the Protection of Individuals with Regard to Automatic Processing of Personal Data (1981), http://www.conventions.coe.int/Treaty/en/Treaties/Html/108.htm.
Cross Tab, Online Reputation in a Connected World (Jan. 2010), http://www.job-hunt.org/guides/DPD_Online-Reputation-Research_overview.pdf (accessed Aug. 1, 2015).
Cyberbullying-Linked Suicides Rising, Study Says, CBC NEWS (Oct. 20, 2012), http://www.cbc.ca/news/technology/story/2012/10/19/cyberbullying-suicide-study.html.
Daley, Suzanne, On Its Own, Europe Backs Web Privacy Fights, N.Y. TIMES (Aug. 9, 2011), http://www.nytimes.com/2011/08/10/world/europe/10spain.html?pagewanted=all&_r=0.
Das, Sauvik, and Adam Kramer, Self-Censorship on Facebook, PROC. OF SEVENTH INTERNATIONAL AAAI CONFERENCE ON WEBLOGS AND SOCIAL MEDIA (2013).
Davenport, Claire, Spain Refers Google Privacy Complaints to EU’s Top Court, REUTERS (Mar. 2, 2012), http://www.reuters.com/article/2012/03/02/us-eu-google-idUSTRE8211DP20120302.
DE AZEVEDO CUNHA, MARIO VIOLA, MARKET INTEGRATION THROUGH DATA PROTECTION: AN ANALYSIS OF THE INSURANCE AND FINANCIAL INDUSTRIES IN THE EU (2013).
DECEW, JUDITH WAGNER, IN PURSUIT OF PRIVACY (1997).
Digital Birth: Welcome to the Online World, BUSINESS WIRE (Oct. 6, 2010), http://www.businesswire.com/news/home/20101006006722/en/Digital-Birth-Online-World#.VD17VfldUud.
Doe, George, With Genetic Testing, I Gave My Parents the Gift of Divorce, VOX (Sept. 9, 2014), http://www.vox.com/2014/9/9/5975653/with-genetic-testing-i-gave-my-parents-the-gift-of-divorce-23andme.
Driver, Michael J., and Theodore J. Mock, Human Information Processing Decision Style Theory, and Accounting Information Systems, 50 ACCOUNTING REV. 490 (1975).
Duhigg, Charles, How Companies Learn Your Secrets, N.Y. TIMES (Feb. 16, 2012).
Easterbrook, Frank, Approaches to Judicial Review, in POLITICS AND THE CONSTITUTION: THE NATURE OF AND EXTENT OF INTERPRETATION 29 (Judith A. Baer ed., 1990).
EBERLE, EDWARD J., DIGNITY AND LIBERTY: CONSTITUTIONAL VISIONS IN GERMANY AND THE UNITED STATES 85 (2002).
Editorial Board, Wrong Responses to Charlie Hebdo, N.Y. TIMES (Jan. 15, 2015).
Electronic Frontier Foundation, Do Not Track, https://www.eff.org/issues/do-not-track (accessed June 5, 2015).
Enright, Robert D., Forgiveness Education with Children in Areas of Violence and Poverty, in FORGIVENESS: A SAMPLING OF RESEARCH RESULTS 11 (American Psychological Association, 2006), http://www.apa.org/international/resources/forgiveness.pdf.
Enright, Robert D., Suzanne Freedman, and Julio Rique, The Psychology of Interpersonal Forgiveness, in EXPLORING FORGIVENESS 46 (Robert D. Enright and Joanna North eds., 1998).
Enright, Robert D., Jeanette Knutson, Anthony Holter, Casey Knutson, and Padraig Twomey, Forgiveness Education with Children in Areas of Violence and Poverty, in FORGIVENESS: A SAMPLING OF RESEARCH RESULTS 11 (American Psychological Association, 2006), http://www.apa.org/international/resources/forgiveness.pdf.
European Commission, Commission Proposes a Comprehensive Reform of the Data Protection Rules (Jan. 25, 2012), http://ec.europa.eu/justice/newsroom/data-protection/news/120125_en.htm.
European Commission, Data Protection Reform—Frequently Asked Questions, press release, MEMO/10/542 (Nov. 4, 2010), http://europa.eu/rapid/press-release_MEMO-10–542_en.htm?locale=fr.
European Commission, European Commission Sets Out Strategy to Strengthen EU Data Protection Rules, press release, IP/10/1462 (Nov. 4, 2010).
European Commission, Issued by the Article 29 Data Protection Working Party, press release (Sept. 18, 2014), http://ec.europa.eu/justice/data-protection/article-29/press-material/press-release/art29_press_material/2014/20140918_wp29_press_release_97th_plenary_cjeu_google_judgment__17sept_adopted.pdf.
European Commission, Myth-Busing: The Court of Justice of the EU and the “Right to Be Forgotten” (2014), http://ec.europa.eu/justice/data-protection/files/factsheets/factsheet_rtbf_mythbusting_en.pdf.
European Commission, Proposal for a Regulation of the European Parliament and of the Council, COM(2012) 11 final (Jan. 25, 2012) (DP Regulation), http://ec.europa.eu/justice/data-protection/document/review2012/com_2012_11_en.pdf.
European Commission, The Proposed General Data Protection Regulation: The Consistency Mechanism Explained (2013), http://ec.europa.eu/justice/newsroom/data-protection/news/130206_en.htm.
European Commission, Safer Internet Day 2009: Commission Starts Campaign against Cyber-bullying, press release, MEMO/09/58 (Feb. 10, 2009).
European Parliament, US NSA: Stop Mass Surveillance Now or Face Consequences, MEPs Say, press release (Mar. 12, 2014), http://www.europarl.europa.eu/news/en/news-room/content/20140307IPR38203/html/US-NSA-stop-mass-surveillance-now-or-face-consequences-MEPs-say.
European Parliament, Committee on Civil Liberties, Justice and Home Affairs, Report on Draft European Parliament Legislative Resolution, A7–0402/001–207 (Mar. 6, 2014) (DP Regulation, LIBE edits), http://www.europarl.europa.eu/sides/getDoc.do?pubRef=-//EP//NONSGML+AMD+A7–2013–0402+001–207+DOC+PDF+V0//EN.
Exline, Julie Juola, Everett L. Worthington Jr., Peter Hill, and Michael E. McCullough, Forgiveness and Justice: A Research Agenda for Social and Personality Psychology, 7 PERSONALITY & SOC. PSYCHOL. REV. 337 (2003).
Facebook, Facebook Data Use Policy, https://www.facebook.com/full_data_use_policy (accessed Aug. 1, 2014; for older version, see https://web.archive.org/web/20140805060652/https://www.facebook.com/full_data_use_policy).
Fastenberg, Dan, Facebook Firings: Top 10 Cases and the NLRB’s New Guidelines, AOL JOBS (Sep. 2, 2011), http://jobs.aol.com/articles/2011/09/02/facebook-firings-top-ten-cases-and-the-nlrbs-new-guidelines/.
Fee, Gayle, and Laura Raposa, Caitlin Davis’ Life Is Not So Cheery Now, BOSTON HERALD (Nov. 5, 2008), http://bostonherald.com/track/inside_track/view/2008_11_05_Caitlin_Davis_booted_from_Patriots__cheering_squad.
Feldman, Stuart I., A Conversation with Brewster Kahle, 2 QUEUE 24 (June 2004), http://queue.acm.org/detail.cfm?id=1016993.
Fetterly, Dennis, Mark Manasse, Marc Najork, and Janet L. Wiener, A Large-Scale Study of the Evolution of Web Pages, 34 SOFTWARE PRAC. & EXPERIENCE 213 (2004).
Fincham, Frank D., Steven R. H. Beach, and Joanne Davila, Forgiveness and Conflict Resolution in Marriage, 18 J. FAM. PSYCHOL. 72 (2004).
Fincham, Frank D., Julie H. Hall, and Steven R. H. Beach, Til Lack of Forgiveness Doth Us Part: Forgiveness in Marriage, in HANDBOOK OF FORGIVENESS 207 (Everett L. Worthington Jr. ed., 2005).
Firozi, Paulina, Law School Admissions Use Facebook, Google to Screen Applicants, Study Finds, DAILY NW. (Oct. 30, 2011), http://dailynorthwestern.com/2011/10/30/blogs/oncampus/law-school-admissions-use-facebook-google-to-screen-applicants-study-finds.
Flock, Elizabeth, Should We Have a Right to Be Forgotten Online?, WASH. POST (Apr. 20, 2011), http://www.washingtonpost.com/blogs/blogpost/post/should-we-have-a-right-to-be-forgotten-online/2011/04/20/AF2iOPCE_blog.html.
Frankel, David, The Excavator: Creator or Destroyer?, 67 ANTIQUITY 875 (Dec. 1993).
Franks, Mary Anne, Unwilling Avatars: Idealism and Discrimination in Cyberspace, 20 COLUM. J. GENDER & L. 224 (2011).
FRAUENFELDER, MARK, RULE THE WEB: HOW TO DO ANYTHING AND EVERYTHING ON THE INTERNET—BETTER, FASTER, EASIER (2007).
FRENCH, PETER A., THE VIRTUES OF VENGEANCE (2001).
Freund, Paul, Address to the American Law Institute, in PROCEEDINGS OF THE 52ND ANNUAL MEETING OF THE AMERICAN LAW INSTITUTE (1975).
Fried, Charles, Privacy, 77 YALE L.J. 475 (1968).
FRIEDMAN, LAWRENCE M., GUARDING LIFE’S DARK SECRETS (2007).
FRIEDMAN, LAWRENCE M., PRIVATE LIVES: FAMILIES, INDIVIDUALS, AND LAW (2005).
FUSTER, GLORIA GONZÁLEZ, THE EMERGENCE OF PERSONAL DATA PROTECTION AS A FUNDAMENTAL RIGHT OF THE EU (2014).
GARFINKEL, HAROLD, STUDIES IN ETHNOMETHODOLOGY (1967).
Gavison, Ruth, Privacy and the Limits of Law, 89 YALE L.J. 421 (1980).
Gellman, Robert, Fair Information Practices: A Basic History, Version 1.91 (2012), http://bobgellman.com/rg-docs/rg-FIPShistory.pdf.
Germain, Carol Anne, URLs: Uniform Resource Locators or Unreliable Resource Locators, 60 C. AND RESEARCH LIBR. 359 (2000).
Gillespie, Tarleton, Pablo J. Boczkowski, and Kirsten A. Foot, eds., MEDIA TECHNOLOGIES: ESSAYS ON COMMUNICATION, MATERIALITY, AND SOCIETY (2014).
Glazer, Rashi H., Measuring the Value of Information: The Information-Intensive Organization, 32 IBM SYSTEMS J. 99 (1993).
Glensy, Rex D., The Right to Dignity, 43 COLUM. HUM. RTS. L. REV. 65 (2011).
GOLDSMITH, JACK, AND TIM WU, WHO CONTROLS THE INTERNET? ILLUSIONS OF A BORDERLESS WORLD (2008).
Gomes, Daniel, and Mario J. Silva, Modelling Information Persistence on the Web, in PROC. OF THE 6TH INT’L CONF. ON WEB ENGINEERING 193 (2006).
Google, Company Overview (Mar. 1, 2012), http://www.google.com/about/company/.
Google, European Privacy Requests for Search Removals, TRANSPARENCY REPORT (updated Feb. 15, 2015), http://www.google.com/transparencyreport/removals/europeprivacy/.
Google, France—Government Removal Requests, TRANSPARENCY REPORT, http://www.google.com/transparencyreport/removals/government/FR/ (accessed June 5, 2015).
Google, Government Removal Requests, TRANSPARENCY REPORT, http://www.google.com/transparencyreport/removals/government/faq/ (accessed June 5, 2015).
Google, Privacy Policy (Mar. 1, 2012), http://www.google.com/intl/en/policies/privacy/.
GOOGLE ADVISORY COUNCIL, THE ADVISORY COUNCIL TO GOOGLE ON THE RIGHT TO BE FORGOTTEN REPORT (Feb. 6, 2015), https://www.google.com/advisorycouncil/.
Google Launches Challenges to Max Mosley’s Privacy Bid, BBC NEWS (Jan. 14, 2015), http://www.bbc.com/news/uk-30816523.
Google Sets Up “Right to Be Forgotten” Form after EU Ruling, BBC NEWS (May 30, 2014), http://www.bbc.com/news/technology-27631001.
Granick, Jennifer, Convicted Murderer to Wikipedia: Shhh!, ELECTRONIC FRONTIER FOUNDATION (Nov. 10, 2009), https://www.eff.org/deeplinks/2009/11/murderer-wikipedia-shhh.
Gray, Jim, and Catharine van Ingen, Empirical Measurements of Disk Failure Rates and Error Rates, MICROSOFT RESEARCH TECHNICAL REPORT MSR-TR-2005–166 (Dec. 2005).
Griffin, James, First Steps in an Account of Human Rights, 9 EUR. J. PHIL. 306 (2001).
Halliday, Josh, Max Mosley Sues Google in France and Germany over “Orgy” Search Results, GUARDIAN (Feb. 25, 2011), http://www.theguardian.com/media/2011/nov/25/max-mosley-google-france-germany.
Hampton, Keith, Lee Rainie, Weixu Lu, Maria Dwyer, Inyoung Shin, and Kristen Purcell, Social Media and the “Spiral of Silence,” PEW RESEARCH CENTER (Aug. 26, 2014), http://www.pewinternet.org/files/2014/08/PI_Social-networks-and-debate_082614.pdf.
Harrison, How Our Opt-Out System Works, SPOKEO PEOPLE SEARCH BLOG (Jan. 12, 2011), https://web.archive.org/web/20110116031332/http://www.spokeo.com/blog/2011/01/how-spokeo-opt-out-system-works/.
Hartzog, Woodrow, and Frederic Stutzman, The Case for Online Obscurity, 101 CAL. L. REV. 1 (2013).
Hauch, Jeanne M., Protecting Private Facts in France: The Warren & Brandeis Tort Is Alive and Well and Flourishing in Paris, 68 TUL. L. REV. 1219 (1994).
Hendel, John, In Europe, a Right to Be Forgotten Trumps the Memory of the Internet, ATLANTIC (Feb. 3, 2011).
HILL, DAVID G., DATA PROTECTION: GOVERNANCE, RISK MANAGEMENT, AND COMPLIANCE (2009).
Hill, Kashmir, Google Makes Every Person Search in Europe Look Censored, FORBES (July 2, 2014), http://www.forbes.com/sites/kashmirhill/2014/07/02/google-right-to-be-forgotten-notice/.
Hill, Kashmir, How the Past Haunts Us in the Digital Age, FORBES (Oct. 4, 2011), http://www.forbes.com/sites/kashmirhill/2011/10/04/how-the-past-haunts-us-in-the-digital-age/.
Hogan, Bernie, Pseudonyms and the Rise of the Real-Name Web, in A COMPANION TO NEW MEDIA DYNAMICS 290 (John Hartley, Jean Burgess, and Alex Bruns eds. 2013).
Holmgren, Margaret R., Forgiveness and the Intrinsic Value of Persons, 30 AM. PHIL. Q. 341 (1993).
Holson, Laura M., The New Court of Shame Is Online, N.Y. TIMES (Dec. 23, 2010), http://www.nytimes.com/2010/12/26/fashion/26shaming.html?ref=todayspaper&_r=0.
HOUSE OF LORDS, EU DATA PROTECTION LAW: “RIGHT TO BE FORGOTTEN”?, EUROPEAN UNION COMMITTEE, 2ND REPORT OF SESSION 2014–15 (July 30, 2014), http://www.publications.parliament.uk/pa/ld201415/ldselect/ldeucom/40/40.pdf.
Human Rights Committee, General Comment 16 (23rd sess., 1988), COMPILATION OF GENERAL COMMENTS AND GENERAL RECOMMENDATIONS ADOPTED BY HUMAN RIGHTS TREATY BODIES, U.N. Doc. HRI/GEN/1/Rev.1 at 21 (1994).
Internet Archive, Internet Archive’s Policies on Archival Integrity and Removal (2002), http://www2.sims.berkeley.edu/research/conferences/aps/removal-policy.html.
Internet Archive, Wayback Machine: Frequently Asked Questions, https://www.archive.org/about/faqs.php (accessed June 6, 2015).
Italian Data Protection Authority, Oblivion Rights, doc. Web n. 1336892 (Nov. 9, 2005).
Jakoby, Jacob, Donald E. Speller, and Carol A. Kohn, Brand Choice as a Function of Information Overload: Replication and Extension, 1:1 J. CONSUM. RESEARCH 33 (1974).
JASANOFF, SHEILA, DESIGNS OF NATURE (2005).
Jasanoff, Sheila, Ordering Knowledge, Ordering Society, in STATES OF KNOWLEDGE 13 (Sheila Jasanoff ed., 2004).
Jasanoff, Sheila, ed., STATES OF KNOWLEDGE (2004).
JEFFRESS, ROBERT, WHEN FORGIVENESS DOESN’T MAKE SENSE (2001).
Jenkins, Holman W., Jr., Google and the Search for the Future, WALL ST. J. (Aug. 14, 2010), http://online.wsj.com/article/SB10001424052748704901104575423294099527212.html.
Johnson, David R., and David Post, Law and Borders: The Rise of Law in Cyberspace, 48 STAN. L. REV. 1367 (1996).
Jonas, Jeff, Data Tethering: Managing the Echo, JEFF JONAS BLOG (Sep. 21, 2006), http://jeffjonas.typepad.com/jeff_jonas/2006/09/data_tethering_.html.
JUNCO, REYNOL, ENGAGING STUDENTS THROUGH SOCIAL MEDIA: EVIDENCE-BASED PRACTICES FOR USE IN STUDENT AFFAIRS (2014).
Kageyama, Yuri, Japan Court Orders Google to Remove Search Results, ASSOCIATED PRESS (Oct. 10, 2014), http://hosted.ap.org/dynamic/stories/A/AS_JAPAN_GOOGLE?SITE=AP&SECTION=HOME&TEMPLATE=DEFAULT&CTIME=2014–10–10–12–29–58.
Kahle, Brewster, Preserving the Internet, SCIENTIFIC AMERICAN (July 27, 1998), http://web.archive.org/web/19980627072808/http://www.sciam.com/0397issue/0397kahle.html.
Kaplan, Kaplan Test Prep Survey: More College Admissions Officers Checking Applicants’ Digital Trails, but Most Students Unconcerned (Nov. 20, 2014), http://press.kaptest.com/press-releases/kaplan-test-prep-survey-percentage-of-college-admissions-officers-who-visit-applicants-social-networking-pages-continues-to-grow-but-most-students-shrug.
Karremans, Johan C., Paul A. M. Van Lange, and Rob W. Holland, Forgiveness and Its Associations with Prosocial Thinking, Feeling, and Doing beyond the Relationship with the Offender, 31 PERSONALITY & SOC. PSYCHOL. BULL. 1315 (2005).
Karvonen, Kristiina, Sanna Shibasaki, Sofia Nunes, Puneet Kaur, and Olli Immonen, Visual Nudges for Enhancing the Use and Produce of Reputation Information, in PROC. CEUR WORKSHOP (2010), http://ceur-ws.org/Vol-612/paper1.pdf.
Kelln, Brad R. C., and John H. Ellard, An Equity Theory Analysis of the Impact of Forgiveness and Retribution on Transgressor Compliance, 25 PERSONALITY & SOC. PSYCHOL. BULL. 864 (1999).
Kilian, Wolfgang, Germany, in GLOBAL PRIVACY PROTECTION: THE FIRST GENERATION 80 (James B. Rule and Graham Greenleaf eds., 2008).
Kim, Jinyoung, and Viktor R. Carvalho, An Analysis of Time Stability in Web Search Results, in PROC. OF THE 33RD EUROPEAN CONF. ON ADVANCES IN INFO. RETRIEVAL 466 (2011).
Kobayashi, Mei, and Koichi Takeda, Information Retrieval on the Web, 32 ACM COMPUTING SURVEYS 144 (2000).
Koehler, Wallace, A Longitudinal Study of Web Pages Continued: A Consideration of Document Persistence, 9:2 INFO. RESEARCH paper 174 (2004), http://informationr.net/ir/9–2/paper174.html.
KOHL, UTA, JURISDICTION AND THE INTERNET: REGULATORY COMPETENCE OVER ONLINE ACTIVITY (2007).
Koops, Bert-Jaap, Forgetting Footprints, Shunning Shadows: A Critical Analysis of the “Right to Be Forgotten” in Big Data Practice, 8:3 SCRIPTED 1 (2011).
Korenhof, Paulan, and Bert-Jaap Koops, Gender Identity and Privacy: Could a Right to Be Forgotten Help Andrew Agnes Online?, SSRN WORKING PAPER (2013), http://ssrn.com/abstract=2304190 or http://dx.doi.org/10.2139/ssrn.2304190.
Lane, Edwin, Google Removes 12 BBC News Links in “Right to Be Forgotten,” BBC NEWS (Aug. 19, 2014), http://www.bbc.com/news/technology-28851366.
Law Reform Commission, Ireland, Issues Paper on Cyber-Crime Affecting Personal Safety, Privacy and Reputation Including Cyber-Bullying, LRC IP 6–2014 (2014).
Lee, Dave, Google Removing BBC Link Was “Not a Good Judgement,” BBC NEWS (July 3, 2014), http://www.bbc.com/news/technology-28144406.
Leonhard, Woody, “Zombie Cookies” Won’t Die: Microsoft Admits Use, HTML 5 Looms as New Vector, INFOWORLD (Aug. 22, 2011), http://www.infoworld.com/t/Internet-privacy/zombie-cookies-wont-die-microsoft-admits-use-and-html5-looms-new-vector-170511.
Lepore, Jill, The Disruption Machine, NEW YORKER (June 23, 2014).
LESSIG, LAWRENCE, CODE: VERSION 2.0 (2006).
LUENBERGER, DAVID G., INFORMATION SCIENCE (2006).
Luskin, Frederick, The Stanford Forgiveness Projects, in FORGIVENESS: A SAMPLING OF RESEARCH RESULTS 14 (American Psychological Association, 2006), http://www.apa.org/international/resources/publications/forgiveness.pdf.
Lyman, Peter, and Howard Besser, Defining the Problem of Our Vanishing Memory: Background, Current Status, Models for Resolution, in TIME & BITS: MANAGING DIGITAL CONTINUITY 11 (Margaret MacLean and Ben H. Davis eds., 1998).
MacLean, Margaret, and Ben H. Davis, eds., TIME & BITS: MANAGING DIGITAL CONTINUITY (1998).
Manders-Huits, Noëmi, and Jeroen van den Hoven, Moral Identification in Identity Management Systems, in THE FUTURE OF IDENTITY IN THE INFORMATION SOCIETY 77 (Simone Fischer-Hübner, Penny Duquenoy, Albin Zuccato, and Leonardo Martuc eds., 2008).
Marano, Hara Estroff, Our Brain’s Negative Bias, PSYCHOLOGY TODAY (June 20, 2003), http://www.psychologytoday.com/articles/200306/our-brains-negative-bias.
MARGALIT, AVISHAI, THE ETHICS OF MEMORY (2002).
Marsh, Stephen, and Pamela Briggs, Examining Trust, Forgiveness and Regret as Computational Concepts, in COMPUTING WITH SOCIAL TRUST 9 (Jennifer Golbeck ed., 2009).
Match.com Presents Singles in America 2012, UP TO DATE (blog), Match.com, http://blog.match.com/SIA/ (accessed June 23, 2015).
Matussek, Karin, Snowden Leaks Killed U.S.-E.U. Data Deal, Regulator Say, BLOOMBERG BUSINESS (Jan. 28, 2015). http://www.bloomberg.com/news/articles/2015–01–28/snowden-leaks-killed-u-s-e-u-data-deal-regulator-say.
Mauger, Paul A., J. F. Perry, T. Freeman, D. C. Grove, A. G. McBride, and K. E. McKinney, The Measurement of Forgiveness: Preliminary Research, 11 J. PSYCHOL. CHRIST. 170 (1992).
Maycotte, H. O., America’s “Right to Be Forgotten” Fight Heats Up, FORBES (Sept. 30, 2014), http://www.forbes.com/sites/homaycotte/2014/09/30/americas-right-to-be-forgotten-fight-heats-up/.
MAYER-SCHÖNBERGER, VIKTOR, DELETE: THE VIRTUE OF FORGETTING IN THE DIGITAL AGE (2009).
Mayo Clinic, Forgiveness: Letting Go of Grudges and Bitterness (Nov. 11, 2014), http://www.mayoclinic.org/healthy-living/adult-health/in-depth/forgiveness/art-20047692.
McArdle, Megan, Sink and Swim, ATLANTIC (June 1, 2009).
McDonald, Aleecia M., and Lorrie Faith Cranor, The Cost of Reading Privacy Policies, 4 ISJLP 543 (2008).
Michaels, Ralf, The Functional Method of Comparative Law, in THE OXFORD HANDBOOK OF COMPARATIVE LAW 339 (Mathias Reimann and Reinhard Zimmermann eds., 2006).
Ministry of Justice and the Rt. Hon. Chris Grayling MP, New Law to Tackle Revenge Porn, press release (Oct. 12, 2014).
Moore, Michael, The Moral Worth of Retribution, in RESPONSIBILITY, CHARACTER, AND THE EMOTIONS 179 (Ferdinand Schoeman ed., 1987).
Mooris, Alex, Hunter Moore: The Most Hated Man on the Internet, ROLLING STONE (Oct. 11, 2012), http://www.rollingstone.com/culture/news/the-most-hated-man-on-the-Internet-20121113.
Morain, Dan, Anthony Kennedy Speaks about History, Civics, Flag Burning, and Emerging Issues, SACRAMENTO BEE (June 29, 2014), http://www.sacbee.com/2014/06/29/6512694/anthony-kennedy-speaks-about-history.html#storylink=cpy.
Moran, Lee, and Beth Stebner, Now FBI Launch Investigation into Founder of “Revenge Porn” Site Is Anyone Up?, DAILY MAIL (May 23, 2012), http://www.dailymail.co.uk/news/article-2148522/Hunter-Moore-founder-revenge-porn-site-Is-Anyone-Up-investigated-FBI.html.
Morris, Herbert, Murphy on Forgiveness, 7 CRIM. JUST. ETHICS 15 (1988), http://dx.doi.org/10.1080/0731129X.1988.9991836.
Morrissey, Tracie Egan, Racist Teens Forced to Answer for Tweets about the “N*****” President, JEZEBEL (Nov. 9, 2012), http://jezebel.com/5958993/racist-teens-forced-to-answer-for-tweets-about-the-nigger-president.
Movius, Lauren B., and Nathalie Krup, U.S. and EU Privacy Policy: Comparison of Regulatory Approaches, 3 INT’L J. COMM. 169 (2009).
Mungin, Lateef, Bullied Canadian Teen Leaves Behind Chilling YouTube Video, CNN (Oct. 12, 2012), http://www.cnn.com/2012/10/12/world/americas/canada-teen-bullying/.
Murphy, Jeffrie G., Forgiveness in Counseling: A Philosophical Perspective, in BEFORE FORGIVING: CAUTIONARY VIEWS OF FORGIVENESS IN PSYCHOTHERAPY 41 (Sharon Lamb and Jeffrie G. Murphy eds., 2002).
Murphy, Jeffrie G., Forgiveness, Mercy, and the Retributive Emotions, 7:2 CRIM. JUST. ETHICS 3 (1988).
Murphy, Jeffrie G., Forgiveness, Self-Respect, and the Value of Resentment, in HANDBOOK OF FORGIVENESS 33 (Everett L. Worthington Jr. ed., 2005).
Murphy, Jeffrie G., Two Cheers for Vindictiveness, 2 PUNISHM. & SOC’Y 131 (2000).
Nakashima, Ellen, Feeling Betrayed, Facebook Users Force Site to Honor Their Privacy, WASH. POST (Nov. 30, 2007), http://www.washingtonpost.com/wp-dyn/content/article/2007/11/29/AR2007112902503.html.
National Telecommunications and Information Administration, U.S. Department of Commerce, Commercial Data Privacy and Innovation in the Internet Economy: Dynamic Policy Framework (2010), http://www.ntia.doc.gov/report/2010/commercial-data-privacy-and-innovationInternet-economy-dynamic-policy-framework.
NELSON, HAROLD L., AND DWIGHT L. TEETER JR., LAW OF MASS COMMUNICATIONS (2d ed. 1973).
Network Advertising Initiative, Consumer Opt-Out | NAI: Network Advertising Initiative, http://www.networkadvertising.org/choices/#completed (accessed June 5, 2015).
Neumann, Elisabeth Noelle, The Spiral of Silence: A Theory of Public Opinion, 24 J. COMMUN. 43 (1974).
NEWMAN, ABRAHAM L., PROTECTORS OF PRIVACY (2008).
Nimmer, Melville B., The Right to Speak from Time to Time: First Amendment Theory Applied to Libel and Misapplied to Privacy, 56 CAL. L. REV. 935 (1967).
Nissenbaum, Helen, A Contextual Approach to Privacy Online, 140 DAEDALUS 32 (2011), http://www.amacad.org/publications/daedalus/11_fall_nissenbaum.pdf.
Nissenbaum, Helen, Privacy as Contextual Integrity, 79 WASH. L. REV. 119 (2004).
Norberg, Patricia A., The Privacy Paradox: Personal Information Disclosure Intentions versus Behaviors, 41 J. CONSUMER AFF. 100 (2007).
North, Joanna, The “Ideal” of Forgiveness: A Philosopher’s Exploration, in EXPLORING FORGIVENESS 15 (Robert D. Enright and Joanna North eds., 1998).
North, Joanna, Wrongdoing and Forgiveness, 62 PHILOSOPHY 499 (1987).
Ohm, Paul, Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization, 57 UCLA L. REV. 1701 (2010).
Ohm, Paul, Good Enough Privacy, 2008 U. CHI. LEGAL F. 1 (2008).
O’Kane, Ciaran, BlueKai Explain Their Data Exchange Platform and Hint at European Move, EXCHANGEWIRE (blog) (Aug. 10, 2009), http://www.exchangewire.com/blog/2009/08/10/bluekai-explain-their-data-exchange-platform-and-hint-at-european-move/.
Olson, Walter, Facebook Opens Takedown Hotline for Public School Officials, CATO INSTITUTE (Oct. 3, 2013), http://www.cato.org/blog/facebook-opens-takedown-hotline-public-school-officials.
Oltermann, Philip, “Revenge Porn” Victims Receive Boost from German Court, GUARDIAN (May 22, 2014).
O’Reilly, Charles A., Individuals and Information Overload in Organisations: Is More Necessarily Better?, 23 ACADEMY OF MANAGEMENT J. 684 (1980).
PALFREY, JOHN, AND URS GASSER, INTEROP: THE PROMISE AND PERILS OF HIGHLY INTERCONNECTED SYSTEMS (2012).
PARISER, ELI, THE FILTER BUBBLE (2011).
PASQUALE, FRANK, THE BLACK BOX SOCIETY (2014).
Paul-Choudhury, Sumit, Digital Legacy: The Fate of Your Online Soul, NEW SCIENTIST (May 15, 2012), http://www.newscientist.com/article/mg21028091.400-digital-legacy-the-fate-of-your-online-soul.html.
Perma, About, https://perma.cc/about (accessed June 12, 2015).
Pino, Giorgio, The Right to Personal Identity in Italian Private Law: Constitutional Interpretation and Judge-Made Rights, in THE HARMONIZATION OF PRIVATE LAW IN EUROPE 225 (Mark Van Hoecke and François Ost eds., 2000).
Post, Robert C., The Social Foundations of Privacy: Community and Self in the Common Law Tort, 77 CAL. L. REV. 957 (1989).
Prosser, William, Privacy, 48 CAL. L. REV. 383 (1960).
Public.Resource.org, Why Is My Court Case on the Internet?, https://public.resource.org/court_cases.html (accessed June 5, 2015).
Public Session: Panel Discussion, in TIME & BITS: MANAGING DIGITAL CONTINUITY 36 (Margaret MacLean and Ben H. Davis eds., 1998).
Raywood, Dan, Internet to Enter Its Second Stage as Large Domains Control 30 Per Cent of the Total Content, SC MAGAZINE UK (Oct. 13, 2009), http://www.scmagazineuk.com/internet-to-enter-its-second-stage-as-large-domains-control-30-per-cent-of-the-total-content/article/152156/.
Reding, Viviane, Speech at New Frontiers for Social Media Marketing Conference, EU Data Protection Reform and Social Media: Encouraging Citizens’ Trust and Creating New Opportunities (Nov. 29, 2011) (transcript available at http://europa.eu/rapid/press-release_SPEECH-11–827_en.htm).
Reding, Viviane, Speech at The Privacy Platform, the Review of the EU Data Protection Framework Event (Mar. 16, 2011) (transcript available at http://europa.eu/rapid/pressReleasesAction.do?reference=SPEECH/11/183).
REGAN, PRISCILLA M., LEGISLATING PRIVACY: TECHNOLOGY, SOCIAL VALUES, AND PUBLIC POLICY (1995).
Regan, Priscilla M., The United States, in GLOBAL PRIVACY PROTECTION: THE FIRST GENERATION 50 (James B. Rule and Graham Greenleaf eds., 2008).
Rehnquist, William H., Is an Expanded Right of Privacy Consistent with Fair and Effective Law Enforcement?, 23 U. KAN. L. REV. 1 (1974).
Reiman, Jeffrey H., Driving to the Panopticon: A Philosophical Exploration of the Risks to Privacy Posed by the Highway Technology of the Future, 11 SANTA CLARA COMPUTER & HIGH TECH. L.J. 27 (1995).
Rein, Lisa, Brewster Kahle on the Internet Archive and People’s Technology, O’REILLY P2P.COM (Jan. 22, 2004), http://openp2p.com/pub/a/p2p/2004/01/22/kahle.html.
Reputation.com, A Bad Online Reputation Could Cost You the Election, http://www.reputation.com/reputationwatch/articles/a-bad-online-reputation-could-cost-you-the-election (accessed June 28, 2015).
Reputation.com, The Real-World Effect of Online Reputation Management, http://www.reputation.com/reputationwatch/articles/real-world-effects-of-online-reputation-management (accessed June 28, 2015).
Reputation.com, Suppress Negative Content Online: ReputationDefender, https://www.reputation.com/reputationdefender (accessed June 28, 2005).
Restatement (Second) of Torts (2012).
Richards, Neil M., Intellectual Privacy, 87 TEX. L. REV. 387 (2008).
RICHARDS, NEIL M., INTELLECTUAL PRIVACY: RETHINKING CIVIL LIBERTIES IN THE DIGITAL AGE (2015).
Richards, Neil M., and Daniel J. Solove, Privacy’s Other Path: Recovering the Law of Confidentiality, 96 GEO. L.J. 123 (2007).
Robinson, Frances, EU Data Protection Law on Track for Juncker Deadline, WALL ST. J. (Oct. 10, 2014), http://blogs.wsj.com/brussels/2014/10/10/eu-data-protection-law-on-track-for-juncker-deadline/.
Roesner, Franziska, Brian T. Gill, and Tadayoshi Kohno, Sex, Lies, or Kittens? Investigating the Use of Snapchat’s Self-Destructing Messages, 8437 FINANCIAL CRYPTOGRAPHY AND DATA SECURITY 64 (2014).
Rolfs, Jacqueline R., The Florida Star v. B.J.F.: The Beginning of the End for the Tort of Public Disclosure, 1990 WIS. L. REV. 1107 (1990).
Rosen, Jeffrey, The Delete Squad, NEW REPUBLIC (Apr. 29, 2013).
Rosen, Jeffrey, Free Speech, Privacy, and the Web That Never Forgets, 9 J. ON TELECOMM. & HIGH TECH. L. 345 (2011).
Rosen, Jeffrey, The Right to Be Forgotten, 64 STAN. L. REV. ONLINE 88 (2012), http://www.stanfordlawreview.org/online/privacy-paradox/right-to-be-forgotten.
ROSEN, JEFFREY, THE UNWANTED GAZE: THE DESTRUCTION OF PRIVACY IN AMERICA (2000).
Rosen, Jeffrey, The Web Means the End of Forgetting, N.Y. TIMES MAGAZINE (July 21, 2010), http://www.nytimes.com/2010/07/25/magazine/25privacy-t2.html?pagewanted=all.
ROSENZWEIG, ROY, CLIO WIRED: THE FUTURE OF THE PAST IN THE DIGITAL AGE (2011).
ROTHENBERG, JEFF, AVOIDING TECHNOLOGICAL QUICKSAND (1998).
Rouvroy, Antoinette, and Yves Poullet, The Right to Informational Self-Determination and the Value of Self-Development: Reassessing the Importance of Privacy for Democracy, in REINVENTING DATA PROTECTION? 45 (Serge Gutwirth, Yves Poullet, Paul de Hert, Cécile de Terwangne, Sjaak Nouwt eds., 2009).
Ruderman, Zoe, The First Ever Live-Tweeted Breakup, COSMOPOLITAN (Nov. 9, 2011).
Rumsey, Mary, Runaway Train: Problems of Permanence, Accessibility, and Stability in the Use of Web Resources in Law Review Citations, 94 LAW LIBR. J. 27 (2002).
Rusbult, Caryl E., Peggy A. Hannon, Sevaun L. Stocker, and Eli J. Finkel, Forgiveness and Relational Repair, in HANDBOOK OF FORGIVENESS 185 (Everett L. Worthington Jr. ed., 2005).
Salkin, Allen, What’s in a Name? Ask Google, N.Y. TIMES (Nov. 25, 2011), http://www.nytimes.com/2011/11/27/fashion/google-searches-help-parents-narrow-down-baby-names.html?_r=2&ref=technology.
Schwartz, John, Two German Killers Demanding Anonymity Sue Wikipedia’s Parent, N.Y. TIMES (Nov. 12, 2009).
Schwartz, Paul M., Data Protection Law and the Ethical Use of Analytics, CENTRE FOR INFORMATION POLICY LEADERSHIP (2010), http://www.huntonfiles.com/files/webupload/CIPL_Ethical_Undperinnings_of_Analytics_Paper.pdf.
Schwartz, Paul M., The EU-US Privacy Collision: A Turn to Institutions and Procedures, 126 HARV. L. REV. 1966 (2013).
Schwartz, Paul M., and Karl-Nikolaus Peifer, Prosser’s Privacy and the German Right of Personality: Are Four Privacy Torts Better than One Unitary Concept?, 98 CAL. L. REV. 1925 (2010).
Segal, David, Mugged by a Mug Shot Online, N.Y. TIMES (Oct. 5, 2013).
Seidman, Ilene, and Susan Vickers, The Second Wave: An Agenda for the Next Thirty Years of Rape Law Reform, 38 SUFFOLK U. L. REV. 467, 473 (2005).
Seltzer, Wendy, Free Speech Unmoored in Copyright’s Safe Harbor: Chilling Effects of the DMCA on the First Amendment, 24 HARV. J. L. & TECH. 171 (2010).
Singer, Natasha, They Loved Your G.P.A. Then They Saw Your Tweets, N.Y. TIMES (Nov. 9, 2013), http://www.nytimes.com/2013/11/10/business/they-loved-your-gpa-then-they-saw-your-tweets.html?_r=0.
Siry, Lawrence, and Sandra Schmitz, A Right to Be Forgotten? How Recent Developments in Germany May Affect the Internet Publishers in the US, 3:1 EUR. J. L. & TECH. (2012), http://ejlt.org/article/viewFile/141/222%3E.
SLAUGHTER, ANNE-MARIE, A NEW WORLD ORDER (2004).
Snead, O. Carter, Memory and Punishment, 64 VAND. L. REV. 1195 (2011).
Social Network, The (Columbia Pictures 2010).
Society of American Archivists, Code of Ethics for Archivists, SAA Council Approval/Endorsement (Feb. 2005), http://www2.archivists.org/statements/saa-core-values-statement-and-code-of-ethics.
SOLOVE, DANIEL J., THE FUTURE OF REPUTATION: GOSSIP, RUMOR, AND PRIVACY ON THE INTERNET (2007).
Solove, Daniel J., Privacy Self-Management and the Consent Dilemma, 126 HARV. L. REV. 1880 (2013).
SOLOVE, DANIEL J., UNDERSTANDING PRIVACY (2008).
Spencer, Neil, How Much Data Is Created Every Minute?, VISUAL NEWS (June 9, 2012), http://www.visualnews.com/2012/06/19/how-much-data-created-every-minute/?view=infographic.
SPINELLO, RICHARD A., CASE STUDIES IN INFORMATION AND COMPUTER ETHICS (1997).
Sprenger, Polly, Sun on Privacy: “Get Over It,” WIRED (Jan. 26, 1999).
Stanley, James E., Max Mosley and the English Right to Privacy, 10 WASH. U. GLOBAL STUD. L. REV. 641 (2011).
Star-Ledger Staff, Dharun Ravi Sentenced to Jail in Tyler Clementi Webcam Spying Case, NJ.COM (May 21, 2012), http://www.nj.com/news/index.ssf/2012/05/dharun_ravi_sentenced_to_jail.html.
Staub, Ervin, and Laurie Anne Pearlman, Promoting Reconciliation and Forgiveness after Mass Violence: Rwanda and Other Settings, in FORGIVENESS: A SAMPLING OF RESEARCH RESULTS 31 (American Psychological Association, 2006), http://www.apa.org/international/resources/forgiveness.pdf.
Storey, Katie, Evil Killer Ronald Castree Should Never Be Forgotten, Says Father of Lesley Molseed, MANCHESTER EVENING NEWS (Sept. 25, 2014), http://www.manchestereveningnews.co.uk/news/evil-killer-should-never-forgotten-7834956.
Student in Asian Tirade Video Quits University after “Death Threats and Harassment,” DAILY MAIL (Mar. 19, 2011), http://www.dailymail.co.uk/news/article-1367923/Alexandra-Wallace-YouTube-video-Student-Asian-race-row-quits-Californian-university.html.
Sunstein, Cass R., Low Value Speech Revisited, 83 NW. U. L. REV. 555 (1988).
Tabuchi, Hiroko, Facebook Wins Relatively Few Friends in Japan, N.Y. TIMES B1 (Jan. 10, 2011).
Tan, Gillian, Douglas MacMillan, and Jack Marshall, News and Ads to Debut on Snapchat, WALL ST. J. (Aug. 19, 2014), http://online.wsj.com/articles/snapchat-discussing-new-content-service-with-advertisers-and-media-firms-1408486739.
Taylor, Mary K., and Diane Hudson, “Linkrot” and the Usefulness of Web Site Bibliographies, 39 REF. & USER SERV. Q. 273 (2000).
Todd, Amanda, My Story: Struggling, Bullying, Suicide, Self Harm, YOUTUBE (2012), http://www.youtube.com/watch?v=oj05LJryiKE.
Toussaint, Loren, and Jon R. Webb, Theoretical and Empirical Connections between Forgiveness, Mental Health, and Well-Being, in HANDBOOK OF FORGIVENESS 349 (Everett L. Worthington Jr. ed., 2005).
Tugendhat, Michael, The Data Protection Act of 1998 and the Media, in THE YEARBOOK OF COPYRIGHT AND MEDIA LAW: VOLUME V: 2000 115 (Eric M. Barendt, Alison Firth, Stephen Bate, Julia Palca, John Enser, and Thomas Gibbons eds., 2001).
Umansky, Natalie, 10 Outrageous Tweets That Got People Fired, ODDEE (Feb. 21, 2014), http://www.oddee.com/item_98873.aspx.
UMBREIT, MARK S., THE HANDBOOK OF VICTIM OFFENDER MEDIATION: AN ESSENTIAL GUIDE TO PRACTICE AND RESEARCH (2002).
Urban, Jennifer, and Laura Quilter, Efficient Process or “Chilling Effects”? Takedown Notices under Section 512 of the Digital Millennium Copyright Act, 22 SANTA CLARA COMPUTER & HIGH TECH. L.J. 621 (2006).
Vasalou, Asimina, and Jeremy Pitt, Reinventing Forgiveness: A Formal Investigation of Moral Facilitation, in TRUST MANAGEMENT, THIRD INTERNATIONAL CONFERENCE, ITRUST 2005 146 (Peter Herrmann, Valérie Issarny, and Simon Shiu eds., 2005).
Velleman, J. David, The Genesis of Shame, 30 PHIL. & PUB. AFF. 27 (2001).
Volokh, Eugene, Freedom of Speech and Information Privacy: The Troubling Implications of a Right to Stop People from Speaking about You, 52 STAN. L. REV. 1049 (2000).
Volokh, Eugene, and Donald M. Falk, Google: First Amendment Protection for Search Engine Search Results, 8 J. L. ECON. & POL’Y 883 (2011).
Wacks, Raymond, Why There Will Never Be an English Common Law Privacy Tort, in NEW DIMENSIONS IN PRIVACY LAW: INTERNATIONAL AND COMPARATIVE PERSPECTIVES 154 (Andrew T. Kenyon and Megan Richardson eds., 2010).
Walker, Robert Kirk, Forcing Forgetfulness: Data Privacy, Free Speech, and the “Right to Be Forgotten,” SSRN WORKING PAPER (2012), http://ssrn.com/abstract=2017967 or http://dx.doi.org/10.2139/ssrn.2017967.
Warren, Christina, 10 People Who Lost Jobs over Social Media Mistakes, MASHABLE (June 16, 2011), http://mashable.com/2011/06/16/weinergate-social-media-job-loss/.
Warren, Samuel D., and Louis D. Brandeis, The Right to Privacy, 4 HARV. L. REV. 193 (1890).
WASSOM, BRIAN, AUGMENTED REALITY LAW, PRIVACY, AND ETHICS: LAW, SOCIETY, EMERGING AR TECHNOLOGIES (2015).
Weber, Rolf H., The Right to Be Forgotten: More than a Pandora’s Box?, 2 JIPITEC 120 (2011), http://www.jipitec.eu/issues/jipitec-2–2-2011/3084/jipitec%202%20-%20a%20-%20weber.pdf.
Weiss, Rick, On the Web, Research Work Proves Ephemeral, WASH. POST (Nov. 24, 2003), http://faculty.missouri.edu/glaserr/205f03/Article_WebPub.html.
Werro, Franz, The Right to Inform v. the Right to Be Forgotten: A Transatlantic Clash, in LIABILITY IN THE THIRD MILLENNIUM 285 (Aurelia Colombi Ciacchi, Christine Godt, Peter Rott, and Leslie Jane Smith eds., 2009).
Wersig, Gernot, Information Theory, in INTERNATIONAL ENCYCLOPEDIA OF INFORMATION AND LIBRARY SCIENCE 312 (John Feather and Paul Sturges eds., 2003).
WESTIN, ALAN F., PRIVACY AND FREEDOM (1967).
Westin, Alan F., Science, Privacy, and Freedom: Issues and Proposals for the 1970’s, 66 COLUMBIA L. REV. 1205 (1966).
WHITE HOUSE, NATIONAL STRATEGY FOR TRUSTED IDENTITIES IN CYBERSPACE, ENHANCING ONLINE CHOICE, EFFICIENCY, SECURITY, AND PRIVACY (2011), http://www.whitehouse.gov/sites/default/files/rss_viewer/NSTICstrategy_041511.pdf.
WHITMAN, JAMES Q., HARSH JUSTICE: CRIMINAL PUNISHMENT AND THE WIDENING DIVIDE BETWEEN AMERICA AND EUROPE (2003).
Whitman, James Q., The Two Western Cultures of Privacy: Dignity versus Liberty, 113 YALE L.J. 1151 (2004).
Wikipedia, “Biographies of Living Persons,” http://en.wikipedia.org/wiki/Wikipedia:Biographies_of_living_persons#Presumption_in_favor_of_privacy (last modified Feb. 3, 2013).
Wikipedia, Talk: Star Wars Kid, http://en.wikipedia.org/wiki/Talk:Star_Wars_Kid (last modified Jan. 9, 2013).
Wikipedia, Wikipedia: Notability, http://en.wikipedia.org/wiki/Wikipedia:Notability (last modified July 5, 2015).
Wikipedia, Wikipedia Talk: Talk Pages Not Indexed by Google, http://en.wikipedia.org/wiki/Wikipedia_talk:Talk_pages_not_indexed_by_Google (last modified Aug. 22, 2014).
Winter, Jessica, The Advantages of Amnesia, BOSTON.COM (Sept. 23, 2007), http://www.boston.com/news/education/higher/articles/2007/09/23/the_advantages_of_amnesia/?page=full.
Witvliet, Charlotte van Oyen, Traumatic Intrusive Imagery as an Emotional Memory Phenomenon: A Review of Research and Explanatory Information Processing Theories, 17 CLIN. PSYCHOL. REV. 509 (1997).
Witvliet, Charlotte van Oyen, Thomas E. Ludwig, and Kelly L. Vander Laan, Granting Forgiveness or Harboring Grudges: Implications for Emotion, Physiology, and Health, 12 PSYCHOL. SCI. 117 (2001).
Wohl, Michael J. A., and Nyla R. Branscombe, Forgiving the Ingroup or the Outgroup for Harm Doing, in FORGIVENESS: A SAMPLING OF RESEARCH RESULTS 23 (American Psychological Association, 2006), http://www.apa.org/international/resources/forgiveness.pdf.
Wood, Shawn Paul, Top 10 Social Media Fails of 2013, MEDIABISTRO (Dec. 16, 2013) http://www.mediabistro.com/prnewser/pr-newsers-top-10-social-media-fails-of-2013_b80443.
Woollacott, Emma, EU to Vote on Scrapping “Safe Harbor” Data Rules, FORBES (Dec. 18, 2013), http://www.forbes.com/sites/emmawoollacott/2013/12/18/eu-to-vote-on-scrapping-safe-harbor-data-rules/.
World Internet Users Statistics Usage and World Population Stats, INTERNET WORLD STATS, http://www.internetworldstats.com/stats.htm (accessed June 23, 2015).
Worthington, Everett L., Jr., Empirical Research in Forgiveness: Looking Backward, Looking Forward, in DIMENSIONS OF FORGIVENESS: PSYCHOLOGICAL RESEARCH AND THEOLOGICAL PERSPECTIVES 321 (Everett L. Worthington Jr. ed., 1998).
Xanthoulis, Napoleon, Conceptualising a Right to Oblivion in the Digital World: A Human Rights–Based Approach, SSRN WORKING PAPER SERIES (2012), http://ssrn.com/abstract=2064503 or http://dx.doi.org/10.2139/ssrn.2064503.
Zechmeister, Jeanne S., and Catherine Romero, Victim and Offender Accounts of Interpersonal Conflict: Autobiographical Narratives of Forgiveness and Unforgiveness, 82 J. PERSONALITY & SOC. PSYCHOL. 675 (2002).
Zimmer, Michael, The Externalities of Search 2.0: The Emerging Privacy Threats When the Drive for the Perfect Search Engine Meets Web 2.0, 13:3 FIRST MONDAY (Mar. 2008), http://www.uic.edu/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/2136/1944.
ZITTRAIN, JONATHAN, THE FUTURE OF THE INTERNET . . . AND HOW TO STOP IT (2009).
Zittrain, Jonathan, Kendra Albert, and Lawrence Lessig, Perma: Scoping and Addressing the Problem of Link and Reference Rot in Legal Citations, 14:2 LEGAL INFO. MANAGEMENT 88 (2014).