-
3
-
-
77955598996
-
'To Block or not to Block: European Approaches to Content Regulation, And Implications for Freedom of Expression'
-
Akdeniz, Y. (2010), 'To Block or not to Block: European Approaches to Content Regulation, and Implications for Freedom of Expression', Computer Law & Security Review, 26(3), 260-72.
-
(2010)
Computer Law & Security Review
, vol.26
, Issue.3
, pp. 260-272
-
-
Akdeniz, Y.1
-
5
-
-
84881915670
-
'Can we keep our hands off the net?'
-
All Party Parliamentary Communications Group, Report of an Inquiry by the All Party Parliamentary Communications Group, London
-
All Party Parliamentary Communications Group (2009), 'Can we keep our hands off the net?', Report of an Inquiry by the All Party Parliamentary Communications Group, London, http://www.apcomms.org.uk/uploads/apComms_Final_Report.pdf.
-
(2009)
-
-
-
6
-
-
84881864412
-
'Image hash database could filter child porn'
-
Anderson, N. (2007), 'Image hash database could filter child porn', Ars Technica, http://arstechnica.com/tech-policy/news/2007/07/image-hash-database-could-filter-child-porn.ars.
-
(2007)
Ars Technica
-
-
Anderson, N.1
-
7
-
-
84881860901
-
'European Parliament votes to remove offensive images at source'
-
Baker, J. (2011), 'European Parliament votes to remove offensive images at source', Computerworld, http://www.computerworlduk.com/news/public-sector/3261164/european-parliament-votes-to-remove-offensive-images-at-source/.
-
(2011)
Computerworld
-
-
Baker, J.1
-
8
-
-
77954789140
-
'Cybersieves'
-
Bambauer, D. (2009), 'Cybersieves', Duke Law Journal, 59(3), 477.
-
(2009)
Duke Law Journal
, vol.59
, Issue.3
, pp. 477
-
-
Bambauer, D.1
-
9
-
-
84924200554
-
Speaking of Terror
-
Strasbourg: Council of Europe, accessed 12 May 2009
-
Banisar, D. (2008), Speaking of Terror, Strasbourg: Council of Europe, http://www.coe.int/t/dghl/standardsetting/media/Doc/SpeakingOfTerror_en.pdf, accessed 12 May 2009.
-
(2008)
-
-
Banisar, D.1
-
10
-
-
84881894925
-
-
Bits of Freedom, accessed 9 March 2011
-
Bits of Freedom (2011), 'Dutch providers abandon "ineffective" web blocking', https://www.bof.nl/2011/03/07/dutch-providers-abandon-ineffective-web-blocking, accessed 9 March 2011.
-
(2011)
'Dutch providers abandon "ineffective" web blocking'
-
-
-
11
-
-
59849124767
-
'The "Butner Study" Redux: A Report of the Incidence of Hands-on Child Victimization by Child Pornography Offenders'
-
Bourke, M. and A. Hernandez (2009), 'The "Butner Study" Redux: A Report of the Incidence of Hands-on Child Victimization by Child Pornography Offenders', Journal of Family Violence, 24(3), 183-91.
-
(2009)
Journal of Family Violence
, vol.24
, Issue.3
, pp. 183-191
-
-
Bourke, M.1
Hernandez, A.2
-
12
-
-
21944439424
-
'Foucault in Cyberspace: Surveillance, Sovereignty and Hardwired Censors'
-
Boyle, J. (1997), 'Foucault in Cyberspace: Surveillance, Sovereignty and Hardwired Censors', University of Cincinnati Law Review, 177, 186.
-
(1997)
University of Cincinnati Law Review
, vol.177
, pp. 186
-
-
Boyle, J.1
-
13
-
-
78649232260
-
'Internet Filtering: Be Careful What You Ask for'
-
S.K. Schroeder and L. Hanson (eds), Istanbul: Bahcesehir University Press, accessed 4 October 2008
-
Brown, I. (2008), 'Internet Filtering: Be Careful What You Ask for', in S.K. Schroeder, and L. Hanson (eds), Freedom and Prejudice: Approaches to Media and Culture, Istanbul: Bahcesehir University Press, http://ssrn.com/paper51026597, accessed 4 October 2008.
-
(2008)
Freedom and Prejudice: Approaches to Media and Culture
-
-
Brown, I.1
-
15
-
-
84881923800
-
'Operation Ore exposed'
-
accessed 6 May 2011
-
Campbell, D. (2005), 'Operation Ore exposed', PC Pro, http://www.pcpro.co.uk/features/74690/operation-ore-exposed, accessed 6 May 2011.
-
(2005)
PC Pro
-
-
Campbell, D.1
-
18
-
-
84865505691
-
'Combating Child Abuse Images on the Internet -International Perspectives'
-
J. Davidson and P. Gottschalk (eds), Abingdon: Routledge
-
Carr, J. and Z. Hilton (2011), 'Combating Child Abuse Images on the Internet -International Perspectives', in J. Davidson and P. Gottschalk (eds), Internet Child Abuse: Current Research and Policy, Abingdon: Routledge.
-
(2011)
Internet Child Abuse: Current Research and Policy
-
-
Carr, J.1
Hilton, Z.2
-
19
-
-
84881967611
-
-
CIRCAMP (n.d.), accessed 27 March 2010
-
CIRCAMP (n.d.), 'CIRCAMP overview', http://circamp.eu/index.php?option=com_content&view=article&id=11:circamp-overview&catid=1:project&Itemid=2, accessed 27 March 2010.
-
'CIRCAMP overview'
-
-
-
21
-
-
84881943258
-
'Technical Aspects of the Censoring of Wikipedia'
-
accessed 28 March 2009
-
Clayton, R. (2008), 'Technical Aspects of the Censoring of Wikipedia', Light Blue Touchpaper, http://www.lightbluetouchpaper.org/2008/12/11/technical-aspects-of-the-censoring-ofwikipedia/, accessed 28 March 2009.
-
(2008)
Light Blue Touchpaper
-
-
Clayton, R.1
-
23
-
-
84881909936
-
-
Committee on Energy and Commerce, Washington, DC: US Government Printing Office, accessed 5 April 2011
-
Committee on Energy and Commerce (2006), 'Making the Internet Safe for Kids: The Role of ISPs and Social Networking Sites, Washington, DC: US Government Printing Office, http://ftp.resource.org/gpo.gov/hearings/109h/30530.txt, accessed 5 April 2011.
-
(2006)
'Making the Internet Safe for Kids: The Role of ISPs and Social Networking Sites
-
-
-
25
-
-
84911898594
-
'The Hidden Censors of the Internet'
-
accessed 20 September 2009
-
Davies, C. (2009), 'The Hidden Censors of the Internet', Wired, http://www.wired. co.uk/wired-magazine/archive/2009/05/features/the-hidden-censors-of-the-internet.aspx?page=all, accessed 20 September 2009.
-
(2009)
Wired
-
-
Davies, C.1
-
26
-
-
78650657641
-
'ISPs pressed to become child porn cops'
-
accessed 17 October 2008
-
Dedman, B. and B. Sullivan (2008), 'ISPs pressed to become child porn cops', MSNBC, http://www.msnbc.msn.com/id/27198621/, accessed 17 October 2008.
-
(2008)
MSNBC
-
-
Dedman, B.1
Sullivan, B.2
-
27
-
-
84859928497
-
'Beyond Denial: Introducing Next-Generation Information Access Controls'
-
R. Deibert et al. (eds), Cambridge, MA: MIT Press
-
Deibert, R. and R. Rohozinski (2010), 'Beyond Denial: Introducing Next-Generation Information Access Controls', in R. Deibert et al. (eds), Access Controlled: The Shaping of Power, Rights and Rule in Cyberspace, Cambridge, MA: MIT Press.
-
(2010)
Access Controlled: The Shaping of Power, Rights and Rule in Cyberspace
-
-
Deibert, R.1
Rohozinski, R.2
-
28
-
-
33846282115
-
'Firewalls and Power: An Overview of Global State Censorship of the Internet'
-
A. Murray and M. Klang (eds), London: GlassHouse
-
Deibert, R. and N. Villeneuve (2004), 'Firewalls and Power: An Overview of Global State Censorship of the Internet', in A. Murray and M. Klang (eds), Human Rights in the Digital Age, London: GlassHouse.
-
(2004)
Human Rights in the Digital Age
-
-
Deibert, R.1
Villeneuve, N.2
-
29
-
-
84881886600
-
-
Digital Rights Ireland, accessed 16 May 2011
-
Digital Rights Ireland (2011), 'Garda plans for web blocking referred to Data Protection Commissioner', http://www.digitalrights.ie/2011/03/29/garda-plans-for-web-blocking-referredto-data-protection-commissioner/, accessed 16 May 2011.
-
(2011)
'Garda plans for web blocking referred to Data Protection Commissioner'
-
-
-
30
-
-
77957941314
-
'Pornography, Censorship and the Internet'
-
L. Edwards and C. Waelde (eds), Oxford: Hart Publishing
-
Edwards, L. (2009), 'Pornography, Censorship and the Internet', in L. Edwards and C. Waelde (eds), Law and the Internet, Oxford: Hart Publishing.
-
(2009)
Law and the Internet
-
-
Edwards, L.1
-
31
-
-
79960178888
-
'Internet Service Provider (ISP) Filtering of Child-abusive Material: A Critical Reflection of its Effectiveness'
-
Eneman, M. (2010), 'Internet Service Provider (ISP) Filtering of Child-abusive Material: A Critical Reflection of its Effectiveness', Journal of Sexual Aggression: An international, interdisciplinary forum for research, theory and practice, 16(2), 223.
-
(2010)
Journal of Sexual Aggression: An international, interdisciplinary forum for research, theory and practice
, vol.16
, Issue.2
, pp. 223
-
-
Eneman, M.1
-
32
-
-
84881895327
-
-
EUROPOL (undated), accessed 21 March 2010
-
EUROPOL (undated), 'Funnel Web Introduction', http://www.europol.europa.eu/index. asp?page=FunnelIntro&language=, accessed 21 March 2010.
-
'Funnel Web Introduction'
-
-
-
33
-
-
84867767551
-
-
accessed July 19, 2011
-
Falkvinge, R. (2011), 'The Copyright Lobby Absolutely Loves Child Pornography', http://torrentfreak.com/the-copyright-lobby-absolutely-loves-child-pornography110709/?utm_s ource=feedburner&utm_medium=feed&utm_campaign=Feed:1Torrentfreak1(Torrentfreak)&utm_content5Google1Reader, accessed July 19, 2011.
-
(2011)
'The Copyright Lobby Absolutely Loves Child Pornography'
-
-
Falkvinge, R.1
-
35
-
-
84881949021
-
-
accessed July 16, 2010
-
Freude, A. (2009), 'Delete, Don't Block: It Works!', http://www.unpolitik.de/2009/05/28/delete-dont-block-it-works/, accessed July 16, 2010.
-
(2009)
'Delete, Don't Block: It Works!'
-
-
Freude, A.1
-
38
-
-
84881946560
-
'Net Providers to Block Sites With Child Sex'
-
accessed 14 September 2009
-
Hakim, D. (2008), 'Net Providers to Block Sites With Child Sex', The New York Times, http://www.nytimes.com/2008/06/10/nyregion/10internet.html?_r52, accessed 14 September 2009.
-
(2008)
The New York Times
-
-
Hakim, D.1
-
39
-
-
84881869423
-
'Surfing with a safety net'
-
accessed 1 May 2009
-
Hargrave, S. (2006), 'Surfing with a safety net', The Guardian, http://www.guardian.co.uk/technology/2006/jun/29/guardianweeklytechnologysection, accessed 1 May 2009.
-
(2006)
The Guardian
-
-
Hargrave, S.1
-
42
-
-
84911941726
-
'Cleanfeed: the Facts'
-
accessed 15 January 2010
-
Hutty, M. (2004), 'Cleanfeed: the Facts', LINX Public Affairs, https://publicaffairs.linx.net/news/?p5154, accessed 15 January 2010.
-
(2004)
LINX Public Affairs
-
-
Hutty, M.1
-
43
-
-
84881956850
-
-
Internet Watch Foundation (undated), accessed 15 February 2011
-
Internet Watch Foundation (undated), 'IWF URL List Policy and Procedures', http://www.iwf.org.uk/services/blocking/iwf-url-list-policy-and-procedures, accessed 15 February 2011.
-
'IWF URL List Policy and Procedures'
-
-
-
44
-
-
84881921324
-
-
Internet Watch Foundation, accessed 15 February 2011
-
Internet Watch Foundation (2010a), 'Content Assessment Appeal Process', http://www.iwf.org.uk/accountability/complaints/content-assessment-appeal-process, accessed 15 February 2011.
-
(2010)
'Content Assessment Appeal Process'
-
-
-
45
-
-
84881964033
-
-
Internet Watch Foundation, accessed 17 March 2010
-
Internet Watch Foundation (2010b), 'IWF Facilitation of the Blocking Initiative', http://www.iwf.org.uk/public/page.148.437.htm, accessed 17 March 2010.
-
(2010)
'IWF Facilitation of the Blocking Initiative'
-
-
-
46
-
-
80052840993
-
-
Internet Watch Foundation
-
Internet Watch Foundation (2011a), '2010 Annual Report', http://www.iwf.org.uk/assets/media/annualreports/Internet%20Watch%20Foundation%20Annual%20Report%202010%20web.pdf.
-
(2011)
'2010 Annual Report'
-
-
-
47
-
-
84881864061
-
-
Internet Watch Foundation, accessed 18 May 2011
-
Internet Watch Foundation (2011b), 'IWF URL List Recipients', http://www.iwf.org.uk/services/blocking/iwf-list-recipients, accessed 18 May 2011.
-
(2011)
'IWF URL List Recipients'
-
-
-
48
-
-
0348199156
-
'Law and Borders -The Rise of Law in Cyberspace'
-
Johnson, D.R. and D.G. Post (1996), 'Law and Borders -The Rise of Law in Cyberspace', Stanford Law Review, 48, 1367.
-
(1996)
Stanford Law Review
, vol.48
, pp. 1367
-
-
Johnson, D.R.1
Post, D.G.2
-
49
-
-
78149364023
-
'An International Comparison of ISP's Liabilities for Unlawful Third Party Content'
-
Kleinschmidt, B. (2010), 'An International Comparison of ISP's Liabilities for Unlawful Third Party Content', International Journal of Law and Information Technology, 18(4), 332.
-
(2010)
International Journal of Law and Information Technology
, vol.18
, Issue.4
, pp. 332
-
-
Kleinschmidt, B.1
-
51
-
-
33846063734
-
'Censorship by Proxy: The First Amendment, Internet Intermediaries, and the Problem of the Weakest Link'
-
Kreimer, S. (2006), 'Censorship by Proxy: The First Amendment, Internet Intermediaries, and the Problem of the Weakest Link', University of Pennsylvania Law Review, 155, 11.
-
(2006)
University of Pennsylvania Law Review
, vol.155
, pp. 11
-
-
Kreimer, S.1
-
52
-
-
84923025401
-
'Code and Speech. Speech Control Through Network Architecture'
-
E. Dommering and L. Asscher (eds), The Hague: T.M.C. Asser Press
-
Lambers, R. (2006), 'Code and Speech. Speech Control Through Network Architecture', E. Dommering and L. Asscher (eds), Coding Regulation: Essays on the Normative Role of Information Technology, The Hague: T.M.C. Asser Press.
-
(2006)
Coding Regulation: Essays on the Normative Role of Information Technology
-
-
Lambers, R.1
-
53
-
-
84881932706
-
-
Leaseweb, accessed 20 July 2011
-
Leaseweb (2009), 'LeaseWeb 1st Hosting Provider to Install Child Porn Filter', http://blog.leaseweb.com/2009/03/16/leaseweb-1st-hosting-provider-to-install-child-porn-filter/, accessed 20 July 2011.
-
(2009)
'LeaseWeb 1st Hosting Provider to Install Child Porn Filter'
-
-
-
54
-
-
84881940569
-
'Child porn suspects set to be cleared in evidence "shambles"'
-
Leppard, D. (2005), 'Child porn suspects set to be cleared in evidence "shambles"', The Sunday Times, http://www.timesonline.co.uk/tol/news/uk/article539974.ece.
-
(2005)
The Sunday Times
-
-
Leppard, D.1
-
57
-
-
78649249528
-
'Blocking Child Pornography on the Internet: European Union Developments'
-
McIntyre, T.J. (2010), 'Blocking Child Pornography on the Internet: European Union Developments', International Review of Law, Computers & Technology, 24(3), 209-21.
-
(2010)
International Review of Law, Computers & Technology
, vol.24
, Issue.3
, pp. 209-221
-
-
McIntyre, T.J.1
-
58
-
-
85190450051
-
'Internet Filtering: Rhetoric, Legitimacy, Accountability and Responsibility'
-
R. Brownsword and K. Yeung (eds), Oxford: Hart Publishing
-
McIntyre, T.J. and C. Scott (2008), 'Internet Filtering: Rhetoric, Legitimacy, Accountability and Responsibility', in R. Brownsword and K. Yeung (eds), Regulating Technologies, Oxford: Hart Publishing, http://ssrn.com/abstract51103030.
-
(2008)
Regulating Technologies
-
-
McIntyre, T.J.1
Scott, C.2
-
59
-
-
84881968277
-
'New York sends AOL "how-to-wiretap" slides'
-
accessed 30 June 2009
-
Metz, C. (2008), 'New York sends AOL "how-to-wiretap" slides', The Register, http://www.theregister.co.uk/2008/10/20/cuomo_pron_crusade_continues/, accessed 30 June 2009.
-
(2008)
The Register
-
-
Metz, C.1
-
61
-
-
84881949251
-
'What the Cops Can't Do, Internet Service Providers Can: Preserving Privacy in Email Contents'
-
accessed 23 February 2011
-
Morrison, S.R. (2011), 'What the Cops Can't Do, Internet Service Providers Can: Preserving Privacy in Email Contents', SSRN eLibrary, http://papers.ssrn.com/sol3/papers.cfm?abstract_id51729000, accessed 23 February 2011.
-
(2011)
SSRN eLibrary
-
-
Morrison, S.R.1
-
65
-
-
84881852454
-
-
Ofcom, accessed 11 April 2009
-
Ofcom (2008), 'Ofcom's Response to the Byron Review', http://www.ofcom.org.uk/research/telecoms/reports/byron/, accessed 11 April 2009.
-
(2008)
'Ofcom's Response to the Byron Review'
-
-
-
66
-
-
84881875094
-
'Attorney General Cuomo announces expansion of groundbreaking initiative to eliminate sharing of thousands of images of child pornography on social networking web sites'
-
Office of the Attorney General, accessed 30 March 2011
-
Office of the Attorney General (2010), 'Attorney General Cuomo announces expansion of groundbreaking initiative to eliminate sharing of thousands of images of child pornography on social networking web sites', New York State Attorney General, http://www.ag.ny.gov/media_center/2010/june/june21a_10.html, accessed 30 March 2011.
-
(2010)
New York State Attorney General
-
-
-
67
-
-
70450253119
-
'The Rise and Fall of Invasive ISP Surveillance'
-
Ohm, P. (2009), 'The Rise and Fall of Invasive ISP Surveillance', University of Illinois Law Review, 1417.
-
(2009)
University of Illinois Law Review
, pp. 1417
-
-
Ohm, P.1
-
68
-
-
84881899218
-
'Government ban on internet firms that do not block child sex sites'
-
accessed 12 March 2010
-
O'Neill, S. (2010), 'Government ban on internet firms that do not block child sex sites', The Times, http://technology.timesonline.co.uk/tol/news/tech_and_web/the_web/article7055882.ece, accessed 12 March 2010.
-
(2010)
The Times
-
-
O'Neill, S.1
-
69
-
-
84881951838
-
'A censorship model'
-
accessed 21 September 2009
-
Ozimek, J. (2009), 'A censorship model', The Guardian, http://www.guardian.co.uk/commentisfree/libertycentral/2009/aug/02/internet-censor, accessed 21 September 2009.
-
(2009)
The Guardian
-
-
Ozimek, J.1
-
71
-
-
84881904262
-
-
La Quadrature du Net, accessed 15 February 2011
-
La Quadrature du Net (2011), 'French LOPPSI Bill Adopted: The Internet under Control?', http://www.laquadrature.net/en/french-loppsi-bill-adopted-the-internet-under-control, accessed 15 February 2011.
-
(2011)
'French LOPPSI Bill Adopted: The Internet under Control?'
-
-
-
72
-
-
84881956635
-
'BT on child porn stats'
-
accessed 25 January 2009
-
Richardson, T. (2004a), 'BT on child porn stats', The Register, http://www.theregister.co.uk/2004/07/22/bt_ispa_cleanfeed/, accessed 25 January 2009.
-
(2004)
The Register
-
-
Richardson, T.1
-
73
-
-
84881858486
-
'ISPA seeks analysis of BT's "Cleanfeed" stats'
-
accessed 25 January 2009
-
Richardson, T. (2004b), 'ISPA seeks analysis of BT's "Cleanfeed" stats', The Register, http://www.theregister.co.uk/2004/07/21/ispa_bt_cleanfeed/, accessed 25 January 2009.
-
(2004)
The Register
-
-
Richardson, T.1
-
74
-
-
84878890965
-
'Facebook's New Way to Combat Child Pornography'
-
accessed 20 July 2011
-
Richmond, R. (2011), 'Facebook's New Way to Combat Child Pornography', New York Times, http://gadgetwise.blogs.nytimes.com/2011/05/19/facebook-to-combat-child-pornusing-microsofts-technology/, accessed 20 July 2011.
-
(2011)
New York Times
-
-
Richmond, R.1
-
75
-
-
40049098732
-
'Exposure to Pornography as a Cause of Child Sexual Victimization'
-
N.E. Dowd, D.G. Singer and R.F. Wilson (eds), Culture, and Violence, London: Sage
-
Russell, D.E.H. and N.J. Purcell, (2005), 'Exposure to Pornography as a Cause of Child Sexual Victimization', in N.E. Dowd, D.G. Singer and R.F. Wilson (eds), Handbook of Children, Culture, and Violence, London: Sage, pp. 59-84.
-
(2005)
Handbook of Children
, pp. 59-84
-
-
Russell, D.E.H.1
Purcell, N.J.2
-
76
-
-
84916607248
-
'Fourth Amendment Search and the Power of the Hash'
-
Salgado, R.P. (2006), 'Fourth Amendment Search and the Power of the Hash', Harvard Law Review Forum, 119, 38.
-
(2006)
Harvard Law Review Forum
, vol.119
, pp. 38
-
-
Salgado, R.P.1
-
77
-
-
78650851875
-
'Privacy and Law Enforcement: Caught in the Cloud: Privacy, Encryption, and Government Back Doors in the Web 2.0 Era'
-
Soghoian, C. (2010), 'Privacy and Law Enforcement: Caught in the Cloud: Privacy, Encryption, and Government Back Doors in the Web 2.0 Era', J. of Telecomm. & High Tech. L, 8, 359-613.
-
(2010)
J. of Telecomm. & High Tech. L
, vol.8
, pp. 359-613
-
-
Soghoian, C.1
-
78
-
-
84873918066
-
'An End to Privacy Theatre: Exposing and Discouraging Corporate Disclosure of User Data to the Government'
-
Soghoian, C. (2011), 'An End to Privacy Theatre: Exposing and Discouraging Corporate Disclosure of User Data to the Government', Minnesota Journal of Law, Science and Technology, 12(1), 191.
-
(2011)
Minnesota Journal of Law, Science and Technology
, vol.12
, Issue.1
, pp. 191
-
-
Soghoian, C.1
-
80
-
-
65549158586
-
'Governmental Filtering of Websites: The Dutch Case'
-
Stol, W. et al. (2009), 'Governmental Filtering of Websites: The Dutch Case', Computer Law & Security Review, 25, 251-62.
-
(2009)
Computer Law & Security Review
, vol.25
, pp. 251-262
-
-
Stol, W.1
-
82
-
-
0042103988
-
'Of Elephants, Mice, and Privacy: International Choice of Law and the Internet'
-
Swire, P.P. (1998), 'Of Elephants, Mice, and Privacy: International Choice of Law and the Internet', The International Lawyer, 32, 991.
-
(1998)
The International Lawyer
, vol.32
, pp. 991
-
-
Swire, P.P.1
-
84
-
-
84881971939
-
'Barriers to Cooperation: An Analysis of the Origins of International Efforts to Protect Children Online'
-
R. Deibert et al. (eds), Rights and Rule in Cyberspace, Cambridge, MA: MIT Press
-
Villeneuve, N. (2010), 'Barriers to Cooperation: An Analysis of the Origins of International Efforts to Protect Children Online', in R. Deibert et al. (eds), Access Controlled: The Shaping of Power, Rights and Rule in Cyberspace, Cambridge, MA: MIT Press.
-
(2010)
Access Controlled: The Shaping of Power
-
-
Villeneuve, N.1
-
85
-
-
79959225157
-
'Porn, Pipes and the State: Censoring Internet Content'
-
Walden, I. (2010), 'Porn, Pipes and the State: Censoring Internet Content', The Barrister, (44), 16-17.
-
(2010)
The Barrister
, Issue.44
, pp. 16-17
-
-
Walden, I.1
-
86
-
-
84878728483
-
'Clean Feed: Australia's Internet Filtering Proposal'
-
accessed 6 May 2009
-
Watt, R. and A. Maurushat (2009), 'Clean Feed: Australia's Internet Filtering Proposal', Internet Law Bulletin, 12(2), http://www.austlii.edu.au/au/journals/UNSWLRS/2009/7.html, accessed 6 May 2009.
-
(2009)
Internet Law Bulletin
, vol.12
, Issue.2
-
-
Watt, R.1
Maurushat, A.2
-
88
-
-
84881920810
-
'Home Office backs down on net censorship laws'
-
accessed 16 October 2009
-
Williams, C. (2009), 'Home Office backs down on net censorship laws', The Register, http://www.theregister.co.uk/2009/10/16/home_office_iwf_legislation/, accessed 16 October 2009.
-
(2009)
The Register
-
-
Williams, C.1
-
89
-
-
84881944615
-
'Hollywood studios ask High Court to block film website'
-
accessed 20 July 2011
-
Williams, C. (2011), 'Hollywood studios ask High Court to block film website', The Telegraph, http://www.telegraph.co.uk/technology/news/8597596/Hollywood-studios-ask-High-Court-to-block-film-website.html, accessed 20 July 2011.
-
(2011)
The Telegraph
-
-
Williams, C.1
-
90
-
-
3142676189
-
'Internet Points of Control'
-
Zittrain, J. (2003), 'Internet Points of Control', Boston College Law Review, 44, 653.
-
(2003)
Boston College Law Review
, vol.44
, pp. 653
-
-
Zittrain, J.1
-
91
-
-
84881956887
-
'Deleting trumps blocking in fight against online child porn'
-
accessed 7 April 2011
-
Zuvela, M. (2011), 'Deleting trumps blocking in fight against online child porn', Deutsche Welle, http://www.dw-world.de/dw/article/0,14968970,00.html, accessed 7 April 2011.
-
(2011)
Deutsche Welle
-
-
Zuvela, M.1
|