Internet Public Policy Themes: A Literature Review

Document Type: Review Article

Authors

1 Department of Management, Imam Reza International University, Mashhad, Iran

2 Department of Communication, Central Tehran Branch, Islamic Azad University, Tehran, Iran

Abstract

The current paper aims to present a literature review for the researches conducted on internet public policy themes and provides a classification scheme for future research agenda. This research conducts a literature review based on the studies published in English and in a peer-reviewed journal from 1979 to 2015. Simple criterion method was used to find articles. 427 articles identified in 267 academic journals. All these articles were analyzed by year of publication, number of articles in the selected journal and area topics. This extended literature review provides an exhaustive and valuable source for future internet public policy research for practitioners and scholars by presenting a comprehensive list of references. Although, part of this article was published by (Kashani & Kasmani, 2018), the references listing associated with each internet public policy issue is original.  

Keywords


Singh, S., 1999. Electronic money: understanding its use to increase the effectiveness of policy. Telecommunications Policy, 23(10/11), p. Telecommunications Policy.
Abbas, H. & Al-Hayan, A., 2003. Electronic Signature: Analytical Study of the Kuwaiti Ministry of Commerce and Manufacturing Proposal. Journal of Economic and Administrative Sciences, 19(1), pp. 1 - 2.
Afullo, T. J., 2000. Global Information and Africa: the telecommunications infrastructure for cyberspace. Library Management, 21(4), pp. 205 - 214.
Akdeniz, Y., 2001. Internet Content Regulation: UK Government and the Control of Internet Content. Computer Law & Security Review, 17(5), p. 303–317.
Al-Kadhi, M. A., 2011. Assessment of the status of spam in the Kingdom of Saudi Arabia. Journal of King Saud University – Computer and Information Sciences, 23(2), p. 45–58.
Allen, A., 2001. Internet Jurisdiction Today. Northwestern Journal of International Law & Business, 22(1), pp. 69-90.
Almaguer, A. E. & Baggott, R. W., 1998. Shaping New Legal Frontiers: Dispute Resolution for the Internet. Ohio State Journal on Dispute Resolution, Volume 13, pp. 711-748.
Al-mutawkkil, A., Heshmati, A. & Hwang, J., 2009. Development of telecommunication and broadcasting infrastructure indices at the global level. Telecommunications Policy, 33(3-4), p. 176–199.
Al-Slamy, N. A., 2008. E-Commerce Security. International Journal of Computer Science and Network Security, 8(5), pp. 340-344.
American Nurses Association, 1991. Retired Position Statement: Cultural Diversity in Nursing Practice. [Online] Available at: http://www.nursingworld.org/MainMenu Categories/Policy-Advocacy/Positions-andResolutions/ANAPositionStatements/ Archives/prtetcldv14444. html [Accessed 05 12 2016].
Anderson, B., 2007. Net Neutrality: What Librarians Should Know?, Behavioral & Social Sciences Librarian, 25(2), pp. 93-98.
Andersson, P. & Mattsson, L.-G., 2015. Service innovations enabled by the “internet of things”. IMP Journal, 9(1), pp. 85 - 106.
Andrew, A. M., 2010. Cybernetics and systems on the web. Kybernetes, 39(7), pp. 1097-1099.
Andrieu, M., 2001. The future of e‐money: an international review of policy and regulatory issues. Foresight, 3(6), pp. 501 - 522.
Andrieu, M., 2001. The future of e‐money: main trends and driving forces. Foresight, 3(5), pp. 29 - 451.
Anga, P. H., 2001. The Role of Self-Regulation of Privacy and the Internet. Journal of Interactive Advertising, 1(2), pp. 1-9.
Antón, A. I., Earp, J. B. & Young, J. D., 2010. How Internet Users' Privacy Concerns Have Evolved since 2002. IEEE Security and Privacy, 8(1), pp. 21-27.
Arendt, L., 2008. Barriers to ICT adoption in SMEs: how to bridge the digital divide?. Journal of Systems and Information Technology, 10(2), pp. 93 - 108.
Arlandis, A. & Baranes, E., 2011. Interactions between Network Operators, Content Providers and Internet Intermediaries: Empirical Implications of Network Neutrality. Intereconomics, 46(2), pp. 98-105.
Asensio, P. A. D. M., 2012. Internet Intermediaries and the Law Applicable to Intellectual Property Infringements. Journal of Intellectual Property, Information Technology and E-Commerce Law, Volume 3, pp. 350-360.
Assaf, D., 2008. Models of critical information infrastructure protection. International Journal of Critical Infrastructure Protection, 1(1), p. 6–14.
Atkinson, S., Furnell, S. & Phippen, A., 2009. Securing the next generation: enhancing e-safety awareness among young people. Computer Fraud & Security, 2009(7), p. 13–19.
Attaran, M. & VanLaar, I., 1999. Privacy and security on the Internet: how to secure your personal information and company data. Information Management & Computer Security, 7(5), pp. 241 - 247.
Atton, C., 1995. Policing electronic information: threats to freedom of expression. New Library World, 96(5), p. 5.
Atzori, L., Iera, A. & Morabito, G., 2010. The Internet of Things: A survey. Computer Networks, 54(15), p. 2787–2805.
August, R., 2002. International Cyber-Jurisdiction: A Comparative Analysis. American Business Law Journal, 39(4), p. 531–574.
Bahdi, R., 2000. Analyzing Women's Use of the Internet through the Rights Debate. Chicago-Kent Law Review, 75(3), pp. 869-897.
Baker, P. M., 2001. Policy bridges for the digital divide: Assessing the landscape and gauging the dimensions. First Monday, 6(5-7).
Baker, P. M. & Bellordre, C., 2003. Factors Influencing Adoption of Wireless Technologies: Key Issues, Barriers and Opportunities for People with Disabilities. Information Technology and Disabilities Journal, 9(2).
Bambauer, D. E., 2005. Solving the Inbox Paradox: An Information-Based Policy Approach to Unsolicited E-mail Advertising. Virginia Journal of Law and Technology, 10(5), pp. 1-95.
Barnesa, D. & Hinton, M., 2007. Developing a framework to analyse the roles and relationships of online intermediaries. International Journal of Information Management, Volume 27, p. 63–74.
Barnett, H., 1999. Becoming Literate about Copyright and Internet Issues. Computers in the Schools: Interdisciplinary Journal of Practice, Theory, and Applied Research, 15(1), pp. 33-38.
Barzilai-Nahona, K., 2006. Gaps and Bits: Conceptualizing Measurements for Digital Divide/s. The Information Society: An International Journal, 22(5), pp. 269-278.
Basel Committee on Banking Supervision, 1998. Risk Management for Electronic Banking and Electronic Money Activities. [Online] Available at: https://www.bis.org/publ/bcbsc215.pdf
[Accessed 10 May 2016].
Bauer, J. M. & Eeten, M. J. v., 2009. Cybersecurity: Stakeholder incentives, externalities, and policy options. Telecommunications Policy, 33(10-11), p. 706–719.
Baumer, D. L., Earp, J. B. & Poindexter, J. C., 2004. Internet privacy law: a comparison between the United States and the European Union. Computers & Security, 23(5), p. 400–412.
Bélanger, F. & Crossler, R. E., 2011. Privacy in the digital age: a review of information privacy research in information systems. MIS Quarterly, 35(4), pp. 1017-1042.
Benkler, Y., 1998. Communications infrastructure regulation and the distribution of control over content. Telecommunications Policy, 23(8), pp. 183-196.
Benkler, Y., 2000. From Consumers to Users: Shifting the Deeper Structures of Regulation towards Sustainable Commons and User Access 52 Fed. Comm. L.J. 561,. Federal Communications Law Journal, 52(3), pp. 561-579.
Benoliel, D., 2015. Towards a Cybersecurity Policy Model: Israel National Cyber Bureau Case Study. North Carolina Journal of Law & Technology, 16(3), pp. 435-486.
Berentsen, A., 1998. Monetary Policy Implications of Digital Money. Kyklos, 51(1), p. 89–118.
Berman, J. & Mulligan, D., 1998. Privacy in the Digital Age: Work in Progress. Nova Law Review, 23(2), pp. 551-583.
Best, M. L. & Thakur, D., 2009. The telecommunications policy process in post‐conflict developing countries: the case of Liberia. info, 11(2), pp. 42 - 57.
Best, S. J. & Teske, P., 2002. Explaining State Internet Sales Taxation: New Economy, Old-Fashioned Interest Group Politics. State Politics & Policy Quarterly, 2(1), pp. 37-51.
Best, S. J. & Teske, P., 2002. Explaining State Internet Sales Taxation: New Economy, Old-Fashioned Interest Group Politics. State Politics and Policy Quarterly, Spring, 2(1), p. 37–51.
Bide, M., 2009. Does copyright have a future?. Business Information Review, 26(4), p. 248–253.
Biukovic, L., 2002. International Commercial Arbitration in Cyberspace: Recent Developments. Northwestern Journal of International Law and Business, 22(3), pp. 319-352.
Blackman, C. R., 1998. Convergence between telecommunications and other media: How should regulation adapt?. Telecommunications Policy, 22(3), pp. 163-170.
Blommaert, J. et al., 2009. Media, multilingualism and language policing: an introduction. Language Policy, 8(3), p. 203–207.
Borés, C., Saurina, C. & Torres, R., 2003. Technological convergence: a strategic perspective. Technovation, 23(1), p. 1–13.
Bowie, N. E. & Jamal, K., 2006. Privacy Rights on the Internet: Self-Regulation or Government Regulation?. Business Ethics Quarterly, 16(3), pp. 323-342.
Bowker, N. & Tuffin, K., 2004. Using the online medium for discursive research about people with disabilities. Social Science Computer Review, 22(2), pp. 228 - 241.
Brechbühl, H., Bruce, R., Scott, D. & Johnson, M. E., 2010. Protecting Critical Information Infrastructure: Developing Cybersecurity Policy. Information Technology for Development, 16(1), pp. 83-91.
Brimmer, K. W., 1981. Telecommunications Regulations and policy. Online Review, 5(6), pp. 481 - 486.
Brophy, P. & Halpin, E., 1999. Through the Net to freedom: information, the Internet and human rights. Journal of Information Science, 25(5), p. 351–364.
Bruce, D., Deskins, J. & Fox, W. F., 2004. Has Internet Access Taxation Affected Internet Use?. Public Finance Review, 32(2), pp. 131-147.
Buchanan, T., Paine, C., Joinson, A. N. & Reips, U.-D., 2007. Development of measures of online privacy concern and protection for use on the Internet. Journal of the American Society for Information Science and Technology, 58(2), p. 157–165.
Bunker, M. D., 2001. Intellectuals' Property Universities, Professors, and the Problem of Copyright in the Internet Age. Journalism and Mass Communication Quarterly, 78(4), pp. 675-687.
Bushhousen, E., 2011. Cloud Computing. Journal of Hospital Librarianship, 11(4), pp. 388-392.
Carey, A. C., Friedman, M. G. & Nels, D., 2005. Use of Electronic Technologies by People With Intellectual Disabilities. Mental Retardation, 43(5), p. 322–333.
Carter, J. & Marker, M., 2001. Web accessibility for people with disabilities: an introduction for Web developers. IEEE Transactions on Professional Communication, 44(4), pp. 225 - 233.
Carveth, R. & Kretchmer, S. B., 2002. Policy Options to Combat the Digital Divide in Western Europe. Informing Science, 5(3), pp. 115-123.
Castronova, E., Knowles, I. & Ross, T. L., 2015. Policy questions raised by virtual economies. Telecommunications Policy, 39(9), p. 787–795.
Castro, S., Wessels, D., Fomenkov, M. & Claffy, K., 2008. A day at the root of the internet. ACM SIGCOMM Computer Communication Review, 38(5), pp. 41-46.
Cate, F. H., 2000. Principles of Internet Privacy. Connecticut Law Review, Volume 32, pp. 877-896.
Cerf, V. G., 1995. Some Possible Government Roles in Information Infrastructure. Serials Review, 21(1), pp. 11-16.
Chadwick, D., Wesson, C. & Fullwood, C., 2013. Internet Access by People with Intellectual Disabilities: Inequalities and Opportunities. Future Internet, Volume 5, pp. 376-397.
Chai, S. et al., 2009. Internet and Online Information Privacy: An Exploratory Study of Preteens and Early Teens. IEEE Transactions on Professional Communication, 52(2), pp. 167 - 182.
Chaudri, A., 2010. Internet domain names and the interaction with intellectual property. Computer Law & Security Review, 26(1), p. 38–42.
Cheng, H. K., Bandyopadhyay, S. & Guo, H., 2010. The Debate on Net Neutrality: A Policy Perspective. Information Systems Research, 22(1), pp. 60 - 82.
Cheong, P. H., 2007. Gender and Perceived Internet Efficacy: Examining Secondary Digital Divide Issues in Singapore. Women's Studies in Communication, 30(2), pp. 205-226.
Chircu, A. M. & Kauffman, R. J., 1999. Strategies for Internet Middlemen in the Intermediation/Disintermediation/Reintermediation Cycle. Electronic Markets, 9(1/2), pp. 109-117.
Cho, C.-H. & Cheon, H. J., 2005. Children's Exposure to Negative Internet Content: Effects of Family Context. Journal of Broadcasting & Electronic Media, 49(4), pp. 488-509.
Cho, H. & LaRose, R., 1999. Privacy issues in Internet surveys. Social Science Computer Review, 17(4), pp. 421 - 434.
Chon, B. S. et al., 2003. A Structural Analysis of Media Convergence: Cross-Industry Mergers and Acquisitions in the Information Industries. Journal of Media Economics, 16(3), pp. 141-157.
Ciardhuáin, S. Ó., 2004. An Extended Model of Cybercrime Investigations. International Journal of Digital Evidence, 3(1), pp. 1-22.
Claessens, J. et al., 2003. Revocable anonymous access to the Internet?. Internet Research, 13(4), pp. 242 - 258.
Cobb, P., Kobrin, S. J. & Wagner, E., 2014. Taxing E-Commerce: The Landscape of Internet Taxation. University of Pennsylvania Journal of International Economic Law, 21(3), pp. 659-678.
Coetzee, M. & Eloff, J. H., 2005. An access control framework for web services. Information Management & Computer Security, 13(1), pp. 29 - 38.
Cohen, B. J., 2001. Electronic money: new day or false dawn?. Review of International Political Economy, 8(2), pp. 197-225.
Corley, M. D. & Hook, J. N., 2012. Women, Female Sex and Love Addicts, and Use of the Internet. Sexual Addiction & Compulsivity: The Journal of Treatment & Prevention, 19(12), pp. 53-76.
Crenshaw, E. M. & Robison, K. K., 2006. Globalization and the Digital Divide: The Roles of Structural Conduciveness and Global Connection in Internet Diffusion. Social Science Quarterly, 87(1), p. 190–207.
Crenshaw, E. M. & Robison, K. K., 2006. Jump-Starting the Internet Revolution: How Structural Conduciveness and Global Connections Help Diffuse the Internet. Journal of the Association for Information Systems, 7(1).
Crocioni, P., 2011. Net Neutrality in Europe: Desperately seeking a market failure. Telecommunications Policy, 35(1), p. 1–11.
Crowcroft, J., 2007. Net Neutrality: The Technical Side of the Debate ~ A White Paper. International Journal of Communication, 1(1), pp. 567-579.
CSTD Secretariat, 2014. The mapping of international Internet public policy issues, Geneva, Switzerland: Intersessional Panel of the Commission on Science and Technology for Development.
D'Annunzio, A. & Russo, A., 2015. Net Neutrality and internet fragmentation: The role of online advertising. International Journal of Industrial Organization, 43(November), p. 30–47.
Dasgupta, S., Lall, S. & Wheeler, D., 2005. Policy Reform, Economic Growth and the Digital Divide. Oxford Development Studies, 33(2), pp. 229-243.
Davis, J. F., 1997. Property rights to consumer information: A proposed policy framework for direct marketing. Journal of Direct Marketing, 11(3), p. 32–43.
DeNardis, L., 2012. Hidden Levers of Internet Control. nformation, Communication & Society, 15(5), pp. 720-738.
Dewan, S., Ganley, D. & Kraemer, K. L., 2005. Across The Digital Divide: A Cross-Country Multi-Technology Analysis of the Determinants of IT Penetration. Journal of the Association for Information Systems, 6(12), pp. 409-432.
Dhar, S., 2012. From outsourcing to Cloud computing: evolution of IT services. Management Research Review, 35(8), pp. 664 - 675.
Dijk, J. v. & Hacker, K., 2003. The Digital Divide as a Complex and Dynamic Phenomenon. The Information Society: An International Journal, 19(5), pp. 315-326.
DiMaggio, P., Hargittai, E., Neuman, W. R. & Robinson, J. P., 2001. Social Implications of the Internet. Annual Review of Sociology, Volume 27, pp. 307-336.
Dinev, T. & Hart, P., 2004. Internet privacy concerns and their antecedents - measurement validity and a regression model. Behaviour & Information Technology, 23(6), pp. 413-422.
Dinh, H. T., Lee, C., Niyato, D. & Wang, P., 2013. A survey of mobile cloud computing: architecture, applications, and approaches. Wireless Communications and Mobile Computing, 13(18), p. 1587–1611.
Dobransky, K. & Hargittaia, E., 2006. The disability divide in internet access and use. Information, Communication & Society, 9(3), pp. 313-334.
Domingo, M. C., 2012. An overview of the Internet of Things for people with disabilities. Journal of Network and Computer Applications, 35(2), p. 584–596.
Donahue, H. C., 2010. The network neutrality inquiry. info, 12(2), pp. 3 - 8.
Doty, N. & Mulligan, D. K., 2013. Internet Multistakeholder Processes and Techno-Policy Standards. Journal on Telecommunications and High Technology Law, 11(1), pp. 135-182.
Dueker, K. S., 1996. Trademark Law Lost in Cyberspace: Trademark Protection for Internet Addresses. Harvard Journal of Law & Technology, 9(2), pp. 483-512.
Dunne, M. J. & Musacchio, A. L., 1998. Jurisdiction over the Internet. The Business Lawyer, 54(1), pp. 385-402.
Dunn, M., 2005. The Socio-Political Dimensions of Critical Information Infrastructure Protection (CIIP). International Journal for Critical Infrastructure Protection, 1(2), pp. 258-268.
Dykman, C. A. & Davis, C. K., 2008. Part One--The Shift toward Online Education. Journal of Information Systems Education, 19(1), pp. 11-16.
Earp, J. B., Antón, A. I., Aiman-Smith, L. & Stufflebeam, W. H., 2005. Examining Internet privacy policies within the context of user privacy values. IEEE Transactions on Engineering Management, 52(2), pp. 227 - 237.
Economides, N., 2008. 'Net Neutrality', Non-Discrimination and Digital Distribution of Content through the Internet. A Journal of Law and Policy for the Information Society, 4(2), pp. 209-233.
Economides, N. & Tåg, J., 2012. Network neutrality on the Internet: A two-sided market analysis. Information Economics and Policy, 24(2), p. 91–104.
Epstein, D., Nisbet, E. C. & Gillespie, T., 2011. Who's Responsible for the Digital Divide? Public Perceptions and Policy Implications. The Information Society, 27(2), pp. 92-104.
European Central Bank, 2012. Virtual Currency Schemes, Frankfurt am Main: European Central Bank.
Facera, K., 2012. After the moral panic? Reframing the debate about child safety online. Discourse: Studies in the Cultural Politics of Education, 33(3), pp. 397-413.
Fafinski, S., 2011. Public Policy Responses to Cybercrime. Policy & Internet, 3(2), p. 1–6.
Fan, Q., 2002. Internet Access in Rural Australia: Issues and Policies. Rural Society, 12(3), pp. 211-223.
Fernandez, P., 2015. Through the looking glass: thinking through the internet of things. Library Hi Tech News, 32(5), pp. 4 - 7.
Ferro, E., Helbig, N. C. & Gil-Garcia, J. R., 2011. The role of IT literacy in defining digital divide policy needs. Government Information Quarterly, 28(1), p. 3–10.
Flanagin, A. J., Farinola, W. J. M. & Metzgera, M. J., 2000. The technical code of the internet/world wide web. Critical Studies in Media Communication, 17(4), pp. 409-428.
Flanagin, A. J., Flanagin, C. & Flanagin, J., 2010. Technical Code and the Social Construction of the Internet. New Media & Society, 12(2), pp. 179-196.
Flores de Frutos, R., Gracia-Díez, M., Pérez-Amaral, T. & Vega-Catena, P. J., 1999. The Economic Impact of Investment in Infrastructures of Telecommunications in Spain: 1964-1993. Journal of Systems and Information Technology, 1(3), pp. 35-48.
Frankel, S., 2010. Digital Copyright and Culture. The Journal of Arts Management, 40(2), pp. 140-156.
Frydman, B. & Rorive, I., 2002. Regulating the Internet through Intermediaries in Europe and the USA. Zeitschrift für Rechtssoziologie, 23(1), pp. 41-59.
Fuchs, C., 2010. Labor in Informational Capitalism and on the Internet. The Information Society: An International Journal, 26(3), pp. 179-196.
Furuholt, B. & Kristiansen, S., 2007. A Rural Digital Divide? Regional Aspects of Internet Use in Tanzania. Electronic Journal of Information Systems in Developing Countries, 31(6), pp. 1-15.
Gandhi, R., 2011. Dimensions of Cyber-Attacks: Cultural, Social, Economic, and Political. IEEE Technology and Society Magazine, 30(1), pp. 28 - 38.
Gangwar, H., Date, H. & Ramaswamy, R., 2015. Understanding determinants of cloud computing adoption using an integrated TAM-TOE model. Journal of Enterprise Information Management, 28(1), pp. 107 - 130.
Ganley, P. & Allgrove, B., 2006. Net neutrality: A user's guide. Computer Law & Security Review, 22(6), p. 454–463.
Gao, L. & Bai, X., 2014. A unified perspective on the factors influencing consumer acceptance of internet of things technology. Asia Pacific Journal of Marketing and Logistics, 26(2), pp. 211 - 231.
Gasaway, L. N., 1998. Copyright, the Internet, and other legal issues. Journal of the American Society for Information Science, 49(11), p. 1003–1009.
Gebremichael, M. D. & Jackson, J. W., 2006. Bridging the gap in Sub-Saharan Africa: A holistic look at information poverty and the region's digital divide. Government Information Quarterly, 23(2), p. 267–280.
Gerhards, J. & Schäfer, M. S., 2010. Is the internet a better public sphere? Comparing old and new media in the USA and Germany. New Media & Society, 12(1), p. 143–160.
Gerrand, P., 2006. Cultural diversity in cyberspace: The Catalan campaign to win the new .cat top level domain. First Monday, 11(1-2).
Gerrand, P., 2007. Estimating Linguistic Diversity on the Internet: A Taxonomy to Avoid Pitfalls and Paradoxes. Journal of Computer-Mediated Communication, 12(4), p. 1298–1321.
Gerstenfeld, P. B., Grant, D. R. & Chiang, C.-P., 2003. Hate Online: A Content Analysis of Extremist Internet Sites. Analyses of Social Issues and Public Policy, 3(1), p. 29–44.
Ghose, A. & Han, S. P., 2011. An Empirical Analysis of User Content Generation and Usage Behavior on the Mobile Internet. Management Science, 57(9), pp. 1671 - 1691.
Gibbs, J., Kraemer, K. L. & Dedrick, J., 2003. Environment and Policy Factors Shaping Global E-Commerce Diffusion: A Cross-Country Comparison. The Information Society: An International Journal, 19(1), pp. 5-18.
Gilbert, M. R., Masucci, M., Homko, C. & Bove, A. A., 2008. Theorizing the digital divide: Information and communication technology use frameworks among poor women using a telemedicine system. Geoforum, 39(2), p. 912–925.
Gilman, J., 2000. Personal Jurisdiction and the Internet: Traditional Jurisprudence for a New Medium. The Business Lawyer, 56(1), pp. 395-422.
Girsberger, D. & Schramm, D., 2002. Cyber-Arbitration. European Business Organization Law Review, 3(3), pp. 611--628.
Goggin, G. & Griff, C., 2001. Regulating for Content on the Internet: Meeting Cultural and Social Objectives for Broadband. Media International Australia, 101(1), pp. 19-31.
Goldsmith, E. & McGregor, S. L., 2000. E-commerce: consumer protection issues and implications for research and education. Journal of Consumer Studies & Home Economics, 24(2), p. 124–127.
Goldsmith, J., 2000. Unilateral Regulation of the Internet: A Modest DefenceThe. European Journal of International Law, 11(1), p. 135–148.
Goldsmith, J. L., 1998. Regulation of the Internet: Three Persistent Fallacies. Chicago-Kent Law Review, 73(4), pp. 1119-1132.
Gong, W., Li, Z. G. & Stump, R. L., 2007. Global internet use and access: cultural considerations. Asia Pacific Journal of Marketing and Logistics, 19(1), pp. 57 - 74.
Gorman, S. P. & Malecki, E. J., 2000. The networks of the Internet: an analysis of provider networks in the USA. Telecommunications Policy, Volume 24, pp. 113-134.
Gray, T. L., 2002. Minimum Contacts in Cyberspace: The Classic Jurisdiction Analysis in a New Setting. Journal of High Technology Law, 1(1), pp. 85-100.
Grigg, D. W., 2012. Definitional constructs of cyber‐bullying and cyber‐aggression from a triangulatory overview: a preliminary study into elements of cyber‐bullying. Journal of Aggression, Conflict and Peace Research, 4(4), pp. 202 - 215.
Grimaldi, C. & Goette, T., 1999. The Internet and the independence of individuals with disabilities. Internet Research, 9(4), pp. 272 - 280.
Grobauer, B., Walloschek, T. & Stöcker, E., 2011. Understanding Cloud Computing Vulnerabilities. IEEE Computer Society, 9(2), pp. 50-57.
Groemminger, B. K., 2003. Personal Privacy on the Internet: Should It Be a Cyberspace Entitlement?. INDIANA LAW REVIEW, 36(3), pp. 827-855.
Gubbi, J., Buyya, R., Marusic, S. & Palaniswami, M., 2013. Internet of Things (IoT): A vision, architectural elements, and future directions. Future Generation Computer Systems, 29(7), p. 1645–1660.
Guillén, M. F. & Suárez, S. L., 2005. Explaining the Global Digital Divide: Economic, Political and Sociological Drivers of Cross-National Internet Use. Social Forces, 84(2), pp. 681-708.
Guo, H., Bandyopadhyay, S., Cheng, H. K. & Yang, Y.-C., 2010. Net Neutrality and Vertical Integration of Content and Broadband Services. Journal of Management Information Systems, 27(2), pp. 43-276.
Gupta, A. & Samuel, C., 2014. A Comprehensive Approach to Internet Governance and Cybersecurity. Strategic Analysis, 38(4), pp. 588-594.
Hacker, K. L. & Mason, S. M., 2003. Ethical gaps in studies of the digital divide. Ethics and Information Technology, 5(2), pp. 99-115.
Hamilton, S. & Pors, N. O., 2003. Freedom of access to information and freedom of expression: the Internet as a tool for global social inclusion. Library Management, 24(8/9), pp. 407 - 416.
Hamilton, S. & Pors, N. O. P. O., 2003. Freedom of access to information and freedom of expression: the Internet as a tool for global social inclusion. Library Management, 24(8), pp. 407 - 416.
Hannon, J. & D'Netto, B., 2007. Cultural diversity online: student engagement with learning technologies. International Journal of Educational Management, 21(5), pp. 418 - 432.
Harasim, L., 2000. Shift happens: online education as a new paradigm in learning. The Internet and Higher Education, 3(1-2), p. 41–61.
Harcourt, W., 2000. The Personal and the Political: Women Using the Internet. CyberPsychology & Behavior, 3(5), pp. 693-697.
Hargittai, E., 2004. Internet Access and Use in Context. New Media & Society, 6(1), pp. 137-143.
Harknett, R. J. & Stever, J. A., 2009. The Cybersecurity Triad: Government, Private Sector Partners, and the Engaged Cybersecurity Citizen. Journal of Homeland Security and Emergency Management, 6(1), pp. 1547-7355.
Harris, M. M., Hoye, G. V. & Lievens, F., 2003. Privacy and Attitudes towards Internet-Based Selection Systems: A Cross-Cultural Comparison. International Journal of Selection and Assessment, 11(2/3), p. 230–236.
Hart, J. A., 2011. The Net Neutrality Debate in the United States. Journal of Information Technology & Politics, 8(4), pp. 418-443.
Harwit, E. & Clark, D., 2001. Shaping the Internet in China. Evolution of Political Control over Network Infrastructure and Content. Asian Survey, 41(3), pp. 377-408.
Hauber, R. P., Vesmarovich, S. & Dufour, L., 2002. The Use of Computers and the Internet as a Source of Health Information for People with Disabilities. Rehabilitation Nursing, 27(4), p. 142–145.
Hawkins, E. T. & Hawkins, K. A., 2003. Bridging Latin America's Digital Divide: Government Policies and Internet Access. Journalism & Mass Communication Quarterly, 80(3), pp. 646-665.
Heickerö, R., 2014. Cyber Terrorism: Electronic Jihad. Strategic Analysis, 38(4), pp. 554-565.
Helbig, N., Gil-García, J. R. & Ferro, E., 2009. Understanding the complexity of electronic government: Implications from the digital divide literature. Government Information Quarterly, 26(1), p. 89–97.
Henten, A., Samarajiva, R. & Melody, W., 2003. Designing next generation telecom regulation: ICT convergence or multi‐sector utility?. info, 5(1), pp. 26 - 33.
Hermana, B. & Silfianti, W., 2011. Evaluating E-government Implementation by Local Government: Digital Divide in Internet Based Public Services in Indonesia. International Journal of Business and Social Science, 2(3), pp. 156-163.
Herman, B. D. & Kim, M., 2014. The Internet Defends Itself: The Network Neutrality Debate on the Web. The Information Society: An International Journal, 30(1), pp. 31-44.
Hertzel, D. A., 2000. Don’t Talk to Strangers: An Analysis of Government and Industry Efforts to Protect a Child’s Privacy Online. Federal Communications Law Journal, 52(2), pp. 429-451.
Hestermeyer, H. P., 2006. Personal Jurisdiction for Internet Torts: Towards an International Solution. Northwestern Journal of International Law & Business, 26(2), pp. 267-288.
Heymann, P., Koutrika, G. & Garcia-Molina, H., 2007. Fighting Spam on Social Web Sites: A Survey of Approaches and Future Challenges. IEEE Internet Computing, 11(6), pp. 36-45.
Hoegle, R. L. & Boam, C. P., 2000. The Internet and Jurisdiction: International Principles Emerge but Confrontation Looms. The Journal of World Intellectual Property, 3(1), p. 31–50.
Hoffman, D. L., Novak, T. P. & Schlosser, A., 2000. The Evolution of the Digital Divide: How Gaps in Internet Access May Impact Electronic Commerce. Journal of Computer-Mediated Communication, 5(3).
Hoffman, L. H., 2006. Is Internet Content Different after All? A Content Analysis of Mobilizing Information in Online and Print Newspapers. Journalism & Mass Communication Quarterly, 83(1), pp. 58-76.
Hogendorn, C., 2007. Broadband Internet: net neutrality versus open access. nternational Economics and Economic Policy, 4(2), pp. 185-208.
Holman, J. & McGregor, M. A., 2005. The Internet As Commons: The Issue of Access. Communication Law and Policy, 10(3), pp. 267-289.
Hovav, A., Patnayakuni, R. & Schuff, D., 2004. A model of Internet standards adoption: the case of IPv6. Information Systems Journal, 14(3), p. 265–294.
Howard, P. N., 2007. Testing the Leap-Frog Hypothesis: the Impact of Existing Infrastructure and Telecommunications Policy on the Global Digital Divide. Information, Communication & Society, 10(2), pp. 133-157.
Hughes, D., 1996. Sex tours via the Internet. Agenda: Empowering women for gender equity, 12(28), pp. 71-76.
Hukill, M. A., 1991. ASEAN telecommunications: Infrastructure, investment and regulatory policies. Asian Journal of Communication, 1(2), pp. 19-40.
Hume, S., 1997. Trends in Web Standards and techniques. VINE, 27(4), pp. 70 - 73.
Iosifidis, P., 2002. Digital Convergence: Challenges for European Regulation. Javnost - The Public, 9(3), pp. 27-47.
Islam, N., Anand , R., Jaeger , T. & Rao, J. R., 1997. A flexible security system for using Internet content. IEEE Software, 14(5), pp. 52 - 59.
Ivkovic, D. & Lotheringtona, H., 2009. Multilingualism in cyberspace: conceptualising the virtual linguistic landscape. International Journal of Multilingualism, 6(1), pp. 17-36.
Jackson, L. A. et al., 2008. Race, Gender, and Information Technology Use: The New Digital Divide. Cyber Psychology & Behavior, 11(4), pp. 437-442.
Jaeger, P. T., 2013. Internet Justice: Reconceptualizing the Legal Rights of Persons with Disabilities to Promote Equal Access in the Age of Rapid Technological Change. Review of Disability Studies: An International Journal, 9(1).
Jaeger, P. T., Bertot, J. C. & Thomp, K. M., 2012. The Intersection of Public Policy and Public Access: Digital Divides, Digital Literacy, Digital Inclusion, and Public Libraries. Public Library Quarterly, 31(3), pp. 1-20.
Jaeger, P. T., Lin, J. & Grimes, J. M., 2008. Cloud Computing and Information Policy: Computing in a Policy Cloud?. Journal of Information Technology & Politics, 5(3), pp. 269-283.
Jakopin, N. M. & Klein, A., 2011. Determinants of broadband internet access take‐up: country level drivers. info, 13(5), pp. 29 - 47.
John, N. A., 2013. The Construction of the Multilingual Internet: Unicode, Hebrew, and Globalization. Journal of Computer-Mediated Communication, 18(3), p. 321–338.
Johnson, S., 2015. Trademark Territoriality in Cyberspace: an Internet Framework for Common-Law Trademarks. Berkeley Technology Law Journal, 29(2), pp. 1253-1300.
Jones, R. & Basu, S., 2002. Taxation of Electronic Commerce: A Developing Problem. International Review of Law, Computers & Technology, 16(1), pp. 35-51.
Just, M. R., 2003. Internet File Sharing and the Liability of Intermediaries for Copyright Infringement A Need for International Consensus. Journal of Information, Law and Technology, Volume 1.
Kaiser, R., 2015. The birth of cyberwar. Political Geography, 46(May), p. 11–20.
Kaiser, S., 2005. Community technology centers and bridging the digital divide. Knowledge, Technology & Policy, 18(2), pp. 83-100.
Kalow, G. M., 1997. From the Internet to Court: Excerising Jurisdiction over World Wide Web Communications. Fordham Law Review, 65(5), pp. 2241-2274.
Kang, B.-H., 2008. A Critical cogitation on Critical Information Infrastructure. Journal of Security Engineering, 5(3), pp. 201-208.
Kapor, M. & Weitzner, D. J., 1993. Developing the National Communications and Information Infrastructure. Internet Research, 3(2), pp. 21-31.
Karatzogianni, A., 2004. The Politics of ‘Cyberconflict’. Politics, 24(1), p. 46–55.
Karimova, G. Z. & Shirkhanbeik, A., 2015. Society of things: An alternative vision of Internet of things. Cogent Social Sciences, 1(1), pp. 1-7.
Kashani, B. H. & Kasmani, A. N., 2018. Identifying and Categorizing the General Policy of Virtual Space. Communication Research, 24(92), pp. 27-53. doi: 10.22082/cr.2017.28810
Kauffman, R. J. & Techatassanasoontorn, A. A., 2005. Is There a Global Digital Divide for Digital Wireless Phone Technologies?. Journal of the Association for Information Systems, 6(12), pp. 338-382.
Kelly, B., 1999. The evolution of web protocols. Journal of Documentation, 55(1), pp. 71 - 81.
Kelly, B., 1999. The evolution of web protocols. Journal of Documentation, 55(1), pp. 71 - 81.
Kennedy , G., 2000. Encryption Policies: Codemakers, Codebreakers and Rulemakers: Dilemmas in Current Encryption Policies. Computer Law & Security Review, 16(4), p. 240–247.
Kerr, I. & Bailey, J., 2004. The implications of digital rights management for privacy and freedom of expression. Journal of Information, Communication and Ethics in Society, 2(2), pp. 85 - 95.
Khan, A. A. & Ahmed Khan, M. N., 2011. Internet Content Regulation Framework. International Journal of u- and e- Service, Science and Technology, 4(3), pp. 19-32.
Khong, W. K., 2001. Spam Law for the Internet. Journal of Information, Law and Technology, Issue 3, pp. 1-19.
Kim, M., Chungb, C. J. & Kim, J. H., 2011. Who shapes network neutrality policy debate? An examination of information subsidizers in the mainstream media and at Congressional and FCC hearings. Telecommunications Policy, 35(4), p. 314–324.
Kirkpatrick, M. K., Brown, S. & Atkins, T. B., 1998. Using the Internet to integrate cultural diversity and global awareness.. Nurse Educator, 23(2), pp. 15-7.
Kitcat, J., 2004. Goverment and ICT standards: An electronic voting case study. Journal of Information, Communication and Ethics in Society, 2(3), pp. 143 - 158.
Klein, H., 2002. ICANN and Internet Governance: Leveraging Technical Coordination to Realize Global Public Policy. The Information Society: An International Journal, 18(3), pp. 193-207.
Kling, R., Lee, Y.-C., Teich, A. & Frankel, M. S., 1999. Assessing Anonymous Communication on the Internet: Policy Deliberations. The Information Society: An International Journal, 15(2), pp. 79-90.
Krämer, J., Wiewiorra, L. & Weinhardt, C., 2013. Net neutrality: A progress report. Telecommunications Policy, 37(9), p. 794–813.
Kuechlera, W. & Grupe, F. H., 2003. Digital Signatures: A Business View. Information Systems Management, 20(1), pp. 19-28.
Kvasny, L. & Keil, M., 2006. The challenges of redressing the digital divide: a tale of two US cities. Information Systems Journal, 16(1), p. 23–53.
Lamberton, D., 1996. A Telecommunications Infrastructure is Not An Information Infrastructure. Prometheus: Critical Studies in Innovation, 14(1), pp. 31-38.
Landesman, B., 1998. Copyright and the Internet. Problems of Post-Communism, 45(5), pp. 63-64.
Lanham Act 15 U.S.C. § 1127, 1988. s.l.:s.n.
Larreamendy-Joerns, J. & Leinhardt, G., 2006. Going the Distance with Online Education. Review of Educational Research, 76(4), p. 567–605.
Lee, D. & Kim, H., 2014. The effects of network neutrality on the diffusion of new Internet application services. Telematics and Informatics, 31(3), p. 386–396.
Lee, J. et al., 2003. A DRM Framework for Distributing Digital Contents through the Internet. ETRI Journal, 25(6), pp. 423-423.
Lehdonvirta1, V. & Virtanen, P., 2010. A New Frontier in Digital Content Policy: Case Studies in the Regulation of Virtual Goods and Artificial Scarcity. Policy & Internet, 2(3), p. 7–29.
Lelieveldet, S. L., 1997. How to Regulate Electronic Cash: An Overview of Regulatory Issues And Strategies. American University Law Review, Volume 46, pp. 1163-1175.
Lenhart, A., Horrigan, J. B. & Horrig, L., 2003. Re-visualizing the digital divide as a digital spectrum (2003). IT & Society, 1(5), pp. 23-39.
Leung, L., 2009. User-generated content on the internet: an examination of gratifications, civic engagement and psychological empowerment. New Media & Society, 11(8), pp. 1327-1347.
Lewis, J. A., 2014. National Perceptions of Cyber Threats. Strategic Analysis, 38(4), pp. 566-576.
Lim, Y. F., 2002. Internet Governance, Resolving the Unresolvable: Trademark Law and Internet Domain Names. International Review of Law, Computers & Technology, 16(2), pp. 199-209.
Lingle, V. A. & Delozier, E. P., 1998. Policy Aspects of Web Page Development. Internet Reference Services Quarterly, 3(2), pp. 33-48.
Lipton, J. D., 2010. Bad Faith in Cyberspace: Grounding Domain Name Theory in Trademark, Property and Restitution. Harvard Journal of Law and Technology, 23(2), pp. 447-479.
Livingstone, S., 2013. Online risk, harm and vulnerability: Reflections on the evidence base for child Internet safety policy. Revista de Estudios de Comunicacion, 18(35), pp. 13-28.
Livingstone, S. & Brake, D. R., 2010. On the rapid rise of social networking sites: new findings and policy implications. Children and Society, 24(1), pp. 75-83.
Livingstone, S. & Helsper, E., 2007. Gradations in digital inclusion: children, young people and the digital divide. New Media & Society, 9(4), pp. 671-696.
Low, C., Chen, Y. & Wu, M., 2011. Understanding the determinants of cloud computing adoption. Industrial Management & Data Systems, 111(7), pp. 1006 - 1023.
Lui-Kwan, K. M., 1999. Recent Developments in Digital Signature Legislation and Electronic Commerce. Berkeley Technology Law Journal, 14(1), pp. 463-481.
Lunat, Z., 2008. The Internet and the Public Sphere: Evidence from Civil Society in Developing Countries. The Electronic Journal of Information Systems in Developing Countries, 35(3), pp. 1-12.
Lusoli, W. & Compan˜o´, R., 2010. From security versus privacy to identity: an emerging concept for policy design?, info, 12(6), pp. 80-94.
Lyn, K. R., 2000. Personal Jurisdiction and the Internet: Is a Home Page Enough to Satisfy Minimum Contacts?. Campbell Law Review, 22(2), pp. 341-367.
Maggs , G. E., 1998. Internet Solutions to Consumer Protection Problems. South Carolina Law Review, Volume 49, pp. 887-902.
Mahesh, G. & Mittal, R., 2009. Digital content creation and copyright issues. The Electronic Library, 27(4), pp. 676-683.
Maiorano, F. & Stern, J., 2007. Institutions and telecommunications infrastructure in low and middle-income countries: The case of mobile telephony. Utilities Policy, 15(3), p. 165–181.
Manheim, K. M. & Solum, L. B., 2003. An Economic Analysis of Domain Name Policy. Hastings Communications and Entertainment Law Journal, 25(3), pp. 359-498.
Mansell, R., 2002. From Digital Divides to Digital Entitlements in Knowledge Societies. Current Sociology, 50(3), pp. 407-426.
Manwaring, K., 2010. Network neutrality: Issues for Australia. Computer Law & Security Review, 26(6), p. 630–639.
Mariscal, J., 2005. Digital divide in a developing country. Telecommunications Policy, 29(5/6), p. 409–428.
Martin, N. & Rice, J., 2011. Cybercrime: Understanding and addressing the concerns of stakeholders. Computers & Security, 30(8), p. 803–814.
Mason, R., 2000. From distance education to online education. Internet and Higher Education, 3(1-2), p. 63±74.
Mattern, T., Felker, J., Borum, R. & Bamford, G., 2014. Operational Levels of Cyber Intelligence. International Journal of Intelligence and Counter Intelligence, 27(4), pp. 702-719.
Matyas, S. M., 1979. Digital Signatures-An Overview. Computer Networks, Volume 3, pp. 87-94.
McAdams, A., Camp, J. & Divakaruni, S., 2000. The evolution of US telecommunications infrastructure. info, 2(2), pp. 107 - 110.
McCarty, C., Prawitz, A. D., Derscheid, L. E. & Montgomery, B., 2011. Perceived safety and teen risk taking in online chat sites, Cyber psychology, Behavior, and Social Networking, 14(3), pp. 169-74.
McGoldrick, D., 2013. The Limits of Freedom of Expression on Facebook and Social Networking Sites: A UK Perspective. Human Rights Law Review, 13(1), pp. 125-151.
McHale, N., 2011. An Introduction to Web Accessibility, Web Standards, and Web Standards Makers. Journal of Web Librarianship, 5(2), pp. 152-160.
McKee, H. A., 2011. Policy Matters Now and in the Future: Net Neutrality, Corporate Data Mining, and Government Surveillance. Computers and Composition, 28(4), p. 276–291.
Mefford, A., 1997. Lex Informatica: Foundations of Law on the Internet. Indiana Journal of Global Legal Studies, 5(1), pp. 211-237.
Meissonnier, A. & Banat-Berger, F., 2015. French legal framework of digital evidence. Records Management Journal, 25(1), pp. 96 - 106.
Mekovec, R., 2010. Online privacy: overview and preliminary research. Journal of Information and Organizational Sciences, 34(2), pp. 534, 5.
Mell, P. & Grance, T., 2011. The NIST Definition of Cloud Computing, Gaithersburg, MD: Computer Security Division Information Technology Laboratory National Institute of Standards and Technology.
Menthe, D. C., 1998. Jurisdiction in Cyberspace: A Theory of International Spaces. Michigan Telecommunications and Technology Law Review, 4(1), pp. 69-103.
Menthe, D. C., 1998. Jurisdiction in Cyberspace: A Theory of International Spaces. Michigan Telecommunications and Technology Law Review, 4(1), pp. 69-103.
Meuller, M. L., 2004. Ruling the Root: Internet Governance and the Taming of Cyberspace. Massachusetts London: MIT Press Cambridge.
Mika, K. M. & Reber, A. J., 1997. Internet Jurisdictional Issues: Fundamental Fairness in a Virtual World. Creighton Law Review, Volume 30, pp. 1169-1187.
Mikołajewicz-Woźniak, A. & Scheibe, A., 2015. Virtual currency schemes – the future of financial services. Foresight, 17(4), pp. 365 - 377.
Millercribbs MSW, J. E. & Chadiha, L. A., 1999. Integrating the Internet in a Human Diversity Course. Computers in Human Services, 15(2-3), pp. 97-108.
Milne, G. R., Rohm, A. J. & Bahl, S., 2004. Consumers’ Protection of Online Privacy and Identity. Journal of Consumer Affairs, 38(2), p. 217–232.
Milne, G. R., Rohm, A. J. & Bahl, S., 2004. Consumers’ Protection of Online Privacy and Identity. Journal of Consumer Affairs, 38(2), p. 217–232.
Miorandi, D., Sicari, S., De Pellegrini, F. & Chlamtac, I., 2012. Internet of things: Vision, applications and research challenges. Ad Hoc Networks, 10(7), p. 1497–1516.
Mitchell, K. J., Finkelhor, D. & Wolak, J., 2001. Risk factors for and impact of online sexual solicitation of youth. Journal of the American Medical Association, 285(23), pp. 3011-3014.
Mitchell, K. J., Finkelhor, D. & Wolak, J., 2003. The Exposure of Youth to Unwanted Sexual Material on the Internet: A National Survey of Risk, Impact, and Prevention. Youth & Society, 34(3), pp. 330-358.
Mockapetris, P. V. & Dunlap, K. J., 1988. Development of the Domain Name System. Computer Communication Review, 18(4), pp. 123-133.
Mohan, R., Smith, J. R. & Li, C.-S., 1999. Adapting multimedia Internet content for universal access. IEEE Transactions on Multimedia, 1(1), pp. 104-114.
Moitra, S. D., 2004. Cybercrime: Towards an Assessment of its Nature and Impact. International Journal of Comparative and Applied Criminal Justice, 28(2), pp. 105-123.
Morahan-Martin, J., 2000. Women and the Internet: Promise and Perils. Cyber Psychology & Behavior, 3(5), pp. 683-691.
Morset, E. A., 1997. State Taxation of Internet Commerce: Something New. Creighton Law Review, Volume 30, pp. 1113-1167.
Mueller, M., 1999. Digital Convergence and its Consequences. Javnost - The Public: Journal of the European Institute for Communication and Culture, 6(3), pp. 11-27.
Mueller, M. L., 2010. Networks and States: The Global Politics of Internet Governance. s.l.:MIT Press.
Muir, A., 2012. Online copyright enforcement by Internet Service Providers. Journal of Information Science, 39(2), p. 256–269.
Muir, A. & Oppenheim, C., 2002. National Information Policy developments worldwide II: universal access - addressing the digital divide. Journal of Information Science, 28(4), pp. 263-273.
Mutula, S. M., 2008. Digital divide and economic development: case study of sub‐Saharan Africa. The Electronic Library, 26(4), pp. 468 - 489.
Nacer, H. & Aissani, D., 2014. Semantic web services: Standards, applications, challenges and solutions. Journal of Network and Computer Applications, 44(1), p. 134–151.
Napoli, P. M. & Obar, J. A., 2014. The Emerging Mobile Internet Underclass: A Critique of Mobile Internet Access. The Information Society: An International Journal, 30(5), pp. 323-334.
Natarajan, M., 2006. Use of online technology for multimedia education. Information Services and Use, 26(3), pp. 249-256.
Natarajan, M., 2006. Use of online technology for multimedia education. Information Services & Use, 26(3), p. 249–256.
Nesbary, D., 2000. The Taxation of Internet Commerce. Social Science Computer Review, 18(1), pp. 17-39.
Ngini, C. U., Furnell, S. M. & Ghita, B. V., 2002. Assessing the global accessibility of the Internet. Internet Research, 12(4), pp. 329 - 338.
Nicholas, K., 2003. Geo-Policy Barriers and Rural Internet Access: The Regulatory Role in Constructing the Digital Divide. The Information Society: An International Journal, 19(4), pp. 287-295.
Noble, S., 2002. Web access and the law: a public policy framework. Library Hi Tech, 20(4), pp. 399 - 405.
Nooren, P., Leurdijk, A. & Eijk, N. v., 2012. Net neutrality and the value chain for video. info, 14(6), pp. 45 - 58.
Nord, J. H. & Nord, G. D., 1995. MIS research: Journal status assessment and analysis. Information & Management, 29(1), p. 29–42.
Nunno, R. M., 2000. Electronic signatures: technology developments and legislative issues. Government Information Quarterly, 17(4), p. 395–401.
Oberding, J. M. & Norderhaug, T., 1996. A Separate Jurisdiction for Cyberspace. Journal of Computer-Mediated Communication, 2(1).
Oddie, C., 1999. Copyright protection in the digital age. Information Management & Computer Security, 7(5), pp. 239 - 240.
OECD., 2001. Understanding the Digital Divide, Paris: OECD Publishing.
Ojanperä, T., 2006. Convergence Transforms Internet. Wireless Personal Communications, 37(3), pp. 167-185.
Ono, H. & Zavodny, M., 2003. Gender and the Internet. Social Science Quarterly, 84(1), p. 111–121.
Ono, R. & Aoki, K., 1998. Convergence and new regulatory frameworks: A comparative study of regulatory approaches to Internet telephony. Telecommunications Policy, 22(10), p. 817–838.
Opalinski MSW, L., 2001. Older Adults and the Digital Divide: Assessing Results of a Web-Based Survey. Journal of Technology in Human Services, 18(1), pp. 203-221.
Oppenheim, C., 2000. Does copyright have any future on the internet?. Journal of Documentation, 56(3), pp. 279 - 298.
Oswell, D., 1998. The Place of ‘Childhood’ in Internet Content Regulation A Case Study of Policy in the UK. International Journal of Cultural Studies, 1(2), pp. 271-291.
Oswell, D., 1999. The Dark Side of Cyberspace: Internet Content Regulation and Child Protection. Convergence, 5(4), pp. 42-62.
Owen, A. L. & Fogelstrom, C., 2005. Monetary policy implications of electronic currency: an empirical analysis. Applied Economics Letters, 12(7), pp. 419-423.
Oyedemi, T., 2014. Internet access as citizen's right? Citizenship in the digital age. Citizenship Studies, 19(3/4), pp. 450-464.
Paine, C. et al., 2007. Internet users’ perceptions of ‘privacy concerns’ and ‘privacy actions’. International Journal of Human-Computer Studies, 65(6), p. 526–536.
Papacharissi, Z., 2002. The virtual sphere: The internet as a public sphere. New Media & Society, 4(1), pp. 9-27.
Penfold, C., 2001. Nazis, Porn and Politics: Asserting Control Over Internet Content. Journal of Information, Law and Technology, Volume 2, pp. 1-16.
Perfiliev, Y., 2002. Development of the Internet in Russia: Preliminary Observations on Its Spatial and Institutional Characteristics. Eurasian Geography and Economics, 43(5), pp. 411-421.
Perritt, H. H., 2000. Dispute Resolution in Cyberspace: Demand for New Forms of ADR. Ohio State Journal on Dispute Resolution, Volume 15, pp. 675-703.
Perrucci, A. & Cimatoribus, M., 1997. Competition, convergence and asymmetry in telecommunications regulation. Telecommunications Policy, 21(6), pp. 493-512.
Perset, K., 2010. The Economic and Social Role of Internet Intermediaries, Paris: Organisation for Economic and Co-operation and Development DSTI/ICCP (2009)9/FINAL.
Postigo, H., 2003. Emerging Sources of Labor on the Internet: The Case of America Online Volunteers. International Review of Social History, Volume 48, p. 205–223.
Prince, J. D., 2011. Introduction to Cloud Computing. Journal of Electronic Resources in Medical Libraries, 8(4), pp. 449-458.
Psannis, K. E., Xinogalos, S. & Sifaleras, A., 2014. Convergence of Internet of things and mobile cloud computing. Systems Science & Control Engineering, 2(1), pp. 476-483.
Puathasnanon, S., 1998. Cyberspace and Personal Jurisdiction: The Problem of Using Internet Contacts to Establish Minimum Contacts. Loyola of Los Angeles Law Review, 31(2), pp. 691-722.
Pusey, P. & Sadera, W. A., 2011. Cyberethics, Cybersafety, and Cybersecurity. Journal of Digital Learning in Teacher Education, 28(2), pp. 82-85.
Raghavendra, P., Wood, D., Newman, L. & Lawry, J., 2012. Why aren't you on Facebook?: Patterns and experiences of using the Internet among young people with physical disabilities. Technology and Disability, 24(2), pp. 149-162.
Rao, S. S., 2003. Copyright: its implications for electronic information. Online Information Review, 27(4), pp. 264 - 275.
Rauen, C. V., Hiratuka, C. & Fracalanza, P. S., 2011. Universalization of telecommunications services: Public policies in the OECD and in Brazil. International Journal of Development Issues, 10(2), pp. 108-122.
Rauh, J., 2011. Online education as a toll good: An examination of the South Carolina virtual school program. Computers & Education, 57(2), pp. 1583-1594.
Rege‐Patwardhan, A., 2009. Cybercrimes against critical infrastructures: a study of online criminal organization and techniques. Criminal Justice Studies: A Critical Journal of Crime, Law and Society, 22(3), pp. 261-271.
Riahinia, N. & Azimi, A., 2008. Women and the web: An evaluation of academic Iranian women's use of the internet in Tarbiat Moalem University. The Electronic Library, 26(1), pp. 75 - 82.
Rice, M. F., 2003. Information and Communication Technologies and the Global Digital Divide: Technology Transfer, Development, and Least Developing Countries. Comparative Technology Transfer and Society, 1(1), pp. 72-88.
Rice, D. T., 2000. Jurisdiction in Cyberspace: Which Law and Forum Apply to Securities Transactions on the Internet?. University of Pennsylvania Journal of International Economic Law, 21(3), pp. 585-658.
Rid, T. & McBurney, P., 2012. Cyber-Weapons. The RUSI Journal, 157(1), pp. 6-13.
Riggins, F. J. & Dewan, S., 2005. The Digital Divide: Current and Future Research Directions. Journal of the Association for Information Systems, 6(12), pp. 298-337.
Ritchie, H. & Blanck, P., 2003. The promise of the internet for disability: a study of on-line services and web site accessibility at Centers for Independent Living.. Behavioral Sciences & the Law, 21(1), p. 5–26.
Robison, K. K. & Crenshaw, E. M., 2002. Post-industrial transformations and cyber-space: a cross-national analysis of Internet development. Social Science Research, 31(3), p. 334–363.
Rooy, D. v. & Bus, J., 2010. Trust and privacy in the future internet—a research perspective. Identity in the Information Society, 3(2), p. 397–404.
Rosenbaum, J. I., 1998. Privacy on the Internet: Whose Information Is It Anyway?. Jurimetrics, 38(4), pp. 565-573.
Rosenoer, J., 1997. CyberLaw: the law of the Internet. 1st ed. New York, Inc.: Springer-Verlag.
Roycroft, T. R. & Anantho, S., 2003. Internet subscription in Africa: policy for a dual digital divide. Telecommunications Policy, 27(1/2), p. 61–74.
Ryan, S. M., Plzak, R. A. & Curran, J., 2007. Legal and Policy Aspects of Internet Number Resources. Santa Clara High Technology Law Journal, 24(2), pp. 335-374.
Ryan, S. M., Plzak, R. A. & Curran, J., 2007. Legal and Policy Aspects of Internet Number Resources. Santa Clara High Technology Law Journal, 24(2), pp. 335-374.
S⊘raker, J. H., 2008. Global Freedom of Expression within Nontextual Frameworks. The Information Society: An International Journal, 24(1), pp. 40-46.
Samuels, J. M. & Samuels, L. B., 2003. Internet Domain Names: The Uniform Dispute Resolution Policy. American Business Law Journal, 40(4), p. 885–904.
Samuelson, P., 2000. Privacy as Intellectual Property?. Stanford Law Review, 52(5), pp. 1125-1173.
Sandvig, C., 2007. Network neutrality is the new common carriage. info, 9(2/3), pp. 136 - 147.
Santosa, J. et al., 2008. Multicast/broadcast network convergence in next generation mobile networks. Computer Networks, 52(1), p. 228–247.
Saripan, H. & Hamin, Z., 2011. The application of the digital signature law in securing internet banking: Some preliminary evidence from Malaysia. Procedia Computer Science, Volume 3, pp. 248-253.
Sarma, A. C. & Girão, J., 2009. Identities in the Future Internet of Things. Wireless Personal Communications, 49(3), pp. 353-363.
Schmitt, M., 2012. Classification of Cyber Conflict. Journal of Conflict & Security Law, 17(2), p. 245–260.
Schryen, G., 2007. Anti-spam legislation: An analysis of laws and their effectiveness. Information & Communications Technology Law, 16(1), pp. 17-32.
Schultz, T., 2008. Carving up the Internet: Jurisdiction, Legal Orders, and the Private/Public International Law Interface. European Journal of International Law, 19(4), pp. 799-839.
Schultz, T., 2011. Internet Disputes, Fairness in Arbitration and Transnationalism: A Reply to Julia Hörnle. International Journal of Law and Information Technology, 19(2), pp. 153-163.
Schwartz, P. M., 1999. Internet Privacy and the State. Connecticut Law Review, Volume 32, pp. 815-859.
Scott, A., Semmens, L. & Willoughby, L., 1999. WOMEN AND THE INTERNET The natural history of a research project. Information, Communication & Society, 2(4), pp. 541-565.
Scott, A., Semmens, L. & Willoughby, L., 1999. Women and the Internet the Natural History of a Research Project. Information, Communication & Society, 2(4), pp. 541-565.
Scott, C. D., 2013. Trademark Strategy in the Internet Age: Customer Hijacking and the Doctrine of Initial Interest Confusion. Journal of Retailing, 89(2), p. 176–189.
Seadle, M., 2008. Copyright in the networked world: gray copyright. Library Hi Tech, 26(2), pp. 325 - 332.
Seiler, R. J. et al., 1998. Enhancing Internet access for people with disabilities. Computer Networks and ISDN Systems, 30(1/7), pp. 739-741.
Selwyn, N., 2004. Reconsidering Political and Popular Understandings of the Digital Divide. New Media & Society, 6(3), pp. 341-362.
Senguptaa, A. & Chaudhuri, A., 2011. Are social networking sites a source of online harassment for teens? Evidence from survey data. Children and Youth Services Review, 33(2), p. 284–290.
Servon, L., 2002. Four Myths about the Digital Divide. Planning Theory & Practice, 3(2), pp. 222-227.
Servon, L. J. & Nelson, M. K., 2001. Community Technology Centers: Narrowing the Digital Divide in Low-Income, Urban Communities. Journal of Urban Affairs, 23(3/4), p. 279–290.
Sewart, K. & Matthews, J., 2002. Online Arbitration of Cross-border, Business to Consumer Disputes. University of Miami Law Review, 56(4), pp. 1111-1145.
Seymour, W. & Lupton, D., 2004. Holding the line online: exploring wired relationships for people with disabilities. Disability & Society, 19(4), pp. 291-305.
Shachaf, P., 2008. Cultural diversity and information and communication technology impacts on global virtual teams: An exploratory study. Information & Management, 45(2), p. 131–142.
Sharma, A., 2010. Cyber Wars: A Paradigm Shift from Means to Ends. Strategic Analysis, 34(1), pp. 62-73.
Sharma, R. S., Samuel, E. M. & Ng, E. W., 2009. Beyond the digital divide: policy analysis for knowledge societies. Journal of Knowledge Management, 13(5), pp. 373 - 386.
Sharples, M., Graber, R., Harrison, C. & Logan, K., 2009. E-safety and Web 2.0 for children aged 11–16. Journal of Computer Assisted Learning, 25(1), p. 70–84.
Shelley, M. C. et al., 2004. Digital citizenship: parameters of the digital divide. Social Science Computer Review, 22(2), pp. 256-269.
Shin, D.-H., 2005. Technology convergence and regulatory challenge: a case from Korean digital media broadcasting. info, 7(3), pp. 47 - 58.
Shin, D.-H., 2006. Convergence of telecommunications, media and information technology, and implications for regulation. 8(1), pp. 42 - 56.
Shin, D.-H., 2014. A comparative analysis of net neutrality: Insights gained by juxtaposing the U.S. and Korea. Telecommunications Policy, 38(11), p. 1117–1133.
Shipley BA and JD, D. E., 1996. Property Rights in Cyberspace: Copyright Law in the Internet Era. Journal of Agricultural & Food Information, 3(3), pp. 3-17.
Shirazi, F., 2012. Information and communication technology and women empowerment in Iran. Telematics and Informatics, 29(1), p. 45–55.
Shirey, R., 2007. Internet Security Glossary, Version 2. [Online] Available at: https://www.ietf.org/rfc/rfc4949.txt
Shore, M., Du, Y. & Zeadally, S., 2011. A Public-Private Partnership Model for National Cybersecurity. Policy & Internet, 3(2), p. 1–23.
Simpson, L., Daws, L. & Pini, B., 2004. Public internet access revisited. Telecommunications Policy, 28(3/4), p. 323–337.
Simpson, J., 2009. Inclusive Information and Communication Technologies for People with Disabilities. Disability Studies Quarterly, 29(1).
Simpson, S., 2010. Governing information infrastructures and services in telecommunications. Aslib Proceedings, 62(1), pp. 46 - 56.
Singer, H. J. & Litan, R. E., 2007. Unintended Consequences of Net Neutrality Regulation. Journal on Telecommunications and High Technology Law, 5(3), pp. 533-572.
Smith, A. D. & Rupp, W. T., 2002. Issues in cybersecurity; understanding the potential risks associated with hackers/crackers. Information Management & Computer Security, 10(4), pp. 178 - 183.
Smith, H. J., Dinev, T. & Xu, H., 2011. Information privacy research: an interdisciplinary review. MIS Quarterly, 35(4), pp. 989-1016.
Spacey, R. et al., 2015. Filtering wireless (Wi-Fi) Internet access in public places. Journal of Librarianship and Information Science, 47(2), pp. 1-11.
Spencer, A. B., 2006. Jurisdiction and the Internet: Returning to Traditional Principles to Analyze Network-Mediated Contacts. University of Illinois Law Review, Volume 2006, pp. 71-126.
Spinello, R. A., 2006. Online Brands and Trademark Conflicts: A Hegelian Perspective. Cambridge University Press, 16(3), pp. 343-367.
Srivastava, A., 2005. Is internet security a major issue with respect to the slow acceptance rate of digital signatures?. Computer Law & Security Review, 21(5), p. 392–404.
Srivastava, A., 2009. Electronic signatures and security issues: An empirical study. Computer Law & Security Review, 25(5), p. 432–446.
Stein, A. R., 1998. The Unexceptional Problem of Jurisdiction in Cyberspace. The International Lawyer, 32(4), pp. 1167-1191.
Steinfeld, L. & Archuleta, K. S., 2006. Privacy Protection and Compliance in Higher Education: The Role of the CPO. EDUCAUSE Review, 41(5), p. 62–71.
Stern, J. E., 2001. The Electronic Signatures in Global and National Commerce Act. Berkeley Technology Law Journal, 16(1), pp. 391-414.
Stewart, C., Gil-Egui, G. & Pileggi, M., 2004. The City Park as a Public Good Reference for Internet Policy Making. Information, Communication & Society, 7(3), pp. 337-363.
Stowasser, B., 2001. Old Shaykhs, Young Women, and the Internet: The Rewriting of Women's Political Rights in Islam. The Muslim World, 91(1/2), p. 99–120.
Struve, C. T. & Wagner, R. P., 2002. Realspace Sovereigns in Cyberspace: Problems with the Anticybersquatting Consumer Protection Act. Berkeley Technology Law Journal, Volume 17, pp. 989-1041.
Studer, B., 2001. Fixed mobile internet convergence (FMIC). Telematics and Informatics, 18(2-3), p. 133–141.
Suárez, S. L. & Guillen, M.. F., 2001. Developing the Internet: entrepreneurship and public policy in Ireland, Singapore, Argentina, and Spain. Telecommunications Policy, 25(5), p. 349–371.
Sutton, J. & Pollock, S., 2000. Online Activism for Women's Rights. CyberPsychology & Behavior, 3(5), pp. 699-706.
Tadayoni, R. & Skouby, K. E., 1999. Terrestrial digital broadcasting: convergence and its regulatory implications. Telecommunications Policy, 23(2), pp. 175-199.
Talukdar, D. & Gauri, D. K., 2011. Home Internet Access and Usage in the USA: Trends in the Socio-Economic Digital Divide. Communications of the Association for Information Systems, Volume 28, pp. 85-98.
Tan, D. R., 1999. Personal Privacy in the Information Age: Comparison of Internet Data Protection Regulations in the United Stats and European Union. Loy. L.A. Int'l & Comp. L. Rev., 21(4), pp. 661-684.
Tapanes, M. A., Smith, G. G. & White, J. A., 2009. Cultural diversity in online learning: A study of the perceived effects of dissonance in levels of individualism/collectivism and tolerance of ambiguity. The Internet and Higher Education, 12(1), p. 26–34.
Ten, C.-W., 2010. Cybersecurity for Critical Infrastructures: Attack and Defense Modeling. IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans, 40(4), pp. 853 - 865.
The Universal Declaration of Human Rights, 1948. United Nations. [Online]
Available at: http://www.un.org/en/universal-declaration-human-rights/
Thomas, G. & Wyatt, S., 1999. Shaping cyberspace: interpreting and transforming the internet. Research Policy, 28(7), p. 681–698.
Thoreau, E., 2006. Ouch!: An Examination of the Self-Representation of Disabled People on the Internet. Journal of Computer-Mediated Communication, 11(2), p. 442–468.
Thornburg, E. G., 2000. Going Private: Technology, Due Process, and Internet Dispute Resolution. University of California at Davis Law Review, Volume 34, pp. 151-220.
Timofeeva, Y., 2004. Worldwide Prescriptive Jurisdiction in Internet Content Controversies: A Comparative Analysis. Connecticut Journal of International Law, Volume 20, pp. 199-232.
Trammell, A. M. & Bambauer , D. E., 2015. Personal Jurisdiction and the 'Interwebs'. Cornell Law Review, Volume 100, pp. 1129-1190.
Tran, L. A., 2008. Securing Web Services: Practical Usage of Standards and Specifications. Library Hi Tech, 26(2), pp. 321 - 323.
Trudel , P., 1998. Jurisdiction over the Internet: A Canadian Perspective. The International Lawyer, 32(4), pp. 1027-1066.
Turpin, T. & Cooper, R., 2005. Technology, Adaptation, and Public Policy in Developing Countries: The ‘Ins and Outs’ of the Digital Divide. Minerva, 43(4), pp. 419-427.
van Deursen, A. J. A. M. & van Dijk, J. . A. G. M., 2015. Toward a Multifaceted Model of Internet Access for Understanding Digital Divides: An Empirical Investigation. The Information Society: An International Journal, 31(5), pp. 379-391.
Vicente, M. R. & López, A. J., 2010. A Multidimensional Analysis of the Disability Digital Divide: Some Evidence for Internet Use. The Information Society: An International Journal, 26(1), pp. 48-64.
Victorio, R. M., 2001. Internet Dispute Resolution (iDR): Bringing ADR into the 21st Century. Pepperdine Dispute Resolution Law Journal, 1(2), pp. 279-300.
Viseu, A., Clement, A., Aspinall, J. & Kennedy, T. L. M., 2006. The interplay of public and private spaces in internet access. Information, Communication & Society, 9(5), pp. 633-656.
Vlachos, V., Minou, M., Assimakopouos, V. & Toska, A., 2011. The landscape of cybercrime in Greece. Information Management & Computer Security, 19(2), pp. 113 - 123.
Vogt, C. & Chen, P., 2001. Feminisms and the Internet. Peace Review: A Journal of Social Justice, 13(3), pp. 371-374.
Volery, T. & Lord, D., 2000. Critical success factors in online education. International Journal of Educational Management, 14(5), pp. 216 - 223.
Vouk, M. A., 2008. Cloud computing — Issues, research and implementations. Journal of Computing and Information Technology, 16(4), p. 235–246.
Waiyahong, N. & Reddy, E. R., 2014. Technical Standards for Accessing Information in the 21st Century: Z39.50 to Web Gateways. Procedia - Social and Behavioral Sciences, 147(1), pp. 26-31.
Walker, D. B., 1999. Privacy in the Digital Age: Encryption Policy—A Call for Congressional Action. Stanford Technology Law Review, Volume 3, pp. 1-60.
Wall, D., 2004. What are Cybercrimes?. Criminal Justice Matters, 58(1), pp. 20-21.
Wall, D. S., 2004. Digital Realism and the Governance of Spam as Cybercrime. European Journal on Criminal Policy and Research, 10(4), p. 309–335.
Wall, D. S. & Williams, M. L., 2013. Policing cybercrime: networked and social media technologies and the challenges for policing. Policing and Society: An International Journal of Research and Policy, 23(4), pp. 409-412.
Wang, F. F., 2006. Domain names management and legal protection. International Journal of Information Management, 26(2), p. 116–127.
Wang, F. F., 2008. Obstacles and Solutions to Internet Jurisdiction a Comparative Analysis of the EU and US laws. Journal of International Commercial Law and Technology, 3(4), pp. 233-241.
Wang, L. et al., 2010. Cloud Computing: a Perspective Study. New Generation Computing, 28(2), pp. 137-146.
Ward, B. T. & Sipior, J. C., 2010. The Internet Jurisdiction Risk of Cloud Computing. Information Systems Management, 27(4), pp. 334-339.
Wareham, J., Levy, A. & Shi, W., 2004. Wireless diffusion and mobile computing: implications for the digital divide. Telecommunications Policy, 28(5/6), p. 439–457.
Warf, B., 2001. Segueways into Cyberspace: Multiple Geographies of the Digital Divide. Environment and Planning B Planning and Design, 28(1), pp. 3-19.
Warf, B., 2015. Cyberwar: A new frontier for political geography. Political Geography, 46(May), p. 89–90.
Warner, M., 2012. Cybersecurity: A Pre-history. Intelligence and National Security, 27(5), pp. 781-799.
Warschauer, M., 2003. Dissecting the "Digital Divide": A Case Study in Egypt. The Information Society: An International Journal, 19(4), pp. 297-304.
Waseem, M., Mazhar, S., Khairi, A. & Kamal, T., 2015. A Review on Internet of Things (IoT). International Journal of Computer Applications, 113(1), pp. 1-7.
Weber, R. H., 2010. Internet of Things – New security and privacy challenges. Computer Law & Security Review, 26(1), p. 23–30.
Wei, K.-K., Teo, H.-H., Chan, H. C. & Tan, B. C. Y., 2011. Conceptualizing and Testing a Social Cognitive Model of the Digital Divide. Information Systems Research, 22(1), pp. 170-187.
Weinhardt, C. et al., 2009. Cloud Computing – A Classification, Business Models, and Research Directions. Business & Information Systems Engineering, 1(5), pp. 391-399.
Weiswasser, G., 1997. Domain Names, the Internet, and Trademarks: Infringement in Cyberspace. Santa Clara High Technology Law Journal, Volume 13, pp. 138-180.
WGIG (The Working Group on Internet Governance), 2005. Report of the Working Group on Internet Governance, s.l.: s.n.
Whalley, J., 2006. Recent developments in the telecommunications industry of Nepal. info, 8(1), pp. 57-71.
Wheeler, D. L., 2007. Empowerment zones? Women, internet cafés, and life transformations in egypt. Information Technologies and International Development, 4(2), pp. 89-104.
Williamson, K. et al., 2001. The role of the internet for people with disabilities: issues of access and equity for public libraries. The Australian Library Journal, 50(2), pp. 157-174.
Wilske, S. & Schiller, T., 1997. International Jurisdiction in Cyberspace: Which States May Regulate the Internet?. Federal Communications Law Journal, 50(1), pp. 117-178.
Wilson, K. R., Wallin, J. S. & Reiser, C., 2003. Social Stratification and the Digital Divide. Social Science Computer Review, 21(2), pp. 133-143.
Winder, D. & Trump, I., 2015. Mitigating Cybercrime through Meaningful Measurement Methodologies. EDPACS: The EDP Audit, Control, and Security Newsletter, 52(5), pp. 1-8.
Wong-Lo, M., Bullock, L. M. & Gable, R. A., 2011. Cyber bullying: practices to face digital aggression. Emotional and Behavioural Difficulties, 16(3), pp. 317-325.
W. T. O. (1998. Work programme on electronic commerce, Geneva: s.n.
Wu, I., 2004. Canada, South Korea, Netherlands and Sweden: Regulatory Implications Of The Convergence Of Telecommunications, Broadcasting And Internet Services. Telecommunications Policy, 28(1), p. 79–96.
Wu, T., 2003. Network Neutrality, Broadband Discrimination. Journal of Telecommunications and High Technology Law, 2(1), pp. 141-179.
Wu, T., 2003. Network Neutrality, Broadband Discrimination. Journal of Telecommunications and High Technology Law, 2(1), pp. 141-176.
Wyatt, S., Henwood, F., Hart, A. & Smith, J., 2005. The digital divide, health information and everyday life. New Media & Society, 7(2), pp. 199-218.
Xavier, P. & Yan, X., 2002. Telecommunications regulation in Hong Kong. info, 4(5), pp. 12 - 25.
Xia, J. & Lu, T.-J., 2008. Bridging the digital divide for rural communities: The case of China. Telecommunications Policy, 32(9/10), p. 686–696.
Xing, W., Yea, X. & Kui, L., 2011. Measuring convergence of China's ICT industry: An input–output analysis. Telecommunications Policy, 35(4), p. 301–313.
Xue, S., 2005. Internet policy and diffusion in China, Malaysia and Singapore. Journal of Information Science, 31(3), pp. 238-250.
Yang, C., Liao, H.-J. & Chen, C.-C., 2009. Implementing digital copyright on the internet through an enhanced creative common licence protocol. The Electronic Library, 27(1), pp. 20-30.
Ybarra, M. L. & Mitchell, K. J., 2004. Online aggressor/targets, aggressors, and targets: a comparison of associated youth characteristics. Journal of Child Psychology and Psychiatry, 45(7), p. 1308–1316.
Younga, A. L. & Quan-Haase, A., 2013. Privacy Protection Strategies on Facebook. Information, Communication & Society, 16(4), pp. 479-500.
Zaba, S., 2006. Digital signature legislation: The first 10 years. Information Security Technical Report, Volume 11, p. 18–25.
Zimmerman, R. K., 2001. The Way The “Cookies” Crumble: Internet Privacy and Data Protection In yhe Twenty-First Century. Journal of Legislation and Public Policy, Volume 4, pp. 439-464.
Zixiang, T., 1999. Regulating China’s Internet: convergence toward a coherent regulatory regime. Telecommunications Policy, 23(3-4), pp. 261-276.
Zook, M., 2000. Internet metrics: using host and domain counts to map the internet. Telecommunications Policy, 24(6-7), p. 613–620.
Zook, M. A., 2001. Old Hierarchies or New Networks of Centrality? The Global Geography of the Internet Content Market (2001). American Behavioral Scientist, 44(10), pp. 1679-1696.