M. Akrich and B. Latour, A Summary of a Convenient Vocabulary for the Semiotics of Human and Nonhuman Assemblies Shaping Technology, Building Society: Studies in Sociotechnical Change, pp.259-264, 1992.

H. Nissenbaum, The cutting edge, ACM SIGCAS Computers and Society, vol.28, issue.1, pp.38-39, 1998.
DOI : 10.1145/277351.277359

P. Brey, Values in Technology and Disclosive Computer Ethics,' The Cambridge Handbook of Information and Computer Ethics, 2009.

B. Friedman and H. Nissenbaum, Software agents and user autonomy, Proceedings of the first international conference on Autonomous agents , AGENTS '97, 1997.
DOI : 10.1145/267658.267772

B. Friedman, P. Kahn, and A. Borning, Value-sensitive design, interactions, vol.3, issue.6, pp.1-25, 2003.
DOI : 10.1145/242485.242493

L. Lessig, The Law of the Horse: What Cyberlaw Might Teach, Harvard Law Review, vol.113, issue.2, pp.501-550, 1999.
DOI : 10.2307/1342331

R. Brownsword, Code, control, and choice: why East is East and West is West, Legal Studies, vol.15, issue.01, pp.1-21, 2005.
DOI : 10.2307/1229391

R. Leenes, Framing Techno-Regulation: An Exploration of State and Non-State Regulation by Technology, p.5, 2011.

A. Cavoukian, Privacy by Design, 2009.
DOI : 10.4018/978-1-61350-501-4.ch007

B. Koops and R. Leenes, Privacy regulation cannot be hardcoded. A critical comment on the ???privacy by design??? provision in data-protection law, International Review of Law, Computers & Technology, vol.28, issue.2, p.159, 2014.
DOI : 10.1016/j.clsr.2012.09.008