A Summary of a Convenient Vocabulary for the Semiotics of Human and Nonhuman Assemblies Shaping Technology, Building Society: Studies in Sociotechnical Change, pp.259-264, 1992. ,
The cutting edge, ACM SIGCAS Computers and Society, vol.28, issue.1, pp.38-39, 1998. ,
DOI : 10.1145/277351.277359
Values in Technology and Disclosive Computer Ethics,' The Cambridge Handbook of Information and Computer Ethics, 2009. ,
Software agents and user autonomy, Proceedings of the first international conference on Autonomous agents , AGENTS '97, 1997. ,
DOI : 10.1145/267658.267772
Value-sensitive design, interactions, vol.3, issue.6, pp.1-25, 2003. ,
DOI : 10.1145/242485.242493
The Law of the Horse: What Cyberlaw Might Teach, Harvard Law Review, vol.113, issue.2, pp.501-550, 1999. ,
DOI : 10.2307/1342331
Code, control, and choice: why East is East and West is West, Legal Studies, vol.15, issue.01, pp.1-21, 2005. ,
DOI : 10.2307/1229391
Framing Techno-Regulation: An Exploration of State and Non-State Regulation by Technology, p.5, 2011. ,
Privacy by Design, 2009. ,
DOI : 10.4018/978-1-61350-501-4.ch007
Privacy regulation cannot be hardcoded. A critical comment on the ???privacy by design??? provision in data-protection law, International Review of Law, Computers & Technology, vol.28, issue.2, p.159, 2014. ,
DOI : 10.1016/j.clsr.2012.09.008