1. Abou-Tair, D., el Diehn, I., & Berlik, S. (2006). An ontology-based approach for managing and maintaining privacy in information systems. In Lectures notes in computer science (Vol. 4275, pp. 983–994). Berlin: Springer.
2. Agre, P. E. (1997). Introduction. In P. E. Agre & M. Rotenberg (Eds.), Technology and privacy: The new landscape (pp. 1–28). Cambridge: The MIT Press.
3. Borning, A., Friedman, B., & Kahn, P. H. (2004). Designing for human values in an urban simulation system: Value sensitive design and participatory design. In Proceedings of eighth biennial participatory design conference (pp. 64–67). Toronto: ACM Press.
4. Breuker, J., Casanovas, P., Klein, M., & Francesconi, E. (2009). Law, ontologies and the semantic web. Amsterdam: IOS Press.
5. Brownsword, R. (2005). Code, control, and choice: Why east is east and west is west. Legal Studies, 25(1), 1–21.