1. Birnhack, M. (2013). Reverse Engineering Informational Privacy Law. Yale Journal of Law and Technology, 15(1), 24-91.
2. Birnhack, M., Toch, E. & Hadar, I. (2014). Privacy Mindset, Technological Mindset. Jurimetrics: Journal of Law, Science & Technology, 55, 55-114.
3. Bowman, C., Gesher, A., Grant, J. & Slate, D. (2015). The Architecture of Privacy—On Engineering Technologies that Can Deliver Trustworthy Safeguards. Sebastopol: O’Reilly.
4. Broenink, G., Hoepman, J.H., van 't Hof, C., van Kranenburg, R., Smits, D. & Wisman, T. (2010). The Privacy Coach: Supporting customer privacy in the Internet of Things [Electronic version]. Computing and Computers, 1-10.
5. Bussard, L., Neven, G. & Preiss, F.S. (2011). Matching Privacy Policies and Preferences: Access Control, Obligations, Authorisations, and Downstream Usage. In J. Camenisch, S. Fischer-Hübner & K. Rannenberg (Eds.), Privacy and Identity Management for Life (pp. 313-326). Heidelberg: Springer.