1. Baldwin, R., Hood, C., & Scott, C. (1998). Socio-legal reader on regulation. Oxford: Oxford University Press.
2. Benkler, Y. (2002). Coase’s penguin: Or Linux and the nature of the firm. Yale Law Journal, 112, 369–446.
3. Benkler, Y. (2006). The wealth of networks: How social production transforms markets and freedom. New York: Yale University Press.
4. Bennett, C., & Raab, C. (2006). The governance of privacy. Cambridge, MA: MIT Press.
5. Brown, I., Edwards, L., & Marsden, C. (2006). Legal and institutional responses to denial of service attacks. Communications research network/department for trade and industry joint seminar on spam/DDoS, 13 November. http://www.communicationsresearch.net/events/article/default.aspx?objid=1464 .