These are the sources and citations used to research What levels of personal privacy should individuals have on the internet, and why? What ethical responsibility do I.T. companies have to respects individuals’ privacy?. This bibliography was generated on Cite This For Me on

  • Website

    Censorship of http://google.com in China | GreatFire.org

    2015

    In-text: ("Censorship Of Http://Google.Com In China | Greatfire.Org")

    Your Bibliography: "Censorship Of Http://Google.Com In China | Greatfire.Org." En.greatfire.org. N.p., 2015. Web. 7 Jan. 2015.

  • Website

    France - European rights court upholds French 'burqa ban'

    2015

    In-text: ("France - European Rights Court Upholds French 'Burqa Ban'")

    Your Bibliography: "France - European Rights Court Upholds French 'Burqa Ban'." France 24. N.p., 2015. Web. 7 Jan. 2015.

  • Website

    KOUTONIN, M.

    Why China and Russia Banned Google from their Country?

    2013

    In-text: (KOUTONIN)

    Your Bibliography: KOUTONIN, Mawuna. "Why China And Russia Banned Google From Their Country?." SiliconAfrica.com. N.p., 2013. Web. 8 Jan. 2015.

  • Website

    Levy, S.

    Bill Gates and President Bill Clinton on the NSA, Safe Sex, and American Exceptionalism | WIRED

    2013

    In-text: (Levy)

    Your Bibliography: Levy, Steven. "Bill Gates And President Bill Clinton On The NSA, Safe Sex, And American Exceptionalism | WIRED." WIRED. N.p., 2013. Web. 7 Jan. 2015.

  • Book

    Mill, J. S.

    On Liberty

    1859

    In-text: (Mill)

    Your Bibliography: Mill, John Stuart. On Liberty. 1859. Print.

  • Book

    Stavroulakis, P. and Stamp, M.

    Handbook of information and communication security

    2010 - Springer - Heidelberg

    In-text: (Stavroulakis and Stamp)

    Your Bibliography: Stavroulakis, Peter, and Mark Stamp. Handbook Of Information And Communication Security. Heidelberg: Springer, 2010. Print.

  • Website

    Sumner, S.

    Sony admits credit card details may have been stolen in PlayStation hack

    2011

    In-text: (Sumner)

    Your Bibliography: Sumner, Stuart. "Sony Admits Credit Card Details May Have Been Stolen In Playstation Hack." Computing.co.uk. N.p., 2011. Web. 8 Jan. 2015.

  • Website

    Zetter, K.

    Britney, Obama Twitter Feeds Hijacked Following Phishing Attack | WIRED

    2009

    In-text: (Zetter)

    Your Bibliography: Zetter, Kim. "Britney, Obama Twitter Feeds Hijacked Following Phishing Attack | WIRED." WIRED. N.p., 2009. Web. 8 Jan. 2015.

Click here to start building your own bibliography
Keep on Citing!
Cite This For Me:
The Easiest Tool to Create your Bibliographies Online
Join Us!

Save Time and Improve Your Marks with Cite This For Me

10,587 students joined last month!

  • ✔ Save your bibliographies for longer
  • ✔ Super fast and accurate citation program
  • ✔ Save time when referencing
  • ✔ Make your student life easy and fun
  • ✔ Pay only once with our Forever plan
  • ✔ Use plagiarism checker
  • ✔ Create and edit multiple bibliographies
Join