Ahmed, M. H. (2009). Threats to Mobile Phone Users’ Privacy, a Project Report. St. John’s, NL: Memorial University of Newfoundland.
 Annual Reports of the United Nations Special Rapporteur on the Right to Adequate Housing to the Commission on Human Rights (2001 to 2005) and to the Human Rights Council (since 2006): E/CN.4/2001/51, E/CN.4/2002/59, E/CN.4/2003/5, E/CN.4/2004/48, E/CN.4/2005/48, E/CN.4/2006/41, A/HRC/4/18.
 Burdette, M. (2010). Is the Reporting Obligation of Attorneys in Terms of Section 29 of the Financial Intelligence Centre Act 38 of 2001 a Myth or a Reality? Unpublished LLM Dissertation, Pretoria: University of Pretoria.
 Doyle, C. (2012). Privacy: An Overview of the Electronic Communications Privacy Act. CRS Report for Congress Prepared for Members and Committees of Congress.
 Edward, Q. C. (2003). The Professional Secret, Confidentiality and Legal Professional Privilege in Europe, an Update on the Report by D.A.O. Edward, QC, the Council of Bars and Law Societies of Europe (CCBE).
 Edward, Q. C. (2013). The Professional Secrets, Confidentiality and Legal Professional Privilege in the Nine Members States of the European Community, the Faculty of Advocates in Scotland.
 Hendrickx, F. (2002). Protection of Workers’ Personal Data in the EU: General Issues and Sensitive Data. http://ec.europa.eu
 Hoofnagle, C. (2010). New Challenges to Data Protection Country Study B.1-United States of America. In D. Korff (Ed.), Comparative Study on Different Approach to New Privacy Challenges, in Particular in the Light of Technological Developments, Submitted by LRDP KANTOR Ltd. (Leader).
 Kilkelly, U. (2001). The Right to Respect for Private and Family Life: A Guide to the Implementation of Article 8 of the European Convention of Human Rights. Human Right Handbook, No. 1. Germany: Council of Europe.
 Lehman, G. D. (1982). Invasion of Juror Privacy.
 Macák, K. (2014). That’s a Secret I Must Keep to Myself, Your Honor! Comparative and Theoretical Assessment of Legal Professional Privilege in England and on the Continent, the Common Law Review.
 Petronio, S., & Durham, W. T. (2008). Communication Privacy Management Theory. In L. A. Baxter, & D. O. Braithwaite (Eds.), Engaging Theories in Interpersonal Communication: Multiple Perspectives. Thousand Oaks, CA: Sage.
 Prosser, W. L. (1960). Privacy. California Law Review, 48, 383-423.
 Saperstein, D. (2008). The European Counterterrorist as the Next US Cold Warrior: Why the United States Should Select from the German and British Models of Procedure, Evidence, and Oversight for National Security Wiretapping. Fordham International Law Journal, 32.
 Schied, J. (2013). Politics and Religion in Ancient Rome. Translated by Eric Rosencrantz, the Institute du Monde Contemporain.
 Serbanescu, T. (2014). Personal Communication: An Interactive Qualifying Project Analyzing the Use and Effects of Personal Communication in the Modern Age. A Project Study for the Bachelor of Science Degree, Faculty of Worcester Polytechnic Institute.
 Shan, N., & Pinto, T. (2006). Defamation and Privacy Law and Procedure in England. Germany & France: Taylor Wessing.
 Verbauwhede, L. (2014). Legal Pitfalls in Taking or Using Photographs of Copyright Material, Trademarks and People.
 Wagner, W. J. (1971). The Development of the Theory of the Right to Privacy in France. Washington University Law Quarterly, 45, 195-227.
 Winn, P. A. (2010). Older than the Bill of Rights: The Ancient Origins of the Right to Privacy.