Hunter, R. (2013). The Future of Global Information Security. Gartner.
Rifkin, J (2014). The Zero Marginal Cost Society. Palgrave Macmillan
Kurzweil, R. (2005). The Singularity Is Near: When Humans Transcend Biology. Viking.
Pozza, G.; Halamka, J. (2014). The Fifth Domain – Amazon;
Pozza, G.; Napoli, G.; Ciullo, S., don Carlo (2015). Albergo Bellavista – Amazon;
ICSPA. (2013). Project 2020: Scenarios for the Future of Cybercrime – White Paper for Decision Makers. Retrieved from 2020: http://2020.trendmicro.com
TrendLabs. (2013). BLURRING BOUNDARIES – Trend Micro Security Predictions for 2014 and Beyond.Trend Micro.
Christensen, C. (2009). The Innovator’s Prescription. McGraw-Hill Professional.
Austin, R. D., Nolan, R. L., & S., O. (2009). Adventures of an IT Leader. Harvard Business Press.
Turkle, S. (2012). Alone Together: Why We Expect More from Technology and Less from Each Other.
Boyd, D (2015). It’s Complicated. (http://www.danah.org/books/ItsComplicated.pdf)
Varanini, F. (2016). Macchine per pensare: l’informatica come prosecuzione della filosofia con altri mezzi (Guerini)
Lindstrom, M. (2016). Small Data (Hoeply)
Kotter, J., & Rathgeber, H. (2006). Our Iceberg Is Melting. Macmillan.
Watzlawick, P. (1976). How Real Is Real?
Watzlawick, P; Weakland, J; Fisch, R.. (1978). Change.
Turing, A. (1950). Computing machinery and intelligence (http://www.loebner.net/Prizef/TuringArticle.html)
Gotterbarn (et Al.). ACM Code of Ethics (https://www.acm.org/about-acm/acm-code-of-ethics-and-professional-conduct)