1. Barlow JP (1996) A declaration of the independence of cyberspace. Electronic Frontier Foundation, Davos. https://www.eff.org/cyberspace-independence
2. Blankertz A, Jaursch J (2020) How the EU plans to rewrite the rules for the Internet. Brookings Tech Stream. https://www.brookings.edu/techstream/how-the-eu-plans-to-rewrite-the-rules-for-the-internet/
3. Brooks S, Garcia M, Lefkovitz N, Lightman S, Nadeau E (2017) An introduction to privacy engineering and risk management in federal systems. NISTIR 8062, National Institute for Standards and Technology (NIST). https://nvlpubs.nist.gov/nistpubs/ir/2017/NIST.IR.8062.pdf
4. Burke-White WW (2003) Regionalization of international criminal law enforcement: a preliminary exploration. Faculty Scholarship at Penn Law 959, https://scholarship.law.upenn.edu/faculty_scholarship/959
5. Chin J, Dou E (2016) China’s new cybersecurity law rattles foreign tech firms. The Wall Street Journal