1. Andress, J., & Winterfeld, S. (2011). Cyber warfare techniques. Tactics and tools for security practitioners. Amsterdam, Heidelberg [u.a.], Waltham, MA: Elsevier Syngress.
2. Arquilla, J., & Ronfeldt, D. (1997). Cyberwar is coming! In J. Arquilla & D. Ronfeldt (Eds.), In Athena’s camp. Preparing for conflict in the information age (pp. 23–60). Santa Monica, CA: Rand.
3. Balzacq, T. (2011). A theory of securitization. Origins, core assumptions, and variants. In T. Balzacq (Ed.), PRIO new security studies. Securitization theory. How security problems emerge and dissolve (1st ed., pp. 1–30). London [u.a.]: Routledge.
4. Baumann, M.-O. (2015). Privatsphäre als neues digitales Menschenrecht? Ethische Prinzipien und aktuelle Diskussionen. Hamburg: DIVSI Diskussionsbeiträge.
5. Bennett, C. J., & Raab, C. (2006). The governance of privacy. Policy instruments in global perspective. Cambridge: MIT Press.