1. Arnbak, A. (2015). Securing private communications: Protecting private communications security in EU law: fundamental rights, functional value chains and market incentives. Dissertation, University of Amsterdam, IViR 166342.
2. Baldwin, R., Cave, M. & Lodge, M. (2012). Understanding Regulation: Theory, Strategy, and Practice (2nd edition). Oxford: University Press.
3. Birnhack, M. (2013). Reverse Engineering Informational Privacy Law. Yale Journal of Law and Technology, 15(1), 24-91.
4. Brenner, M., Gentschen Felde, N., Hommel, W., Metzger, S., Reiser, H. & Schaaf, T. (2011). Praxisbuch ISO/IEC 27001—Management der Informationssicherheit und Vorbereitung auf die Zertifizierung. München: Carl Hanser Verlag.
5. Bygrave, L. (2017). Data Protection by Design and Default: Deciphering the EU’s Legislative Requirements. Oslo Law Review, 4(2), 109-120. (cited: Data Protection by Design)