1. Albrecht, M.R., Blasco, J., Jensen, R.B., Mareková, L. (2021). Collective information security in large-scale urban protests: the case of hong kong. In: 30th USENIX Security Symposium, pp. 3363–3380. USENIX Association, Online. https://www.usenix.org/conference/usenixsecurity21/presentation/albrecht
2. Brown, S. D. (2020). Hacking for evidence: The risks and rewards of deploying malware in pursuit of justice. ERA Forum: J. of the Academy of European Law, 20, 423–438. https://doi.org/10.1007/s12027-019-00571-z
3. Cate, F. H., Boneh, D., Chang, F. R., Charney, S., Goldwasser, S., Hoffman, D. A., Kamara, S., Kris, D., Landau, S., Lipner, S. B., Littlehale, R., Martin, K., Rishikof, H., & Weinberger, P. J. (2018). Decrypting the encryption debate: A framework for decision makers. Consensus study report. Washinton DC: The National Academies Press.
4. Europol: Second report of the observatory function on encryption. Joint reports, EuroPol and EuroJust public information (Feb 2020). https://www.europol.europa.eu/publications-documents/second-report-of-observatory-function-encryption
5. Felson, M., & Eckert, M. (2019). Crime and everyday Life (6th ed.). Thousand Oaks, CA: Sage publishing.