Cheong, B. C. & Mohamed, K. A., ‘Personal data beach claims for emotional distress and loss of control in the Singapore Court of Appeal’. Retrieved from: https://ssrn.com/abstract=4700172 [accessed 11 March 2024]Search in Google Scholar
Chesterman, S. (ed) (2014), Data protection law in Singapore: Privacy and sovereignty in an interconnected world, Academy PublishingSearch in Google Scholar
Custers, B., Sears, A. M., Dechesne, F., Georgieva, I., Tani, T., Hof, S. V. D. (2019), EU personal data protection in policy and practice, SpringerSearch in Google Scholar
Cyber Peace Institute (2020), ‘Vastaamo data breach - Attack on human security, dignity and equity’. Retrieved from: https://cyberpeaceinstitute.org/news/2020-10-28-vastaamo-data-breach-attack-on-human-security-dignity-and-equity/ [accessed 10 March 2024]Search in Google Scholar
Dammann, O. (2019), ‘Data, information, evidence, and knowledge: A proposal for health informatics and data science’, Online Journal of Public Health Information, Vol. 10, No. 3, 2019. Retrieved from: 10.5210/ojphi.v10i3.9631 [accessed 30 March 2024]Search in Google Scholar
Dat, T. (2024), ‘Bệnh viện có thể tê liệt vì hacker mã hoá dữ liệu tống tiền’ [Hospitals can be crippled by hackers encrypting data for ransom]. Retrieved from: https://vietnamnet.vn/benhvien-co-the-te-liet-vi-hacker-ma-hoa-du-lieu-tong-tien-2273268.html [accessed 3 June 2024]Search in Google Scholar
Knutsson, K. (2024), ‘AT&T data leak from 73 million customers: What you need to do next’, CyberGuy Report, Fox News. Retrieved from: https://www.foxnews.com/tech/att-data-leak-what-you-need-to-do-next, [accessed 6 April 2024]Search in Google Scholar
Ong, R. (2023), ‘Mandatory data breach notification: Its role in protecting personal data’, Journal of International and Comparative Law, Vol. 10, No. 1. Retrieved from: https://ssrn.com/abstract=4480675 [accessed 11 March 2024]Search in Google Scholar
Ralston, W. (2021), ‘They told their therapists everything. Hackers leaked it all’, Wired. Retrieved from: https://www.wired.com/story/vastaamo-psychotherapy-patients-hack-data-breach/ [accessed 11 March 2024]Search in Google Scholar
Solove, D. J., Schwartz, P. M. (2024), EU Data Protection and the GDPR, AspenSearch in Google Scholar
Solove, D. J. and Keats, C. D. (2017), ‘Risk and anxiety: A theory of data breach harms’, GWU Law School Public Law Research Paper, Vol. 2Search in Google Scholar
Radauer, A., Bader et al. (2022). Study on the legal protection of trade secrets in the context of the data economy (GRO/SME/20/F/206): Final report. European CommissionSearch in Google Scholar
Thai, D. N. (2023), ‘Làm thế nào để giết một người và cả nền kinh tế’, [How to kill a person and the whole economy]. Retrieved from: https://vnhacker.substack.com/p/lamthe-nao-e-giet-mot-nguoi-va-ca?utm_source=profile&utm_medium=reader2 [accessed 29 February 2024]Search in Google Scholar
Traficom (2021), Information Security in 2020 – Annual report of the National Cyber Security Centre Finland, Traficom PublicationSearch in Google Scholar
United Nations Conference on Trade and Development (2022), Voluntary peer review of consumer protection law and policy of Thailand, United NationsSearch in Google Scholar
Voigt, P., Bussche, A. V. D. (2017), The EU General Data Protection Regulation (GDPR): A practice guide, SpringerSearch in Google Scholar
Walter, R., Novak, M. (2021), Cyber security, artifical intelligence, data protection and the law, SpringerSearch in Google Scholar
Walters, R., Trakman, L., Zeller, B., (2019), Data protection law – A comparative analysis of Asia-Pacific and European Approaches, SpringerSearch in Google Scholar
Westby, J. R. (ed) (2004), International guide to privacy, Section of Science & Technology LawSearch in Google Scholar