[
1. Andraško, Jozef, Matúš Mesarčík, and Ondrej Hamuľák. “The regulatory intersections between artificial intelligence, data protection and cyber security: challenges and opportunities for the EU legal framework.” AI & Soc Vol. 36 (2021): 623–636 // https://doi.org/10.1007/s00146-020-01125-5.10.1007/s00146-020-01125-5
]Search in Google Scholar
[
2. Bandemer, Stephan, et al. “Staatsaufgaben – Von der ‘schleichenden’ Privatisierung zum ‘aktivierenden Staat’” (The role of states – from ‘creeping’ privatisation to the ‘activating state’): 41–60. In: Fritz Behrens, ed. Den Staat neu denken. Reformperspektiven für die Landesverwaltung (Rethinking the state. Reform perspectives for the state administration). Berlin: Sigma, 1995.
]Search in Google Scholar
[
3. Barlow, John Perry. “A Declaration of the Independence of Cyberspace” (May 2021) // https://www.eff.org/cyberspace-independence.10.21428/6ffd8432.ea8cd895
]Search in Google Scholar
[
4. Buzan, Barry, Ole Wæver, and Jaap de Wilde. Security: A New Framework for Analysis. Boulder: Lynne Rienner Publishers, 1998.
]Search in Google Scholar
[
5. Davila, Erica M. “International E-Discovery: Navigating the Maze” (May 2021) // https://tlp.law.pitt.edu/ojs/index.php/tlp/article/view/37.
]Search in Google Scholar
[
6. De Sousa Santos, Boaventura. “Law: A Map of Misreading. Toward a Postmodern Conception of Law.” Journal of Law and Society 14(3) (1987): 279–302.10.2307/1410186
]Search in Google Scholar
[
7. Evans-Pritchard, Edward E. The Nuer: A Description of the Modes of Livelihood and Political Institutions of a Nilotic People. Oxford: Clarendon Press, 1967.
]Search in Google Scholar
[
8. Hamuľák, Ondrej. “Lessons from the ‘Constitutional Mythology’ or How to Reconcile the Concept of State Sovereignty with European Integration.” DANUBE: Law, Economics and Social Issues Review Vol. 6, No. 2 (2015): 75–90 // https://doi.org/10.1515/danb-2015-0005.10.1515/danb-2015-0005
]Search in Google Scholar
[
9. Hamuľák, Ondrej, Lilla N. Kiss, Tomáš Gábriš, and Hovsep Kocharyan. “This Content is not Available in your Country. A General Summary on Geo-Blocking in and Outside the European Union.” International and Comparative Law Review Vol. 21, No. 1 (2021): 153–183 // https://doi.org/10.2478/iclr-2021-0006.10.2478/iclr-2021-0006
]Search in Google Scholar
[
10. Hart, Herbert L. A. The Concept of Law. Oxford: Oxford University Press, 1961.
]Search in Google Scholar
[
11. Ipsen, Nils Ch. Private Normenordnungen als Transnationales Recht? (Private Norm Systems as Transnational Law?). Berlin: Duncker & Humblot, 2009.10.3790/978-3-428-12977-5
]Search in Google Scholar
[
12. Kabat-Rudnicka, Danuta. “Autonomy or Sovereignty: The Case of the European Union.” International and Comparative Law Review Vol. 20, No. 2 (2020): 73–92 // https://doi.org/10.2478/iclr-2020-0018.10.2478/iclr-2020-0018
]Search in Google Scholar
[
13. Kadelbach, Stefan, and Klaus Günther. “Recht ohne Staat?” (Law without State): 9–48. In: Stefan Kadelbach and Klaus Günther, eds. Recht ohne Staat? Zur Normativität nichtstaatlicher Rechtssetzung (Law without State? On the Normativity of Non-State Law-making). Frankfurt am Main: Campus Verlag, 2011.
]Search in Google Scholar
[
14. Kagermann, Henning, and Ulrich Wilhelm, eds. “European Public Sphere: Towards Digital Sovereignty for Europe.” The acatech IMPULSE series (May 2020) // https://www.acatech.de/publikation/european-public-sphere/download-pdf?lang=en.
]Search in Google Scholar
[
15. Kelsen, Hans. General Theory of Norms. Oxford: Oxford University Press, 1991.10.1093/acprof:oso/9780198252177.001.0001
]Search in Google Scholar
[
16. Lee, Myungsuk. “Conceptualizing the New Governance: A New Institution of Social Coordination” (May 2021) // https://pdfs.semanticscholar.org/71ec/0b861a6dad2d93b56ab5f8c6b77bfa415a48.pdf.
]Search in Google Scholar
[
17. Leenes, Ronald, Bert Jaa Koops, and Paul De Hert. Constitutional Rights and New Technologies: A Comparative Study. The Hague: T.M.C. Asser Press, 2008.
]Search in Google Scholar
[
18. Lessig, Lawrence. Code V.2. New York: Basic Books, 2006.
]Search in Google Scholar
[
19. Ohm, Paul. “The Argument Against Technology-Neutral Surveillance Laws.” Texas Law Review 88 (2010): 1685–1714.
]Search in Google Scholar
[
20. Polčák, Radim, et al. Právo informačních technologií (IT Law). Praha: Wolters Kluwer, 2018.
]Search in Google Scholar
[
21. Polčák, Radim. “In Law, we Trust: Shortly to Bumblebees and the Normativity of Law in Cyberspace”: 3–10. In: Radim Polčák, Martin Škop, and David Šmahel, eds. Cyberspace 2005. Brno: Masayrkova Univerzita, 2006
]Search in Google Scholar
[
22. Rogers, Kevin M. The Internet and the Law. London: Palgrave Macmillan, 2011.
]Search in Google Scholar
[
23. Roguski, Przemysław. “Layered Sovereignty: Adjusting Traditional Notions of Sovereignty to a Digital Environment”: 1–13. In: Tomáš Minárik et al., eds. 11th International Conference on Cyber Conflict: Silent Battle. Tallinn: NATO CCD COE Publications, 2019 // https://ccdcoe.org/uploads/2019/06/Art_19_Layered-Sovereignty.pdf.10.23919/CYCON.2019.8756900
]Search in Google Scholar
[
24. Romano, Santi. Die Rechtsordnung (The Legal Order). Translated by Werner Daum. Berlin: Duncker & Humblot, 1975.
]Search in Google Scholar
[
25. Solomon. Jason M. “New Governance, Preemptive Self-Regulation, and the Blurring of Boundaries in Regulatory Theory and Practice” (May 2021) // https://scholarship.law.wm.edu/facpubs/680/.
]Search in Google Scholar
[
26. Tropina, Tatiana, and Cormac Callanan. Self- and Co-regulation in Cybercrime, Cybersecurity and National Security. Cham: Springer, 2015.10.1007/978-3-319-16447-2
]Search in Google Scholar
[
27. Vec, Miloš. “Das selbstgeschaffene Recht der Ingenieure. Internationalisierung und Dezentralisierung am Beginn der Industriegesellschaft” (The self-created right of engineers. Internationalisation and decentralisation at the beginning of industrial society): 96–97. In: European and International Regulation after the Nation State. Baden-Baden: Nomos, 2004.
]Search in Google Scholar
[
28. Wright, Aaron, and Primavera De Filippi. “Decentralized Blockchain Technology and the Rise of Lex Cryptographia” (May 2021) // https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2580664.
]Search in Google Scholar
[
29. Yen, Alfred C. “Western Frontier or Feudal Society? Metaphors and Perceptions of Cyberspace.” Berkeley Law Journal 17 (2002): 1207–1264.10.2139/ssrn.322522
]Search in Google Scholar
[
30. Završnik, Aleš. “Cybercrime: (Cyber)Criminological and (Cyber)Victimological Particularities of the ‘Information Superhighway’”: 157–174. In: Radim Polčák, Martin Škop, and David Šmahel, eds. Cyberspace 2005. Brno: Masayrkova Univerzita, 2006.
]Search in Google Scholar
[
31. Zippelius, Reinhold. Verhaltenssteuerung durch Recht und kulturelle Leitideen. (Behavioural control through law and cultural guiding ideas). Berlin: Duncker & Humblot, 2004.10.3790/978-3-428-51456-4
]Search in Google Scholar