This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Cybersecurity Strategy of Estonia 2019–2022. Available: https://www.itu.int/en/ITU-D/Cybersecurity/Documents/National_Strategies_Repository/kyberturvalisuse_strateegia_2022_eng.pdf [rev. 05.05.2022].Cybersecurity Strategy of Estonia 2019–2022Available: https://www.itu.int/en/ITU-D/Cybersecurity/Documents/National_Strategies_Repository/kyberturvalisuse_strateegia_2022_eng.pdf [rev. 05.05.2022].Search in Google Scholar
Cybersecurity Strategy of Latvia 2019–2022. (17.09.2019). Available: https://www.mod.gov.lv/sites/mod/files/document/Cybersecurity%20Strategy%20of%20Latvia%202019_2022.pdf [rev. 05.05.22].Cybersecurity Strategy of Latvia 2019–2022(17.09.2019). Available: https://www.mod.gov.lv/sites/mod/files/document/Cybersecurity%20Strategy%20of%20Latvia%202019_2022.pdf [rev. 05.05.22].Search in Google Scholar
Estonia's Contributions to the GGE. (2014). Available: https://carnegieendowment.org/files/Estonia_UNGGE-input-paper_Sep2014.pdf [rev. 10.05.2022].Estonia's Contributions to the GGE2014Available: https://carnegieendowment.org/files/Estonia_UNGGE-input-paper_Sep2014.pdf [rev. 10.05.2022].Search in Google Scholar
Kaljurand, M. (2016). United Nations Group of Governmental Experts: The Estonian Perspective. In International Cyber Norms: Legal, Policy & Industry Perspectives, p. 112–114. Available: https://ccdcoe.org/uploads/2018/10/InternationalCyberNorms_Ch6.pdf [rev. 10.05.2022].KaljurandM.2016United Nations Group of Governmental Experts: The Estonian PerspectiveInInternational Cyber Norms: Legal, Policy & Industry Perspectives112114Available: https://ccdcoe.org/uploads/2018/10/InternationalCyberNorms_Ch6.pdf [rev. 10.05.2022].Search in Google Scholar
Rosenbach, E., Chong, S. C. (2019). Governing Cyberspace: State Control vs. The Multistakeholder Model. Belfer Center for Science and International Affairs, Harvard Kennedy School. Available: https://www.belfercenter.org/publication/governing-cyberspace-state-control-vs-multistake-holder-model [rev. 16.05.2022].RosenbachE.ChongS. C.2019Governing Cyberspace: State Control vs. The Multistakeholder ModelBelfer Center for Science and International Affairs, Harvard Kennedy SchoolAvailable: https://www.belfercenter.org/publication/governing-cyberspace-state-control-vs-multistake-holder-model [rev. 16.05.2022].Search in Google Scholar
Tikk, E., & Kerttunen, M. (eds.) (2017). The Alleged Demise of the UN GGE: An Autopsy and Eulogy. Cyber Policy Institute, p. 16–17. Available: https://cpi.ee/wp-content/uploads/2017/12/2017-Tikk-Kerttunen-Demise-of-the-UN-GGE-2017-12-17-ET.pdf [rev. 21.05.2022].TikkE.KerttunenM.(eds.)2017The Alleged Demise of the UN GGE: An Autopsy and EulogyCyber Policy Institute1617Available: https://cpi.ee/wp-content/uploads/2017/12/2017-Tikk-Kerttunen-Demise-of-the-UN-GGE-2017-12-17-ET.pdf [rev. 21.05.2022].Search in Google Scholar
UN Conference room paper A/AC.290/2021/CRP.2 “Final Substantive Report”. (10.03.2021). Available: https://front.un-arm.org/wp-content/uploads/2021/03/Final-report-A-AC.290-2021-CRP.2.pdf [rev. 19.05.2022].UN Conference room paper A/AC.290/2021/CRP.2 “Final Substantive Report”. (10.03.2021)Available: https://front.un-arm.org/wp-content/uploads/2021/03/Final-report-A-AC.290-2021-CRP.2.pdf [rev. 19.05.2022].Search in Google Scholar
UN, Developments in the field of information and telecommunications in the context of international security. Available: https://www.un.org/disarmament/ict-security/ [rev. 17.05.2022].UN, Developments in the field of information and telecommunications in the context of international securityAvailable: https://www.un.org/disarmament/ict-security/ [rev. 17.05.2022].Search in Google Scholar
UN Document (A/76/136), Official compendium of voluntary national contributions on the subject of how international law applies to the use of information and communications technologies by States submitted by participating governmental experts in the Group of Governmental Experts on Advancing Responsible State Behaviour in Cyberspace in the Context of International Security established pursuant to General Assembly resolution 73/266 (A/76/136). (13.07.2021). Available: https://ccdcoe.org/uploads/2018/10/UN_-Official-compendium-of-national-contributions-on-how-international-law-applies-to-use-of-ICT-by-States_A-76-136-EN.pdf [rev. 21.05.2022].UN Document (A/76/136), Official compendium of voluntary national contributions on the subject of how international law applies to the use of information and communications technologies by States submitted by participating governmental experts in the Group of Governmental Experts on Advancing Responsible State Behaviour in Cyberspace in the Context of International Security established pursuant to General Assembly resolution 73/266 (A/76/136). (13.07.2021)Available: https://ccdcoe.org/uploads/2018/10/UN_-Official-compendium-of-national-contributions-on-how-international-law-applies-to-use-of-ICT-by-States_A-76-136-EN.pdf [rev. 21.05.2022].Search in Google Scholar
UN General Assembly, Resolution A/RES/53/70, Developments in the field of information and telecommunications in the context of international security. (1999). Available: https://undocs.org/Home/Mobile?FinalSymbol=A%2FRES%2F53%2F70&Language=E&DeviceType=Desktop&LangRequested=False [rev. 05.05.2022].UN General Assembly, Resolution A/RES/53/70, Developments in the field of information and telecommunications in the context of international security1999Available: https://undocs.org/Home/Mobile?FinalSymbol=A%2FRES%2F53%2F70&Language=E&DeviceType=Desktop&LangRequested=False [rev. 05.05.2022].Search in Google Scholar
UN General Assembly, Resolution A/RES/58/32, Developments in the field of information and telecommunications in the context of international security. (08.12.2003). Available: https://undocs.org/Home/Mobile?FinalSymbol=A%2FRES%2F58%2F32&Language=E&DeviceType=Desktop&LangRequested=False [rev. 08.05.2022].UN General Assembly, Resolution A/RES/58/32, Developments in the field of information and telecommunications in the context of international security. (08.12.2003)Available: https://undocs.org/Home/Mobile?FinalSymbol=A%2FRES%2F58%2F32&Language=E&DeviceType=Desktop&LangRequested=False [rev. 08.05.2022].Search in Google Scholar
UN General Assembly, Resolution A/68/98*, Report of the Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security. (24.07.2013). Available: https://undocs.org/Home/Mobile?FinalSymbol=A%2F68%2F98&Language=E&DeviceType=Desktop&LangRequested=False [rev. 08.05.2022].UN General Assembly, Resolution A/68/98*, Report of the Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security. (24.07.2013)Available: https://undocs.org/Home/Mobile?FinalSymbol=A%2F68%2F98&Language=E&DeviceType=Desktop&LangRequested=False [rev. 08.05.2022].Search in Google Scholar
UN General Assembly, Resolution A/70/174, Report of the Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security. (22.07.2015). Available: https://undocs.org/Home/Mobile?FinalSymbol=A%2F70%2F174&Language=E&DeviceType=Desktop&LangRequested=False [rev. 10.05.2022].UN General Assembly, Resolution A/70/174, Report of the Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security. (22.07.2015)Available: https://undocs.org/Home/Mobile?FinalSymbol=A%2F70%2F174&Language=E&DeviceType=Desktop&LangRequested=False [rev. 10.05.2022].Search in Google Scholar
UN General Assembly, Resolution A/RES/73/266, Advancing responsible State behaviour in cyberspace in the context of international security. (2018). Available: https://undocs.org/Home/Mobile?FinalSymbol=A%2FRES%2F73%2F266&Language=E&DeviceType=Desktop&LangRequested=False [rev. 05.05.2022].UN General Assembly, Resolution A/RES/73/266, Advancing responsible State behaviour in cyberspace in the context of international security2018Available: https://undocs.org/Home/Mobile?FinalSymbol=A%2FRES%2F73%2F266&Language=E&DeviceType=Desktop&LangRequested=False [rev. 05.05.2022].Search in Google Scholar
UN General Assembly, Resolution A/76/135, Report of the Group of Governmental Experts on Advancing Responsible State Behaviour in Cyberspace in the Context of International Security. (14.07.2021). Available: https://undocs.org/Home/Mobile?FinalSymbol=A%2F76%2F135&Language=E&DeviceType=Desktop&LangRequested=False [rev. 21.05.2022].UN General Assembly, Resolution A/76/135, Report of the Group of Governmental Experts on Advancing Responsible State Behaviour in Cyberspace in the Context of International Security. (14.07.2021)Available: https://undocs.org/Home/Mobile?FinalSymbol=A%2F76%2F135&Language=E&DeviceType=Desktop&LangRequested=False [rev. 21.05.2022].Search in Google Scholar
UN OEWG and GGE. Geneva internet platform. The Digital Watch. Available: https://dig.watch/processes/un-gge#Framework-of-responsible-behaviour [rev. 17.05.2022].UN OEWG and GGEGeneva internet platform. The Digital WatchAvailable: https://dig.watch/processes/un-gge#Framework-of-responsible-behaviour [rev. 17.05.2022].Search in Google Scholar