[
Abott, Rich (2015): U.K. Agrees With China Not To Support Cyber Theft Of Intellectual Property, Defense Daily (29 October): available at https://www.defensedaily.com/u-k-agrees-with-china--not-to-support-cyber-theft-of-intellectual-property-2/uncategorized/(31 May 2021).
]Search in Google Scholar
[
Bergenas, Johan (2008): The role of regional and sub-regional organizations in implementing UN Security Council Resolution 1540: a preliminary assessment of the African continent: available at http://www.vertic.org/media/assets/nim_docs/background%20articles/UNIDIR%20Scheinman%201540%20pdf2-act341.pdf (31 May 2021).
]Search in Google Scholar
[
Buchan, Russell (2018): Cyber Espionage and International Law, Hart Publishing.
]Search in Google Scholar
[
Cabada Ladislav (2018): Visegrad Group in the Context of Other Central European Cooperation Formats. Politics in Central Europe, Vol. 13, No. 2, 165–179.10.2478/pce-2018-0014
]Search in Google Scholar
[
Cowan, Paris (2017): Australia, China agree to oppose cyber IP theft, IT News (24 April): avail-ableathttps://www.itnews.com.au/news/australia-china-ink-agreement-to-stop-industrial--hacking-459387#:~ (31 May 2021).
]Search in Google Scholar
[
Crawford, James (1997): Universalism and regionalism from the perspective of the work of the International Law Commission, in United Nations, ed., International Law on the Eve of the Twenty-fist Century. Views from the International Law Commission, 99–122, United Nations.
]Search in Google Scholar
[
Eder, Marton (2021): Hungary says vaccine registration website under cyber attack, Bloomberg Blog (19 February): available at https://www.bloomberg.com/news/articles/2021-02-19/hungary-says-vaccine-registration-website-under-cyber-attack (31May2021).
]Search in Google Scholar
[
European Union Intellectual Property Office (2018): The baseline of trade secrets litigation in the EU member states, EUIPO: available at https://euipo.europa.eu/tunnel-web/secure/webdav/guest/document_library/observatory/documents/reports/2018_Baseline_of_Trade_Secrets_Litigations_in_EU_Member_States/2018_Baseline_of_Trade_Secrets_Litigations_in_EU_Member_States_EN.pdf (31 May 2021.)
]Search in Google Scholar
[
Fidler, David P. (2020a): Cybersecurity in the Time of COVID-19, Council on Foreign Relations Blog (30 March): available at https://www.cfr.org/blog/cybersecurity-time-covid-19 (31 May 2021).
]Search in Google Scholar
[
Fidler, David P. (2020b): 2020 in Review: The COVID-19 Pandemic and Cyberspace, Council on Foreign Relations Blog (14 December): available at https://www.cfr.org/blog/2020-review--covid-19-pandemic-and-cyberspace (31 May 2021).
]Search in Google Scholar
[
Garcia-Mora, Manuel R, (1964: Treason, Sedition and Espionage as Political Offenses Under the Law of Extradition, U. PITT.L. REV. 26 (65): 79–80.
]Search in Google Scholar
[
Gebhard, Carmen (2013): Sub-Regional cooperation in Central Europe – past, present and future, AARMS 12 (1): 25–38.10.32565/aarms.2013.1.3
]Search in Google Scholar
[
Górka, Marek (2018): The Cybersecurity Strategy of the Visegrad Group Countries, Politics in Central Europe 14 (2): 75–98.10.2478/pce-2018-0010
]Search in Google Scholar
[
Hua, Jian (2015): Industrial Cyber Espionage, Journal of Management Systems 25 (3): 67–81
]Search in Google Scholar
[
Jančárková, Taťána – Minárik, Tomáš (2019): Scenario 09: Economic cyber espionage, Cyber Law Toolkit: available at https://cyberlaw.ccdcoe.org/wiki/Scenario_09:_Economic_cyber_espionage (31 May 2021).
]Search in Google Scholar
[
Joubert, Vincent (2010): Getting the essence of cyberspace: a theoretical framework to face cyber issues, in Czosseck – Podins, eds, Conference on Cyber Conflict. Proceedings 2010, 111–124, CCD COE Publications.
]Search in Google Scholar
[
Kaan Pehlivan, Oğuz (2019): Confronting Cyberespionage Under International Law, Routledge.10.4324/9781351106016
]Search in Google Scholar
[
Kenety, Brian (2020): ČSÚ: nearly 1 in 5 Czech companies faced cyberattack in 2018, Radio Prague International (13 January): available at https://www.radio.cz/en/section/business/csu-nearly-1-in-5-czech-companies-faced-cyberattack-in-2018 (3September2021).
]Search in Google Scholar
[
Kolbasuk McGee, Marianne (2018): U.S., China Reach Cyber Agreement, Bank Info Security (25 September): available at https://www.bankinfosecurity.com/us-china-a-8553 (31 May 2021).
]Search in Google Scholar
[
Legal Week Intelligence – CMS (2018): The Cybersecurity Challenge in Central and Eastern Europe. Are multinational companies prepared?, CMS Publication: available at https://cms.law/en/hun/publication/the-cybersecurity-challenge-in-central-and-eastern-europe(31May2021).
]Search in Google Scholar
[
Lennon, Mike (2013): TeamSpy – A Decade-long Cyber Espionage Operation Targeting Eastern Europe, Security Week (20 March): available at https://www.securityweek.com/teamspy--decade-long-cyber-espionage-operation-targeting-eastern-europe(31May2021).
]Search in Google Scholar
[
Lotrionte, Catherine (2015): Countering State-Sponsored Cyber Economic Espionage Under International Law, North Carolina Journal of International Law and Commercial Regulation 40: 443–541.
]Search in Google Scholar
[
Magen, Sharon (2017): Cybersecurity and Economic Espionage: The Case of Chinese Investments in the Middle East, Cyber, Intelligence, and Security 1 (3): 3–18.
]Search in Google Scholar
[
Nasheri, Hedieh (2003): The Intersection of Technology Crimes and Cyberspace in Europe: The Case of Hungary, Information & Communications Technology Law 12 (1): 25–48.10.1080/1360083032000052241
]Search in Google Scholar
[
Panyi, Szabolcs (2021a): How Orbán’s Eastern Opening brought Chinese spy games to Budapest, Direkt36 (14 March): available at https://www.direkt36.hu/en/kemjatszmakat-hozott--budapestre-orban-kinai-nyitasa/ (31May2021).
]Search in Google Scholar
[
Panyi, Szabolcs (2021b): Hungary could turn into China’s trojan horse in Europe, Reporting Democracy (9 April): available at https://balkaninsight.com/2021/04/09/hungary-could-turn--into-chinas-trojan-horse-in-europe(31May2021).
]Search in Google Scholar
[
PRI (2018): Investor-company dialogue on cyber security: five emerging findings, PRI - Governance Issues (24 September): available at https://www.unpri.org/governance-issues/investor--company-dialogue-on-cyber-security-five-emerging-findings/3664.article(31May2021).
]Search in Google Scholar
[
PricewaterhouseCoopers (2018): Study on the scale and impact of industrial espionage and theft of trade secrets through cyber, Study prepared for the European Commission (18 December): available at https://ec.europa.eu/docsroom/documents/34841 (31 May 2021).
]Search in Google Scholar
[
Ravishankar, Vaishnavi – Mooney, Olivia – Hader, Nora (2018): Stepping up governance on cyber security. What is corporate disclosure telling investors?, Principles for Responsible Investment, UNEP Finance Initiative, UN Global Compact: available at https://www.unpri.org/download?ac=5134 (31 May 2021).
]Search in Google Scholar
[
Reynolds, Paul (2004): The World’s Second Oldest Profession, BBC News (26 February): available at https://perma.cc/B9KM-E5E5 (3 September 2021).
]Search in Google Scholar
[
Rudka, Andrzej (1997): Central Europe: regional cooperation and beyond, in Hayashi, Tadayuki, ed., The emerging new regional order in Central and Eastern Europe, 193–209, Hokkaido University.
]Search in Google Scholar
[
Shackelford, Scott J. et al. (2015): Using BITs to Protect Bytes: Promoting Cyber Peace by Safeguarding Trade Secrets Through Bilateral Investment Treaties, American Business Law Journal 52 (1): 1–74.10.1111/ablj.12041
]Search in Google Scholar
[
Schmitt, Michael – Vihul, Liis (2017): Tallinn Manual 2.0 on the international law applicable to cyber operations, Cambridge University Press.10.1017/9781316822524
]Search in Google Scholar
[
Strážay, Tomas (2011): Visegrád – arrival, survival, revival. Selected V4 Bibliography, Visegrad Group: available at http://www.visegradgroup.eu/documents/bibliography/visegradarrival--survival-120628 (31 May 2021).
]Search in Google Scholar
[
Strážay, Tomas (2019): When pragmatism wins: Slovakia in the Visegrád group, in Brezáni, Peter, ed., Yearbook of Slovakia’s foreign policy 2018, 67–74, Research Center of the Slovak Foreign Policy Association.
]Search in Google Scholar
[
Tasheva, Iva (2017): European cybersecurity policy. Trends and prospects, European Policy Centre – Policy Brief (8 June): available at https://www.epc.eu/pub_details.php?cat_id=3&pub_id=7739 (3 September 2021).
]Search in Google Scholar
[
UNODC (2018): Cyberespionage, E4J University Module Series: Cybercrime: available at https://www.unodc.org/e4j/en/cybercrime/module-14/key-issues/cyberespionage.html (31 May 2021).
]Search in Google Scholar
[
Van Arnam, Robert C. (2001): Business War: Economic Espionage in the United States and the European Union and the Need for Greater Trade Secret Protection, North Carolina Journal of International Law 27: 95–139.
]Search in Google Scholar
[
Wielgos, Alexander (2019): V4 in Changeful Espionage, The Warsaw Institute Review (4 November) available at https://warsawinstitute.org/v4-changeful-espionage (31 May 2021).
]Search in Google Scholar
[
Wołek, Artur (2013): Precipices beneath summits? The Visegrád cooperation seen from middle policy levels, in Marušiak, Juraj et al., eds., Internal cohesion of the Visegrád group, 86–99, VEDA.
]Search in Google Scholar
[
Zachová, Aneta et al. (2018): Is Visegrad group ready for cyber-attacks?, Visegrad.info (7 May): availableathttps://visegradinfo.eu/index.php/collaborative/560-is-visegrad-group-ready--for-cyberattack (31 May 2021).
]Search in Google Scholar