This work is licensed under the Creative Commons Attribution 4.0 International License.
Google LLC v. Does 1-3 (2023), U.S. District Court for the Northern District of California, Case No: 5:23-cv-05823Search in Google Scholar
Quang Binh Province First Instance Court (2021), Illegally establishing or providing telecommunications or Internet services for the purpose of property appropriation, No. 26/2021/HS-STSearch in Google Scholar
A. M. (2023), ‘Hướng tới mục tiêu kinh tế số chiếm 30% GDP’ [trans: ‘Aiming for a digital economy to account for 30% of GDP’], Chinhphu.vn. Retrieved from: https://baochinhphu.vn/huong-toi-muc-tieu-kinh-te-so-chiem-30-gdp-102230914162731311.htm [accessed 29 November 2023]Search in Google Scholar
Adams J., Albakajai M. (2016), ‘Cyberspace: A New Threat to the Sovereignty of the State’, Management Studies, Vol. 4, No. 6Search in Google Scholar
Agencia español protección datos (AEPD) (2020), ‘Personal data breaches: Ransomware and risk management’. Retrieved from: https://www.legislation.gov.uk/ukpga/2018/12/part/3/chapter/4/crossheading/obligations-relating-to-personal-data-breaches/enacted [accessed 5 December 2023]Search in Google Scholar
Akande D., Coco A., Dias T., Hollis D., O’Brien J., and Benthem T. (2021), ‘The Oxford Statement on International Law Protections in Cyberspace: The Regulation of Ransomware Operations’, EJIL: Talk!, Just Security and Opinio Juris, 4 October 2021Search in Google Scholar
Alexander J. (2023), ‘YouTube sues alleged copyright troll over extortion of multiple YouTubers’, The Verge. Retrieved from: https://www.theverge.com/2019/8/19/20812144/youtube-copyright-strike-lawsuit-alleged-extortion-minecraft [accessed 29 November 2023]Search in Google Scholar
American Society of International Law (2014), ‘Jurisdictional, Preliminary, and Procedural Concerns’, in Diane Marie Amann ed., Benchbook on International Law § II.A, American Society of International LawSearch in Google Scholar
ASEAN, ‘Priority Areas of Cooperation’. Retrieved from https://asean.org/our-communities/asean-political-security-community/peaceful-secure-and-stable-region/cyber-security/ [accessed 5 December 2023]Search in Google Scholar
ASEAN (2021), ‘ASEAN Cybersecurity Cooperation Strategy 2021-2025’. Retrieved from https://asean.org/wp-content/uploads/2022/02/01-ASEAN-Cybersecurity-Cooperation-Paper-2021-2025_final-23-0122.pdf [accessed 5 December 2023]Search in Google Scholar
ASEAN (2020), ‘Chairman’s Statement of the 36th ASEAN Summit 26 June 2020 Cohesive and Responsive ASEAN’, 26 June 2020. Retrieved from: https://asean.org/wp-content/uploads/2020/06/Chairman-Statement-of-the-36th-ASEAN-Summit-FINAL.pdf [accessed 5 December 2023]Search in Google Scholar
ASEAN (2023), ‘Chairman’s Statement of the 30th ASEAN Regional Forum’, 14 July 2023Search in Google Scholar
Asia Pacific Computer Emergency Response Team (APCERT) (2019), ‘APCERT Annual Report 2019’, 2019Search in Google Scholar
Barlow J. P. (1996), ‘A Declaration of the Independence of Cyberspace’, Electronic Frontier Foundation. Retrieved from: https://www.eff.org/cyberspace-independence [accessed 29 November 2023]Search in Google Scholar
Bao Chinh Phu (2022), ‘Cyber Attacks in Vietnam Decrease By Nearly 34% in 2022’. Retrieved from https://en.baochinhphu.vn/cyber-attacks-in-viet-nam-decrease-by-nearly-34-in-2022-11123030910354016-4.htm [accessed 30 November 2023]Search in Google Scholar
Braverman S. (2022), ‘International Law in Future Frontiers’, Attorney General’s Office. Retrieved from: https://www.gov.uk/government/speeches/international-law-in-future-frontiers [accessed 5 December 2023]Search in Google Scholar
C-PROC (2021), ‘The global state of cybercrime legislation 2013 – 2021: A cursory overview’, Europe: Cybercrime Programme Office of the Council of EuropeSearch in Google Scholar
Cao A. D., Ngo T. B. T. (2021), ‘Biện pháp thu thập, chuyển hóa, sử dụng chứng cứ điện tử trong vụ án sử dụng công nghệ cao’ [trans: ‘Measures for Collecting, Transforming, and Using Electronic Evidence in High-Tech Criminal Cases’], Supreme People’s Procuracy of Vietnam, Retrieved from: https://tapchitoaan.vn/bien-phap-thu-thap-chuyen-hoa-su-dung-chung-cu-dien-tu-trong-vu-an-su-dung-congnghe-cao5605.html [accessed 30 November 2023].Search in Google Scholar
Cherry L. M., Pascucci P. P. (2023), ‘International Law in Cyberspace’, in American Bar Association, An Anthology: 60 Years of Transformation National Security Law. Retrieved from: https://www.americanbar.org/groups/law_national_security/publications/aba-standing-committee-on-law-and-national-security-60-th-anniversary-an-anthology/international-law-in-cyberspace/ [accessed 29 November 2023]Search in Google Scholar
Chircop L. (2019), ‘Territorial Sovereignty in Cyberspace after Tallinn Manual 2.0’, Melbourne Journal of International Law, Vol. 14, 2019Search in Google Scholar
CNIL (2021), ‘Multiplication des attaques par rançongiciel : comment limiter les risques?’ [Ransomware attacks on the increase: how can you limit the risks?], 23 April 2021. Retrieved from: https://www.cnil.fr/fr/multiplication-des-attaques-parrancongiciel-comment-limiter-les-risques [accessed 18 December 2023]Search in Google Scholar
CNIL (2023), ‘Status & Composition’. Retrieved from: https://www.cnil.fr/en/cnil/status-composition [accessed 5 December 2023]Search in Google Scholar
Cohn C. (2019), ‘Inventing the Future: Barlow and Beyond’, Duke Law & Technology Review, Vol. 18Search in Google Scholar
Contis N., Doguet C. (2020), ‘Members of independent administrative authorities can be recused under principle of impartiality’, Lexology. Retrieved from: https://www.lexology.com/commentary/litigation/france/kalliop/members-of-independent-administrative-authorities-can-be-recused-under-principle-of-impartiality [accessed 18 December 2023].Search in Google Scholar
Council of Europe Portal (2022), ‘Ransomware: New Guidance Note by the T-CY’. Retrieved from: https://www.coe.int/en/web/cybercrime/-/ransomware-new-guidance-note-by-the-t-cy [accessed 5 December 2023]Search in Google Scholar
Cyber Law Toolkit (2019), ‘National position of France’. Retrieved from https://cyberlaw.ccdcoe.org/wiki/National_position_of_France_(2019)#Due_diligence [accessed 30 November 2023]Search in Google Scholar
Cyber Law Toolkit (2023), ‘Scenario 14: Ransomware campaign’. Retrieved from https://cyberlaw.ccdcoe.org/wiki/Scenario_14:_Ransomware_campaign#cite_note-7 [accessed 5 December 2023]Search in Google Scholar
Ehrlich E. (2014), ‘A Brief history of Internet regulation’, Progressive Policy InstituteSearch in Google Scholar
European Commission (EC), ‘What are Data Protection Authorities (DPAs)?’. Retrieved from: https://commission.europa.eu/law/law-topic/data-protection/reform/what-are-data-protection-authorities-dpas_en [accessed 18 December 2023]Search in Google Scholar
European Data Protection Board (EDPB) (2023), ‘Guidelines 9/2022 on personal data breach notification under GDPR’, ver. 2.0, 28 March 2023Search in Google Scholar
EU External Action (2019), ‘ASEAN-EU Statement on Cybersecurity Cooperation’. Retrieved from https://www.eeas.europa.eu/node/66196_en [accessed 5 December 2023]Search in Google Scholar
European Union External Action (2023), ‘EU-Vietnam: joint press release for the 4th EU-Vietnam Joint Committee’, EEAS, 27 October 2023. Retrieved from https://www.eeas.europa.eu/eeas/eu-vietnam-joint-press-release-4th-eu-vietnam-joint-committee_en [accessed 5 December 2023]Search in Google Scholar
Flashpoint (2023), ‘Flashpoint’s Cyber Threat Intelligence Index: Q3 2023 Edition’. Retrieved from https://flashpoint.io/wp-content/uploads/Q3_CTI_Index_2023-final.pdf [accessed 29 November 2023]Search in Google Scholar
France Diplomacy (2019), ‘France and cyber security’. Retrieved from: https://www.diplomatie.gouv.fr/en/french-foreign-policy/digital-diplomacy/france-and-cyber-security/ [accessed 30 November 2023]Search in Google Scholar
France (2021), ‘French position on International Law applied to Operations in Cyberspace’, Paper shared by France with the Open-ended working group established by resolution 75/240.Search in Google Scholar
Gao X. (2022), ‘Sovereignty and Cyberspace: China’s Ambition to Shape Cyber Norms’, The London School of Economics and Political Science Blogs. Retrieved from: https://blogs.lse.ac.uk/cff/2022/08/18/sovereignty-and-cyberspace-chinas-ambition-to-shape-cyber-norms/ [accessed 17 December 2023]Search in Google Scholar
Gordon S. E. (2001), ‘Changing Concepts of Sovereignty and Jurisdiction in the Global Economy: Is there a Territorial Connection?’, Working Paper Series # 1Search in Google Scholar
Governmental Resolution approval on Project of National Data Center (2023), No. 175/2023/NQ-CP, Official Gazette, 1091-1092, 30 October 2023 - Section III.2(e)Search in Google Scholar
Griffiths C. (2023), ‘The Latest 2023 Ransomware Statistics’, AAG. Retrieved from: https://aag-it.com/the-latest-ransomware-statistics/ [accessed 29 November 2023]Search in Google Scholar
HM Treasury Office of Financial Sanctions Implementation (2023), ‘Ransomware and Sanction – Guidance on Ransomware and Financial Sanctions’. Retrieved from https://assets.publishing.service.gov.uk/media/63e4f0c58fa8f50507f59c16/Ransomware___Sanctions_guidance__Feb_2023_.pdf [accessed 5 December 2023]Search in Google Scholar
Homburger, Z. (2019), ‘Conceptual Ambiguity of International Norms on State Behaviour in Cyberspace’, EU Cyber Direct – Research In FocusSearch in Google Scholar
ICO, ‘Who we are’. Retrieved from: https://ico.org.uk/about-the-ico/who-we-are/ [accessed 5 December 2023]Search in Google Scholar
Information Security Department, ‘Gci Cybersecurity Cooperation’. Retrieved from https://ais.gov.vn/gci-cybersecurity-cooperation.html [accessed 5 December 2023]Search in Google Scholar
Information Security Department, ‘Some countries and organizations have cybersecurity information sharing to Viet Nam’. Retrieved from https://ais.gov.vn/CERT-global-and-VNCERT_pdf.pdf [accessed 5 December 2023]Search in Google Scholar
International Telecommunication Union (ITU) (2023), ‘Global Cybersecurity Index 2020’, Switzerland, 2023Search in Google Scholar
Japan International Cooperation Agency (2023), ‘Signing of Record of Discussions on Technical Cooperation Project with ASEAN Member States: Toward ‘a free, fair, and secure cyberspace” through ASEAN-Japan cooperation’, 28 February 2023. Retrieved from https://www.jica.go.jp/Resource/english/news/press/2022/20230228_41.html [accessed 5 December 2023]Search in Google Scholar
Jensen E. T. (2017), ‘The Tallinn Manual 2.0: Highlights and Insights’, Georgetown Journal of International Law, Vol. 48Search in Google Scholar
Kleijssen J., Perri P. (2016), ‘Cybercrime, Evidence and Territoriality: Issues and Options’, Netherlands Yearbook of International Law, Vol. 47Search in Google Scholar
Koh H. H. (2012), ‘International Law in Cyberspace’, Harvard International Law Journal, Vol. 54Search in Google Scholar
Krasikov D.V, Lipkina, N. N. (2020), ‘Sovereignty in Cyberspace: A Scholarly and Practical Discussion’, Advances in Social Science, Education and Humanities Research, Vol. 498, Proceedings of the XIV European-Asian Law Congress ‘The Value of Law” (EAC-LAW 2020)Search in Google Scholar
Kulesza J. (2023), ‘Principles of International Law in Cyberspace’, Report on the Third Meeting of the Sino-European Expert Working - Group on the Application of International Law in CyberspaceSearch in Google Scholar
Lai B. (2022), ‘The threat of ransomware’, Parliament of Australian. Retrieved from: https://www.aph.gov.au/About_Parliament/Parliamentary_Departments/Parliamentary_Library/pubs/BriefingBook47p/ThreatRansomware [accessed 5 December 2023]Search in Google Scholar
LexisNexis, ‘Glossary: Cyberspace definition’. Retrieved from https://www.lexisnexis.co.uk/legal/glossary/cyberspace [accessed 29 November 2023]Search in Google Scholar
Lubin A. (2022), ‘The Law and Politics of Ransomware’, Vanderbilt Journal of Transnational Law, Vol. 55, 2021Search in Google Scholar
Ministry of Foreign Affairs of Japan (2019), ‘The Signing of the Japan-ASEAN Technical Cooperation Agreement’, 13 May 2019. Retrieved from https://www.mofa.go.jp/press/release/press4e_002444.html [accessed 5 December 2023]Search in Google Scholar
Nguyen H. (2018), ‘PwC Vietnam and VNCERT form strategic partnership for cyber security incident response’, Vietnam Investment Review, 2018Search in Google Scholar
Nguyen M. V., Le T. H. (2023), ‘Tội phạm sử dụng công nghệ cao; những khó khăn, vướng mắc trong phòng, chống và xử lý’ [trans: ‘Crime uses high technology; difficulties and problems in prevention, control and handling’], Room 2 – People’s Procuracy of Hai Duong province, 13 October 2023Search in Google Scholar
Nguyen V. L. (2020), ‘Hợp tác và đấu tranh về an ninh mạng trong quan hệ quốc tế: Cơ hội, thách thức và đề xuất chính sách đối với Việt Nam’, Tạp chí điện tử Cộng sản [trans: ‘Cooperation and Struggle in Cybersecurity in International Relations: Opportunities, Challenges, and Policy Proposals for Vietnam’, Electronic Journal of the Communist Party]. Retrieved from: https://www.tapchicongsan.org.vn/web/guest/the-gioi-van-de-su-kien/-/2018/816711/hop-tac-va-dau-tranh-ve-an-ninh-mangtrong-quan-he-quoc-te-%C2%A0co-hoi%2C-thach-thuc-va-de-xuat-chinh-sachdoi-voi-viet-nam.aspx [accessed 29 November 2023]Search in Google Scholar
Office of the Spokesperson (2023), ‘Co-Chairs’ Statement on the Fourth ASEANU.S. Cyber Policy Dialogue’, U.S. Department of State. Retrieved from https://www.state.gov/co-chairs-statement-on-the-fourth-asean-u-s-cyber-policy-dialogue/ [access 5 December 2023]Search in Google Scholar
Osula A., RoÞigas H. (2016), ‘International Cyber Norms: Legal, Policy & Industry Perspectives’, NATO Cooperative Cyber Defence Centre of Excellence (NATO CCD COE), 2016Search in Google Scholar
Perloff-Giles A. (2018), ‘Transnational Cyber Offenses: Overcoming Jurisdictional Challenges’, The Yale Journal of International Law, Vol. 43Search in Google Scholar
Piper A. (2022), ‘The rights and wrongs of ransomware’, International Bar Association. Retrieved from: https://www.ibanet.org/The-rights-and-wrongs-of-ransomware [accessed 5 December 2023]Search in Google Scholar
Prado H. D. (2023), ‘Taking legal action to protect users of AI and small businesses’, Google blog. Retrieved from: https://blog.google/outreach-initiatives/public-policy/taking-legal-action-to-protect-users-of-ai-and-small-businesses/ [accessed 29 November 2023]Search in Google Scholar
Q. T. (2022), ‘Taking over Facebook accounts to extort’, VNExpress, 25 March 2022Search in Google Scholar
Ramadhan I. (2023), ‘ASEAN-China Cybersecurity Cooperation: Challenges and Opportunities’, Journal of Social and Political Sciences, Vol. 6, No. 4Search in Google Scholar
Reuters (2017), ‘In Vietnam and across Asia, hard lessons for ransomware victims’, Vnexpress. Retrieved from: https://e.vnexpress.net/news/news/in-vietnam-and-across-asia-hard-lessons-for-ransomware-victims-3585383.html [accessed 30 November 2023]Search in Google Scholar
Rothwell D. R., Kaye S., Akhtarkhavari A., and Davis R. (2010), ‘Jurisdiction’, in International Law: Cases and Materials with Australian Perspectives, Cambridge University PressSearch in Google Scholar
Rosenberg D. (2022), ‘Seizing the means of disruption: international jurisdiction and human rights in the expanding frontier of cyberspace’, International Law and Politics, Vol. 55Search in Google Scholar
Security Council (2021), ‘Explosive’ Growth of Digital Technologies Creating New Potential for Conflict, Disarmament Chief Tells Security Council in First-Ever Debate on Cyberthreats’, SC/14563, 29 June 2021Search in Google Scholar
Semenova N. (2021), ‘Jurisdiction in Cyberspace’. Retrieved from: http://dx.doi.org/10.2139/ssrn.3912006 [accessed 30 November 2023]Search in Google Scholar
Sénat (2020), ‘Rapport d’information n° 613 (2019-2020)’, Proposition de résolution au nom de la commission des affaires européennes, en application de l’article 73 quater du Règlement, sur la lutte contre la cybercriminalité : Cybercriminalité : un défi à relever aux niveaux national et européen, 9 July 2020Search in Google Scholar
Schmitt M. (2021), ‘The Sixth United Nations GGE and International Law in Cyberspace’, Just Security. Retrieved from: https://www.justsecurity.org/76864/the-sixth-united-nations-gge-and-international-law-in-cyberspace/ [accessed 5 December 2023]Search in Google Scholar
Schmitt M. N., Vihul L. (2017), ‘Respect for Sovereignty in Cyberspace’, Texas Law Review, Vol. 95, No. 3Search in Google Scholar
Statista Research Department (2023), ‘Global ICT market share 2013-2023, by selected country’. Retrieved from: https://www.statista.com/statistics/263801/global-market-share-held-by-selected-countries-in-the-ict-market/#:~:text=As%20of%202023%2C%20the%20U.S.,share%20of%20over%2011%20percent [accessed 17 December 2023]Search in Google Scholar
Tan E. E., Ang B. (2022), ‘ASEAN Ambiguity on International Law and Norms for Cyberspace’, Baltic Yearbook of International Law Online, Vol. 20, Issue 1Search in Google Scholar
Tay K. L. (2023), ‘ASEAN Cyber-security Cooperation: Towards a Regional Emergency- response Framework’, The International Institute for Strategic StudiesSearch in Google Scholar
The European Commission (2022), ‘The Cybersecurity Strategy’. Retrieved from https://digital-strategy.ec.europa.eu/en/policies/cybersecurity-strategy [accessed 5 December 2023]Search in Google Scholar
The European Commission (2022), ‘Joint Communication to the European Parliament and the Council’, the EU’s Cybersecurity Strategy for the Digital DecadesSearch in Google Scholar
The Information Office of the State Council of the People’s Republic of China (2010), ‘The Internet in China’, Information Office of the State Council of the People’s Republic of China. Retrieved from: http://www.china.org.cn/government/whitepaper/node_7093508.htm, pp. 7-8 [accessed 17 December 2023]Search in Google Scholar
The NATO Cooperative Cyber Defence Centre of Excellence (2023), ‘The Tallinn Manual’, CCDCOE. Retrieved from https://ccdcoe.org/research/tallinn-manual/ [accessed 6 December 2023]Search in Google Scholar
The United Nations (2021), ‘Ransomware attacks, a growing threat that needs to be countered’, UNODC Regional Office for Southeast Asia and the PacificSearch in Google Scholar
The UN Secretary-General (2013), ‘Report of the Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security’, U.N. Doc. A/68/98, 24 June 2013Search in Google Scholar
Trachtman J. P. (1998), ‘Cyberspace, Sovereignty, Jurisdiction and Modernism’, Indiana Journal of Global Legal Studies, Vol. 5, No. 2Search in Google Scholar
United Nations Office on Drugs and Crime (2019), ‘E4J University Module Series: Cybercrime - Module 7: International Cooperation against Cybercrime’. Retrieved from https://www.unodc.org/e4j/en/cybercrime/module-7/key-issues/sovereignty-and-jurisdiction.html [accessed 5 December 2023]Search in Google Scholar
Van Ly (2018), ‘Quốc hội: Hợp nhất luật an ninh mạng và an toàn thông tin là không khả thi’ [trans: Congress: Consolidating cybersecurity and information security laws is not feasible], The Saigon Times. Retrieved from: https://thesaigontimes.vn/quochoi-hop-nhat-luat-an-ninh-mang-va-an-toan-thong-tin-la-khong-kha-thi/ [accessed 5 December 2023]Search in Google Scholar
Vietnam’s Government, ‘Report on the activities of mutual legal assistance in 2019’, No. 479/BC-CP, 12 October 2019. Retrieved from https://congan.com.vn/tinchinh/thu-thap-chung-cu-ve-hanh-vi-gui-tien-qua-lao-va-campuchia-cua-tran-bacha_81536.html [accessed 30 November 2023]Search in Google Scholar
Vietnamplus (2022), ‘Vietnam asks for EU’s stronger support in cyber security protection’, 28 April 2022. Retrieved from https://en.vietnamplus.vn/vietnam-asks-for-eus-stronger-support-in-cyber-security-protection/227696.vnp [accessed 5 December 2023]Search in Google Scholar
VnetWork (2023), ‘Vietnam’s cybersecurity in the first half of 2022’, VnetWork. Retrieved from: https://www.vnetwork.vn/en-US/news/an-ninh-mang-vietnam/11 [accessed 30 November 2023]Search in Google Scholar
Vu T. T. Anh (2023), ‘Protecting Vietnam’s Sovereignty in Cyberspace: Insights from Human Right Laws’, The Age of Human Rights Journal, Vol. 21Search in Google Scholar
Vyas R. K. (2022), ‘3 Reasons Southeast Asia Is A Hot Market For Tech Startups’, Forbes, 17 May 2022Search in Google Scholar
Wen R. (2019), ‘Vietnam’s New Cybersecurity Law: A Headache for US Service Providers?’, Georgetown Law Technology Review. Retrieved from: https://georgetownlawtechreview.org/vietnams-new-cybersecurity-law-a-headache-for-us-service-providers/GLTR-02-2019/ [accessed 5 December 2023]Search in Google Scholar
Yang M. (2016), ‘Legal Ambiguities in Cyberspace’, LawTech.Asia. Retrieved from: https://lawtech.asia/legal-ambiguities-in-cyberspace/ [accessed 29 November 2023]Search in Google Scholar
Yiapanis A., Mazzola A. (2023), ‘Opinion of the European Economic and Social Committee on the Joint Communication to the European Parliament and the Council: EU Policy on Cyber Defence’, Official Journal of the European Union, 2023/C 293/04Search in Google Scholar
Zachar D. (2021), ‘Battling Cybercrime Through the New Additional Protocol to the Budapest Convention’, The NATO Cooperative Cyber Defence Centre of Excellence. Retrieved from: https://ccdcoe.org/library/publications/battling-cybercrime-through-the-new-additional-protocol-to-the-budapest-convention/ [accessed 29 November 2023]Search in Google Scholar