Aslan, Ö., Aktuğ, S. S., Ozkan-Okay, M., Yilmaz, A. A., & Akin, E. (2023). A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions. Electronics (Switzerland), 12(6). https://doi.org/10.3390/electronics12061333
Australia’s Cyber Security Strategy 2020. (2020). Department of Home Affairs, Australia, 1–52. https://www.homeaffairs.gov.au/cyber-security-subsite/files/cyber-security-strategy-2020.pdf
Azad, A. (2021). Digital Security Act in Bangladesh: The death of dissent and of freedom of expression (Issue May). Central European University.
Bangladesh: Türk urges immediate suspension of Digital Security Act as media crackdown continues. (2023). https://www.ohchr.org/en/press-releases/2023/03/bangladesh-turk-urges-immediate-suspension-digital-security-act-media
Baudot, L., & Robson, K. (2017). Regulation. In The Routledge Companion to Critical Accounting (pp. 184–204). https://doi.org/10.4324/9781315775203-11
Bigo, D., Carrera, S., Guild, E., & Mitsilegas, V. (2020). Controlling frontiers: Free movement into and within Europe. Ashgate Publishing.
Binns, R., & Veale, M. (2020). Algorithmic accountability and privacy: Implications of AI in government surveillance. Journal of Privacy and Surveillance Studies, 15(4), 55–72.
Budiarto, M. K., Rahman, A., Asrowi, Gunarhadi, & Efendi, A. (2024). Proposing information and communication technology (ICT)-based learning transformation to create competitive human resources: A theoretical review. Multidisciplinary Reviews, 7(4). https://doi.org/10.31893/multirev.2024076
Cybersecurity Act 2018. (2018). Republic of Singapore Government Gazette Acts Supplement (Cybersecurity Act No.9 2018), 9, 72.
Cybersecurity Information Sharing Act of 2015. (2015). https://www.newamerica.org/oti/blog/cybersecurity-information-sharing-act-of-2015-is-cyber-surveillance-not-cybersecurity/
De Hert, P., & Gutwirth, S. (2021). Data protection and the limits of the law: Challenges for privacy in the digital age. Privacy & Security Studies, 13(2), 101–121.
Dwivedi, Y. K., Hughes, L., Baabdullah, A. M., Ribeiro-Navarrete, S., Giannakis, M., Al-Debei, M. M., … Wamba, S. F. (2022). Metaverse beyond the hype: Multidisciplinary perspectives on emerging challenges, opportunities, and agenda for research, practice and policy. International Journal of Information Management, 66(July), 102542. https://doi.org/10.1016/j.ijinfomgt.2022.102542
Federation, R. (2014). Federal Law No. 149-FZ of July 27, 2006, on information, information technologies, and protection of information (as amended up to Federal Law No. 222-FZ of July 21, 2014).
Government Gazette. (2021). Cybercrimes Act, 2020. Prevention, 672, 1–128. http://www.nsw.gov.au/sites/default/files/Government_Gazette_2_December.pdf#page=15
Government of the People’s Republic of Bangladesh. (2019). Digital Security Act 2018 (Authentic English Text). 23319–23342. https://www.cirt.gov.bd/wp-content/uploads/2020/02/Digital-Security-Act-2020.pdf
Govt alerts to stop misuse of Digital Security Act: Anisul Huq. (2023). https://www.kalerkantho.com/english/online/national/2023/03/22/51010
HM Government. (2022). Government Cyber Security Strategy: 2022 to 2030. UK Government, 1–78. https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/1049825/government-cyber-security-strategy.pdf
Indian Parliament. (2000). The Information Technology Act. https://www.indiacode.nic.in/bitstream/123456789/13116/1/it_act_2000_updated.pdf
Lavorgna, A. (2000). Cyber-organised crime: A case of moral panic? Trends in Organized Crime, 22(4), 357–374. https://doi.org/10.1007/s12117-018-9342-y
MacKinnon, R. (2022). Consent of the networked: The worldwide struggle for internet freedom. Basic Books.
MCSS. (2020). Malaysia Cyber Security Strategy 2020-2024. Malaysia Cyber Security.
Nyst, C. (2016). Travel guide to the digital world: Cybersecurity policy for human rights defenders.
Pajuste, T., Čerkić, Š. M., Badurova, B., & Powell, C. (2022). Specific threats to human rights protection from the digital reality: International responses and recommendations.
Singh, D. (2023). Cybersecurity and human rights: A complex interplay. International Journal of Science and Research (IJSR), 12(6), 1110–1112. https://doi.org/10.21275/sr23608234858
The Government of Japan. (2010). The Government of Japan. https://doi.org/10.4324/9780203841648
TIB. (2023). Prothom Alo. (Analysis on public trust concerns regarding Bangladesh’s Cyber Security Act 2023).