Al-Kadhi, M. A. (2011). Assessment of the Status of spam in the Kingdom of Saudi Arabia. Journal of King Saud University – Computer and Information Sciences, Vol. 23, No. 2, P. 50. doi:10.1016/j.jksuci.2011.05.001
American Nurses Association. (1991, October 22). Retired PositionStatement: Cultural Diversity in Nursing Practice.
Archuleta, K. S. & Steinfeld, L. (2006). Privacy Protection and Compliance in Higher Education: The Role of the CPO. EDUCAUSE Review, Vol. 41, No. 5, P. 68.
Basel Committee on Banking Supervision. (1998, March). Risk Management for Electronic Banking and Eectronic Money Activities.
Benkler, Y. (2000). From Consumers to Users: Shifting the Deeper Structures of Regulation Towards Sustainable Commons and User Access. Federal Communications Law Journal, Vol. 52, No. 3, Pp. 561-579.
Best, S. J. & Teske, P. (2002). Explaining State Internet Sales Taxation: New Economy, Old-Fashioned Interest Group Politics. State Politics & Policy Quarterly, Vol. 2, No. 1, Pp. 37-51.
European Central Bank. (2012). Virtual Currency Schemes. Frankfurt am Main: European Central Bank.
Girsberger, D. & Schramm, D. (2002). Cyber-Arbitration. European Business Organization Law Review, Vol. 3, No. 3, Pp. 611-628. doi:10.1017/S1566752900001075
Iosifidis, P. (2002). Digital Convergence: Challenges for European Regulation. Javnost - The Public, Vol. 9, No. 3, Pp. 27-47. doi:10.1080/13183222.2002.11008805
Kelly, B. (1999). The Evolution of web Protocols. Journal of Documentation, Vol. 55, No. 1, Pp.71 - 81. doi:10.1108/EUM0000000007138
Kling, R.; Lee, Y. C.; Teich, A. & Frankel, M. S. (1999). Assessing Anonymous Communication on the Internet: Policy Deliberations. The Information Society: An International Journal, Vol. 15, No. 2, Pp. 79-90. doi:10.1080/019722499128547
Lamberton, D. (1996). A Telecommunications Infrastructure is not an Information Infrastructure. Prometheus: Critical Studies in Innovation, Vol. 14, No. 1, Pp. 31-38. doi:10.1080/08109029608632014
Lanham Act 15 U.S.C. & 1127. (1988). Retrieved from, https://www.law.cornell.edu/uscode/text/15/1127
Manheim, K. M. & Solum, L. B. (2003). An Economic Analysis of Domain Name Policy. Hastings Communications and Entertainment Law Journal, Vol. 25, No. 3, Pp. 359-498.
Mell, P. & Grance, T. (2011). The NIST Definition of Cloud Computing. Gaithersburg, MD: Computer Security Division Information Technology Laboratory National Institute of Standards and Technology. doi:dx.doi.org/10.6028%2FNIST.SP.800-145
Meuller, M. L. (2004). Ruling the Root: Internet Governance and the Taming of Cyberspace. Massachusetts London, England: MIT Press Cambridge.
Mueller, M. L. (2010). Networks and States: The Global Politics of Internet Governance. MIT Press.
Natarajan, M. (2006). Use of online Technology for Multimedia Education. Information Services & Use, Vol. 26, No. 3, P. 250.
Nord, J. H. & Nord, G. D. (1995). MIS Research: Journal Status Assessment and Analysis. Information & Management, Vol. 29, No. 1, Pp. 29 - 42. doi:10.1016/0378-7206(95)00010-T
OECD. (2001). Understanding the Digital Divide. Paris: OECD Publishing. doi:10.1787/236405667766
Perset, K. (2010). The Economic and Social Role of Internet Intermediaries. Directorate for Science Technology and Industry. Paris: Organisation for Economic and Co-operation and Development DSTI/ICCP (2009) 9/ FINAL.
Psannis, K. E.; Xinogalos, S. & Sifaleras, A. (2014). Convergence of Internet of things and Mobile Cloud Computing. Systems Science & Control Engineering, Vol. 2, No. 1, Pp. 476-483. doi:10.1080/21642583.2014.913213
Pusey, P. & Sadera, W. A. (2011). Cyberethics, Cybersafety, and Cybersecurity. Journal of Digital Learning in Teacher Education, Vol. 28, No. 2, P. 82. doi:10.1080/21532974.2011.10784684
Rosenoer, J. (1997). CyberLaw: the law of the Internet (1st ed.). New York, Inc.: Springer-Verlag. doi: 0.1007/978-1-4612-4064-8
Ryan, S. M.; Plzak, R. A. & Curran, J. (2007). Legal and Policy Aspects of Internet Number Resources. Santa Clara High Technology Law Journal, Vol. 24, No. 2, Pp. 335-374.
Shirey, R. (2007). Internet Security Glossary, Version 2. Retrieved from https://www.ietf.org/rfc/rfc4949.txt
The Universal Declaration of Human Rights. (1948, December 10). United Nations. Retrieved from http://www.un.org/en/universal-Declaration-human-rights/
Walker, D. B. (1999). Privacy in the Digital Age: Encryption Policy-A Call for Congressional Action. Stanford Technology Law Review, 3, P. 12.
Wall, D. (2004). What are Cybercrimes? Criminal Justice Matters, Vol. 58, No. 1, Pp. 20-21. doi:10.1080/09627250408553239
WGIG (The Working Group on Internet Governance). (2005). Report of the Working Group on Internet Governance. Retrieved from, http://www.itu.int/wsis/docs2/
World Trade Organization (WTO). (1998). Work Programme on Electronic Commerce. Geneva.
Wu, T. (2003). Network Neutrality, Broadband Discrimination. Journal of Telecommunications and High Technology Law, Vol. 2, No .1, Pp. 141-176.