1. Brenner, S. W. (2006). At light speed: Attribution and response to cybercrime/terrorism/warfare. The Journal of Criminal Law & Criminology, 97(2), 379–475.
2. Caragliano, D. A. (2013). Real names and responsible speech: The cases of South Korea, China and facebook. Yale Journal of International Affairs. https://www.yalejournal.org/publications/real-names-and-responsible-speech-the-cases-of-south-korea-china-and-facebook
3. Caral, J. (2004). Lessons from ICANN: Is self-regulation of the Internet fundamentally flawed? International Journal of Law and Information Technology, 12(1), 1–31. https://doi.org/10.1093/ijlit/12.1.1
4. Cloudfare. (2024). How to prevent DDoS attacks. Methods and tools. Cloudfare. https://www.cloudflare.com/learning/ddos/how-to-prevent-ddos-attacks/
5. CyberSecurity Malaysia. (2023). Mid-year report threat landscape 2023. CyberSecurity Malaysia. https://www.cybersecurity.my/data/content_files/26/2511.pdf
6. Donna L. B. (1998). Malaysia’s “Computer Crimes Act 1997” gets tough on cybercrime but fails to advance the development of cyberlaws. Pacific Rim Law and Policy, 7(2), 26.
7. Duryana Mohamed. (2012). Investigating cybercrimes under the Malaysian cyberlaws and the criminal procedure code: Issues and challenges. Malayan Law Journal, 6, i--ix. http://irep.iium.edu.my/27926/
8. Duryana Mohamed. (2013). Combating the threats of cybercrimes in Malaysia: The efforts, the cyberlaws and the traditional laws. Computer Law & Security Review, 29(1), 66–76. https://doi.org/10.1016/J.CLSR.2012.11.005
9. Dustin Volz, J. F. (2016, 24 Mac). U.S. indicts Iranians for hacking dozens of banks, New York dam. Reuters. https://jp.reuters.com/article/us-usa-iran-cyber-idUSKCN0WQ1JF
10. Freedom House. (2014). Freedom on the Net: Canada. https://freedomhouse.org/report/freedom-net/2014/canada
11. Freedom House. (2016). Freedom on the Net 2015. https://freedomhouse.org/sites/default/files/FOTN 2015 Full Report.pdf
12. Helmi Noman. (2013). Saudi Arabia to impose restrictions on online content production, including on YouTube. OpenNet Initiatives.https://opennet.net/blog/2013/12/saudi-arabia-impose-restrictions-online-content-production-including-youtube
13. Home Office UK Government. (2013). Cyber crime: A review of the evidence. Home Office UK Government. https://www.gov.uk/government/publications/cyber-crime-a-review-of-the-evidence
14. Interpol. (2021). National cybercrime strategy guidebook. Interpol. https://www.interpol.int/content/download/16455/file/Cyber Strategy Guidebook.pdf
15. Irene Tham, Rachel Au-Yong, Tin May Linn & Rodolfo Pazos. (2018). SingHealth cyber attack: How it unfolded. Strait Times. https://graphics.straitstimes.com/STI/STIMEDIA/Interactives/2018/07/sg-cyber-breach/index.html
16. Janaletchumi Appudurai & Chitra L. Ramalingam. (2007). Computer crimes: A case study of what Malaysia can learn from others? Journal of Digital Forensics, Security and Law, 2(2).
17. Joli-Coeur, F. (2014). Canada’s approach to intermediary liability for copyright infringement: The notice and notice procedure. Berkeley Technology Law Journal. http://btlj.org/2014/03/canadas-approach-to-intermediary-liability-for-copyright-infringement-the-notice-and-notice-procedure/
18. Mahyuddin Daud & Ida Madieha Abd Ghani Azmi. (2021). Digital disinformation and the need for Internet co-regulation in Malaysia. Pertanika Journal of Social Sciences and Humanities, 29(S2), 169–183. https://doi.org/10.47836/pjssh.29.s2.12
19. Mahyuddin Daud. (2021). Freedom of Misinformation and the relevance of co-regulation in Malaysia: A cross-jurisdictional analysis. IIUM Law Journal, 29(2), 27–54. https://doi.org/10.1016/j.clsr.2019.105373
20. Majlis Keselamatan Negara. (2024, 15 Mac). Deepfake dikesan semakin banyak digunakan dalam aktiviti penipuan. Majlis Keselamatan Negara. https://www.mkn.gov.my/web/ms/2024/03/15/deepfake-dikesan-semakin-banyak-digunakan-dalam-aktiviti-penipuan/
21. Malaysian Communications and Multimedia Commission. (2020). FAQs on online content problems. Malaysian Communications and Multimedia Commission. https://www.mcmc.gov.my/en/faqs/online-content-problems/what-are-the-steps-required-for-me-to-lodge-compla
22. Maleen Balqish Salleh. (2023, 17 Jun). PDRM: Over RM5.2 billion lost to scams in two years. The Edge. https://theedgemalaysia.com/article/pdrm-over-rm52-billion-lost-scams-two-years
23. Marsden, C., Meyer, T., & Brown, I. (2020). Platform values and democratic elections: How can the law regulate digital disinformation? Computer Law & Security Review, 36, 105373. https://doi.org/10.1016/j.clsr.2019.105373
24. Mohamad Rizal Abd Rahman. (2020). Online scammers and their mules in Malaysia. Jurnal Undang-undang dan Masyarakat, 26, 65–72. https://doi.org/10.17576/juum-2020-26-08
25. Nazli Ismail Nawang. (2017). Combating anonymous offenders in the cyberspace: An overview of the legal approach in Malaysia. International Conference on Anti-Cybercrime (ICACC). https://doi.org/10.1109/Anti-Cybercrime.2017.7905255
26. Nehaluddin Ahmad & Norulaziemah Zulkiffle. (2022). Jurisdiction issues in cyberspace: An overview in respect of Brunei and Malaysia Compared to the United States’ system. Journal of Southeast Asian Research, 1–12. https://doi.org/10.5171/2022.384427
27. Norton. (2021). 2021 Norton cyber safety insights report. Norton Life Locks. https://www.nortonlifelock.com/us/en/newsroom/press-kits/2021-norton-cyber-safety-insights-report/
28. Nurkhairina Noor Sureani, Atikah Shahira Awis Qurni, Ayman Haziqah Azman, Mohd Bahrin Othman & Hariz Sufi Zahari. (2021). The adequacy of data protection laws in protecting personal data in Malaysia. Malaysian Journal of Social Sciences and Humanities (MJSSH), 6(10), 488–495. https://doi.org/10.47405/mjssh.v6i10.1087
29. OpenNet Initiatives. (2012). ONI country profile: China. OpenNet Initiatives.
30. Prasad Jayabalan, Roslina Ibrahim & Azizah Manaf. (2014). Understanding cybercrime in Malaysia: An vverview. Sains Humanika, 2(2), 109–115. https://doi.org/10.11113/sh.v2n2.424
31. Wall, D. S.(2007). Cybercrime: The transformation of crime in the information age. https://ssrn.com/abstract=1066922
32. Wimmer, K., & Pogoriler, E. R. (2006). International Jurisdiction and the Internet. Covington & Burling LLP. http://euro.ecom.cmu.edu/program/law/08-732/Jurisdiction/InternationalJurisdiction.pdf