1. Bahaudin, N. H, & Haqimi, M. A. (2022, March 30). Ancaman keselamatan siber semakin serius. My Metro. https://www.hmetro.com.my/mutakhir/2022/03/826613/ancaman-keselamatan-siber-semakin-serius
2. Bansal, M. (2018). An Overview of Cyber Security in Malaysia. Journal of Emerging Technologies and Innovative Research (JETIR), 5(8). https://www.jetir.org/papers/JETIRFF06020.pdf
3. Bernama. (2022, August 5). 11,367 kes jenayah siber dari Januari hingga Julai tahun ini. https://www.astroawani.com/berita-malaysia/11367-kes-jenayah-siber-dari-januari-hingga-julai-tahun-ini-polis-374682
4. Bernama. (2022, June 7). Malaysia catat 57.8 juta serangan virus siber pada suku pertama. https://www.astroawani.com/berita-malaysia/malaysia-catat-578-juta-serangan-virus-siber-pada-suku-pertama-fortinet-365120
5. BH Online. (2021, June 28). Keselamatan siber lengkapi usaha memacu pertumbuhan ekonomi. https://www.bharian.com.my/berita/nasional/2021/06/832966/keselamatan-siber-lengkapi-usaha-memacu-pertumbuhan-ekonomi-muhyiddin
6. BH Online. (2021, May 23). Malaysia siap siaga hadapi ancaman siber. https://www.bharian.com.my/berita/nasional/2021/05/819815/malaysia-siap-siaga-hadapi-ancaman-siber
7. Burton, J. (2013). Small states and cyber security: The case of New Zealand. Political Science, 65(2), 216-238. https://doi.org/10.1177/0032318713508491
8. Dioubate, B. M., Daud, W., & Norhayate, W. (2022). Cyber security risk management frameworks implementation in Malaysian Higher Education Institutions. International Journal of Academic Research in Business and Social Sciences, 12(4), 1356–1371. DOI: 10.6007/IJARBSS/v12-i4/12300
9. E. Ite, U. (2004). Multinationals and corporate social responsibility in developing countries: a case study of Nigeria. Corporate Social Responsibility and Environmental Management, 11(1), 1-11. https://doi.org/10.1002/csr.49
10. Fuad, N. S. M., Daud, M., & Yusof, A. R. M. (2022). Memahami Jenayah Siber Dan Keselamatan Siber Di Malaysia: Suatu Pemerhatian Terhadap Pandangan Sarjana Dan Intelektual: Understanding Cybercrime and Cybersecurity in Malaysia: An Observation from The Perspective of Scholars and Intellectuals. Asian Journal of Environment, History and Heritage, 6(1), 11-26. https://spaj.ukm.my/ajehh/index.php/ajehh/article/view/184
11. Ganesin, A., Supayah, L., & Ibrahim, J. (2016). An overview of cyber security in Malaysia. Kuwait Chapter of the Arabian Journal of Business and Management Review, 6(4), 12-20. https://platform.almanhal.com/Files/Articles/101388
12. Hamzah, A. (2004). Kaedah Kualitatif Dalam Penyelidikan Sosiobudaya: Qualitative Methods in Sociocultural Research. Jurnal Pengajian Media Malaysia, 6(1), 1-10. https://sare.um.edu.my/index.php/JPMM/article/view/32755
13. Hasnan, H. A. (2019, April 3). Ancaman siber: NACSA bakal keluarkan Strategi Keselamatan Siber Negara. Astro Awani. https://www.astroawani.com/berita-malaysia/ancaman-siber-nacsa-bakal-keluarkan-strategi-keselamatan-siber-negara-203081
14. Ismail, I. S. (2022, September 22). MKN kesan peningkatan ancaman serangan siber. BH Online. https://www.bharian.com.my/berita/nasional/2022/09/1003536/mkn-kesan-peningkatan-ancaman-serangan-siber
15. Jasmi, K. A. (2012). Metodologi pengumpulan data dalam penyelidikan kualitatitif. Kursus Penyelidikan Kualitatif Siri, 1(2012), 28-29. https://www.researchgate.net/profile/Kamarul-Azmi-Jasmi/publication/293097563_Metodologi_Pengumpulan_Data_dalam_Penyelidikan_Kualitatitif/links/5c0234e0a6fdcc1b8d4d2e10/Metodologi-Pengumpulan-Data-dalam-Penyelidikan-Kualitatitif.pdf
16. Krishnan, D. Bala. (2021, January 26). Brace for possible cyber-attack, govt agencies told. New Straits Time. https://www.nst.com.my/news/nation/2021/01/660733/brace-possible-cyber-attack-govt-agencies-told
17. Lai, R., & Rahman, S. S. (2012). Analytic of China Cyberattack. The International Journal of Multimedia & Its Applications (IJMA), 4(3), 37-56. https://doi.org/10.5121/ijma.2012.4304
18. Lehto, M., & Limnell, J. (2021). Strategic leadership in cyber security, case Finland. Information Security Journal: A Global Perspective, 30(3), 139-148. https://doi.org/10.1080/19393555.2020.1813851
19. Liff, A. P. (2018). Japan’s national security council: policy coordination and political power. Japanese Studies, 38(2), 253-279. https://doi.org/10.1080/10371397.2018.1503926
20. Lilli, E. (2020). President Obama and US cyber security policy. Journal of Cyber Policy, 5(2), 265-284. https://doi.org/10.1080/23738871.2020.1778759
21. Mat, B., Pero, S. D. M., Wahid, R., & Shuib, M. S. (2020). Cyber Security Threats to Malaysia: A Small State Security Discourse. Sustaining Global Strategic Partnership in the Age of Uncertainties, 5(6), 31.https://www.researchgate.net/publication/349881373_Cyber_Security_Threats_to_Malaysia_A_Small_State_Security_Discourse
22. Matsubara, M. (2014). Countering cyber-espionage and sabotage: the next steps for Japanese–UK cyber-security co-operation. The RUSI Journal, 159(1), 86-93. https://doi.org/10.1080/03071847.2014.895263
23. Medcalf, R. (2017). Imagining an Indian National Security Strategy: the sum of its parts. Australian Journal of International Affairs, 71(5), 516-528. https://doi.org/10.1080/10357718.2017.1342762
24. NSC Official Website. (2022, May 11). Keselamatan Siber: Bahaya ‘Espionage’. https://www.NSC.gov.my/web/ms/2022/05/11/keselamatan-siber-bahaya-espionage/
25. Omar, S. Z., Kovalan, K., & Bolong, J. (2021). Effect of age on information security awareness level among young Internet users in Malaysia. International Journal of Academic Research in Business and Social Sciences, 11(19), 245-255. https://doi.org/10.6007/ijarbss/v11-i19/11733
26. Park, J., & Chung, E. (2021). Learning from past pandemic governance: Early response and Public-Private Partnerships in testing of COVID-19 in South Korea. World Development, 137, 105198. https://doi.org/10.1016/j.worlddev.2020.105198
27. Rosli, F. A. (2020, May 26). Enam langkah 'lawan' jenayah siber. Berita Harian. https://www.bharian.com.my/berita/nasional/2020/05/692956/enam-langkah-lawan-jenayah-siber
28. Smith, F., & Ingram, G. (2017). Organising cyber security in Australia and beyond. Australian Journal of International Affairs, 71(6), 642-660. https://doi.org/10.1080/10357718.2017.1320972
29. Stevens, T., & O’Brien, K. (2019). Brexit and cyber security. The RUSI Journal, 164(3), 22-30. https://doi.org/10.1080/03071847.2019.1643256
30. Suhaimi, F. (2020, November 4). RM1.8 bilion diperuntukkan, rangka Strategi Keselamatan Siber atasi jenayah siber. Astro Awani. https://www.astroawani.com/berita-malaysia/rm18-bilion-diperuntukkan-rangka-strategi-keselamatan-siber-atasi-jenayah-siber-saifuddin-266683
31. Zahri, Y., Ab Hamid, R. S., & Mustaffa, A. (2017). Cyber security situational awareness among students: a case study in Malaysia. International Journal of Educational and Pedagogical Sciences, 11(7), 1704-1710. https://doi.org/10.5281/zenodo.1131053
32. Zaini, A. H. (2020). Keberkesanan koordinasi agensi kerajaan dan isu pemerdagangan orang: Kajian empirik organisasi jenayah terancang dalam industri eksploitasi seksual [Master's thesis, National University of Malaysia].
33. Zajko, M. (2015). Canada’s cyber security and the changing threat landscape. Critical Studies on Security, 3(2), 147-161. https://doi.org/10.1080/21624887.2015.1071165