Alassim, M., Alfayad, M., & Abbott-Halpin, E. F. (2017). Understanding Factors Influencing E-Government Implementation in Saudi Arabia from an Organizational Perspective. InternationalJournalofInformationandCommunicationEngineering, 11(7). http://eprints.leedsbeckett.ac.uk/id/eprint/4323/
AlBar, A. M., & Hoque, Md. R. (2019). Factors affecting the adoption of information and communication technology in small and medium enterprises: A perspective from rural Saudi Arabia. InformationTechnologyforDevelopment, 25(4), 715–738. https://doi.org/10.1080/02681102.2017.1390437
Albugami, S., & Ahmed, V. (2015). Success Factors for ICT Implementation in Saudi Secondary Schools: From the Perspective of ICT Directors, Head Teachers, Teachers and Students. InternationalJournalofEducationandDevelopmentUsingInformationandCommunicationTechnology, 11(1), 36–54.
Al-Maliki, S. (2013). InformationandCommunicationTechnology (ICT) InvestmentintheKingdomofSaudiArabia: AssessingStrengthsandWeaknesses.
Almarhabi, K. (2016). Adherence to ICT Security and Privacy Policies in Saudi Arabia. InternationalJournalofComputerApplications, 147(4), 13–18.
Alsowailm, F., Spidalieri, F., & Hathaway, M. (n.d.). KINGDOMOFSAUDIARABIACYBERREADINESSATAGLANCE. https://www.belfercenter.org/sites/default/files/files/publication/cri-2.0-ksa.pdf
Barlow, J. P. (2016, January 20). A Declaration of the Independence of Cyberspace. Electronic Frontier Foundation. https://www.eff.org/cyberspace-independence
Betz, D., & Stevens, T. (2011). Cyberspace and the state.
Black, I., & editor, M. E. (2009, June 30). Saudia Arabia leads Arab regimes in internet censorship. The Guardian. https://www.theguardian.com/world/2009/jun/30/internet-censorship-arab-regimes
Boothby, W. H. (2014). Conflict law: The influence of new weapons technology, human rights and emerging actors. Springer.
Chertoff, M., Simon, T., & Innovation, C. for I. G. (2015). The Impact of the Dark Web on Internet Governance and Cyber Security. Centre for International Governance Innovation.
Choucri, N. (2012). Cyberpolitics in international relations. MIT Press.
Connell, N. (n.d.). Saudi Arabia’s draft Cloud Cybersecurity Controls—Al Tamimi & Company—Lexology. Retrieved January 15, 2021, from https://www.lexology.com/library/detail.aspx?g=7e35491b-6ab0-40c6-8d10-26351fb2bc37
Cornish, P. (2015). Governing Cyberspace through Constructive Ambiguity. Survival, 57. https://doi.org/10.1080/00396338.2015.1046230
Cukier, K. N., & Mayer-Schönberger, V. (2013). The rise of big data. 92.
Deibert, Ron. (2015). The Geopolitics of Cyberspace After Snowden. Current History (New York, N.Y.: 1941), 114, 9–15. https://doi.org/10.1525/curh.2015.114.768.9
Deibert, Ronald, & Crete-Nishihata, M. (2012). Global Governance and the Spread of Cyberspace Controls. Global Governance: A Review of Multilateralism and International Organizations, 18, 339–361. https://doi.org/10.1163/19426720-01803006
Demchak, C. C., & Dombrowski, P. J. (2014). Rise of a Cybered Westphalian Age: The Coming Decades. In M. Mayer, M. Carpes, & R. Knoblich (Eds.), The Global Politics of Science and Technology—Vol. 1: Concepts from International Relations and Other Disciplines (pp. 91–113). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-55007-2_5
Demidov, O. (2014). ICT in the Brics Agenda Before The 2015 Summit: Installing the Missing Pillar? Security Index: A Russian Journal on International Security, 20, 127–132. https://doi.org/10.1080/19934270.2014.965968
DeNardis, L. (2014). The global war for internet governance. Proceedings of the 2014 ACM Conference on Web Science - WebSci ’14, 3–3. https://doi.org/10.1145/2615569.2618146
Developing National Information Security Strategy for the Kingdom of Saudi Arabia. (n.d.). https://www.itu.int/en/ITU-D/Cybersecurity/Documents/National_Strategies_Repository/SaudiArabia_NISS_Draft_7_EN.pdf
Dilipraj, E. (2014). NTERNET GOVERNANCE : THE SHIFT FROMMONOPOLY TO MULTI-PARTY. Centre for Air Power Studies. http://capsindia.org/files/documents/CAPS_IB_15-MAY-2014.pdf
Dunn Cavelty, M. (2014). Breaking the Cyber-Security Dilemma: Aligning Security Needs and Removing Vulnerabilities. Science and Engineering Ethics, 20(3), 701–715. https://doi.org/10.1007/s11948-014-9551-y
Ebert, H., & Maurer, T. (2013). Contested Cyberspace and Rising Powers. Third World Quarterly, 34(6), 1054–1074. https://doi.org/10.1080/01436597.2013.802502
Emerson, R. G. (2016). Limits to a cyber-threat. Contemporary Politics, 22(2), 178–196. https://doi.org/10.1080/13569775.2016.1153284
Finkelstein, L. (1995). What Is Global Governance? GLOBAL GOVERNANCE,1,367–37 https://doi.org/10.1163/19426720-001-03-90000007
ITU: Committed to connecting the world. (n.d.). Retrieved January 5, 2021, from https://www.itu.int/en/Pages/default.aspx
Jayawardane, S., Larik, E., & Jackson, E. (2015). Cyber Governance: Challenges, Solutions, and Lessons for Effective Global Governance. The Hague Institute for Global Justice Policy Brief.
Kremer, J.-F., & Müller, B. (Eds.). (2014). Cyberspace and International Relations: Theory, Prospects and Challenges. Springer-Verlag. https://doi.org/10.1007/978-3-642-37481-4
Land-Pejoska, A., & Rehman, Z. U. (n.d.). Cyberabia. Retrieved January 15, 2021, from https://www.tamimi.com/law-update-articles/cyberabia-developments-in-the-cybersecurity-regulatory-landscape-in-saudi-arabia/
Lewis, J. (2010). Cybersecurity: Next steps to protect critical infrastructure, testimony to the US Senate Committee on commerce, science and transportation. https://www.govinfo.gov/content/pkg/CHRG-111shrg57888/html/CHRG-111shrg57888.htm
Liaropoulos, A. (2015). A Human-Centric Approach to Cybersecurity: Securing the Human in the Era of Cyberphobia, Journal of Information Warfare, 14, 4 (2015). Journal of Information Warfare, 14.
Liaropoulos, A. N. (2016). Reconceptualising Cyber Security: Safeguarding Human Rights in the Era of Cyber Surveillance. International Journal of Cyber Warfare and Terrorism, 6(2), 32–40. https://doi.org/10.4018/IJCWT.2016040103
Malki, Z. (2015). Analyzing the Internet Filtering Policies in KSA and USA. International Journal of Science, Technology and Society, 3(3), 83. https://doi.org/10.11648/j.ijsts.20150303.13
Middle East Internet Stats and Telecommunications Reports. (n.d.). Retrieved December 30, 2020, from https://www.internetworldstats.com/middle.htm
Mihr, A. (2014). Good Cyber Governance: The Human Rights and Multi-Stakeholder Approach. Georgetown Journal of International Affairs, 24–34.
Ministry of Communications and Information Technology. (n.d.). https://www.mcit.gov.sa/
National Cybersecurity Authority. (2020, October 31). National Cybersecurity Authority (Saudi Arabia). https://nca.gov.sa/
NCDC Signing Platform. (n.d.). Retrieved January 5, 2021, from https://www.ncdc.gov.sa/
Nocetti, J. (2015). Contest and conquest: Russia and global internet governance. International Affairs, 91(1), 111–130. https://doi.org/10.1111/1468-2346.12189
Nye, J. S., & Donahue, J. D. (Eds.). (2000). Governance in a globalizing world. Visions of Governance for the 21st Century ; Brookings Institution Press.
Paterson, M., Rosenau, J., & Czempiel, E.-O. (1992). Governance without Government: Order and Change in World Politics. International Affairs (Royal Institute of International Affairs 1944-), 68, 733. https://doi.org/10.2307/2622748
Patrick, S. (2014). The Unruled World The Case for Good Enough Global Governance. Foreign Affairs (Council on Foreign Relations), 93, 58-+.
Pohle, J. (n.d.). Multistakeholderism unmasked: How the netmundial initiative shifts battle-grounds in internet governance. Global Policy. Retrieved January 5, 2015, from Multistakeholderism unmasked: How the NetMundial Initiative shifts battlegrounds in internet governance
Rahimi, N., & Gupta, B. (2020). A Study of the Landscape of Internet Censorship and Anti-Censorship in Middle East. EPiC Series, 69, 60–68. https://easychair.org/publications/open/6hvn
Rosenau, J. (1995). Governance in the Twenty-first Century. Global Governance, 1, 13–43. https://doi.org/10.1163/19426720-001-01-90000004
Saudi Arabia | OpenNet Initiative. (n.d.). Retrieved December 30, 2020, from https://opennet.net/research/profiles/saudi-arabia
Slack, C. (2016). Wired yet Disconnected: The Governance of International Cyber Relations. Global Policy, 7(1), 69–78. https://doi.org/10.1111/1758-5899.12268
Vision2030. (n.d.). The Owner of This Website (Www.Vision2030.Gov.Sa) Has Banned the Country or Region Your IP Address Is in (IR) from Accessing This Website. Retrieved December 30, 2020, from http://www.vision2030.gov.sa/
Weber, R. H. (2013). Internet of things – Governance quo vadis? Computer Law & Security Review, 29(4), 341–347. https://doi.org/10.1016/j.clsr.2013.05.010
Weitzenboeck, E. M. (2014). Hybrid net: The regulatory framework of ICANN and the DNS. International Journal of Law and Information Technology, 22(1), 49–73. https://doi.org/10.1093/ijlit/eat016
West, S. (2014). Globalizing Internet Governance: Negotiating Cyberspace Agreements in the Post-Snowden Era. SSRN Electronic Journal. https://doi.org/10.2139/ssrn.2418762
Zittrain, J., & Edelman, B. (n.d.). Documentation of Internet Filtering in Saudi Arabia. Retrieved January 15, 2021, from https://cyber.harvard.edu/filtering/saudiarabia/