9. List of sources used

1.     ANGWIN, Julia. Meet the Online Tracking Device That is Virtually Impossible to block. [online]. [cit.10/06/2016].

2.     BARLOW, Perry John. A Declaration of the Independence of Cyberspace. [online]. [cit.23/09/2014]. Available from: https://www.eff.org/cyberspace-independence

3.     CAETANO, Lianne. Are Your Apps Oversharing? 2014 Mobile Security Report Tells All. [online]. [cit.10/04/2015]. Available from: https://blogs.mcafee.com/consumer/mobile-security-report-2014/

4.     ČÍŽEK, Jakub. Chytré televizory nás monitorují. Smiřte se s tím. [online]. [cit.09/08/2015]. Available from: http://www.zive.cz/clanky/chytre-televize-nas-monitoruji-smirte-se-s-tim/sc-3-a-171676/default.aspx

5.     CNN on pedophile sex in Second Life. [online]. [cit.18/06/2009]. Available from: http://www.youtube.com/watch?v=AQM-SiiaipE

6.     Current World Population. [online]. [cit.10/08/2015]. Available from: http://www.worldometers.info/world-population/

7.     See also: Interesting Statistics On Mobile Strategies for Digital Transformations. [online]. [cit.15/07/2016]. Available from: http://www.smacnews.com/digital/interesting-statistics-on-mobile-strategies-for-digital-transformations/

8.     Data retention unconstitutional in its present form. [online]. [cit.16/07/2016]. Available from: https://www.bundesverfassungsgericht.de/SharedDocs/Pressemitteilungen/EN/2010/bvg10-011.html?nn=5404690

9.     Delokalizace právních vztahů na internetu [online]. [cit.15/04/2012]. Available from: http://is.muni.cz/do/1499/el/estud/praf/js09/kolize/web/index.html

10.   Digital, Social & Mobile Worldwide in 2015. [online]. [cit.09/08/2015]. Available from: http://www.slideshare.net/wearesocialsg/digital-social-mobile-in-2015?ref=http://wearesocial.net/blog/2015/01/digital-social-mobile-worldwide-2015/

11.   ENGLEHARDT, Steven and Ardvin NARAYANAN. Online tracking: A 1-million-site measurement and analysis. [online]. [cit.05/08/2016]. Available from: http://randomwalker.info/publications/OpenWPM_1_million_site_tracking_measurement.pdf

12.   Facebook will soon be able to ID you in any photo. [online]. [cit.09/08/2015]. Available from: http://news.sciencemag.org/social-sciences/2015/02/facebook-will-soon-be-able-id-you-any-photo

13.   FBI Exploits Flash Vulnerability to Breach Tor Network Security. [online]. [cit.23/07/2016]. Available from: https://nordvpn.com/blog/fbi-exploits-flash-vulnerability-to-breach-tor-network-security/

14.   First Amendment. [online]. [cit.10/07/2016]. Available from: https://www.law.cornell.edu/constitution/first_amendment

15.   German Bundestag Passes New Data Retention Law. [online]. [cit.16/07/2016]. Available from: http://www.gppi.net/publications/global-internet-politics/article/german-bundestag-passes-new-data-retention-law/

16.   GREENFIELD, David. Integrovaná bezpečnost: Už nastal její čas? [online]. [cit. 01/03/2018]. Available from: http://www.controlengcesko.com/hlavni-menu/artykuly/artykul/article/integrovana-bezpecnost-uz-nastal-jeji-cas/

17.   HAINES, Lester. Online gamer stabbed over “stolen” cybersword. [online]. [cit.03/10/2006]. Available from: http://www.theregister.co.uk/2005/03/30/online_gaming_death/ 

18.   http://news.bbc.co.uk/2/hi/technology/6638331.stm

19.   http://www.austlii.edu.au/au/cases/cth/HCA/2002/56.html

20.   HUSOVEC, Martin. Zodpovednosť na Internete podľa českého a slovenského práva. Prague: CZ.NIC, 2014. ISBN: 978-80-904248-8-3, pp. 101–102.

21.   Internet censorship. [online]. [cit.10/08/2016]. Available from: http://www.deliveringdata.com/2010_10_01_archive.html

22.   Internet History of 1980s. [online]. [cit. 07/06/2016]. Available from: http://www.computerhistory.org/internethistory/1980s/

23.   Internet, připojení k němu a možný rozvoj (Část 2 – Historie a vývoj Internetu). [online]. [cit.10/02/2008]. Available from: http://www.internetprovsechny.cz/clanek.php?cid=163

24.   JOHNSON, David R. and David POST. The Rise of Law in Cyberspace. [online]. [cit.10/07/2016]. Available from: http://poseidon01.ssrn.com/delivery.php?ID=797101088103069021099122095084084095061040041017050027018013071117008115007025117112101013061121056036119084118089028085067043023001058093120070084069085089012000019127120091078115090125017120030014000101095031109003094069069113114112102&EXT=pdf

25.   KODET, Jaroslav. Kybernetický zákon: Využijte naplno open source nástroje. [online]. [cit. 25/04/2018]. Available from: https://www.nic.cz/files/nic/doc/Securityworld_CSIRTCZ_112015.pdf

26.   KOLOUCH, Jan and Andrea KROPÁČOVÁ. Liability for Own Device and Data and Applications Stored therein. In: Advances in Information Science and Applications Volume I: Proceedings of the 18th International Conference on Computers (part of CSCC ’14). [B.m.], c2014, pp. 321–324. Recent Advances in Computer Engineering Series, 22. ISBN  978-1-61804-236-1 ISSN 1790-5109.

27.   KOLOUCH, Jan and Petr VOLEVECKÝ. Trestněprávní ochrana před kybernetickou kriminalitou. Prague: Police Academy of the Czech Republic in Prague, 2013, p. 65

28.   KOLOUCH, Jan. CyberCrime. Prague: CZ.NIC, 2016, p. 78 et seq. and p. 109 et seq.

29.   KOLOUCH, Jan. Pseudoanonymita – bezpečnostní riziko pro uživatele Internetu. DSM – data security management [online]. 2015. Vol. 19, No. 3, pp. 24–29 ISSN 1211-8737. Available from: http://www.tate.cz/cz/casopis/clanek/dsm-2015-3-456/

30.   Leading social networks worldwide as of April 2016, ranked by number of active users (in millions) [online]. [cit.10/08/2015]. Available from: http://www.statista.com/statistics/272014/global-social-networks-ranked-by-number-of-users/

31.   LESSIG, Lawrence. Code v. 2. p. 6 Available in full (Eng) [online]. [cit.13/03/2008]. Available from: http://pdf.codev2.cc/Lessig-Codev2.pdf

32.   MAISNER, Martin and Barbora VLACHOVÁ. Zákon o kybernetické bezpečnosti. Komentář. Prague: Wolters Kluwer, 2015. p. 85

33.    MATEJKA, Ján. Internet jako objekt práva: hledání rovnováhy autonomie a soukromí. Prague: CZ.NIC, 2013. ISBN 978-80-904248-7-6 p. 25

34.   National legal challenges to the Data Retention Directive. [online]. [cit.16/07/2016]. Available from: https://eulawanalysis.blogspot.cz/2014/04/national-legal-challenges-to-data.html

35.   Největší sociální sítě na světě? Facebook je sice jednička, ale… [online]. [cit.10/08/2015]. Available from: http://www.lupa.cz/clanky/nejvetsi-socialni-site-na-svete-facebook-je-sice-jednicka-ale/

36.   PDCA cycle. [online]. [cit. 06/07/2018]. Available from: https://www.creativesafetysupply.com/glossary/pdca-cycle/

37.   PETERKA, Jiří. Uchovávat provozní a lokalizační údaje nám už EU nenařizuje. My to v tom ale pokračujeme. [online]. [cit. 10/11/2015]. Available from: http://www.earchiv.cz/b14/b0428001.php3

38.    POLČÁK, Radim. Právo na internetu. Spam a odpovědnost ISP. Brno: Computer Press, 2007, p. 7

39.   POŽÁR, Josef and Luděk NOVÁK. Pracovní příručka bezpečnostního manažera. Prague: AFCEA, 2011. ISBN 978-80-7251-364-2, p. 5, or: POŽÁR, Josef and Luděk NOVÁK. Systém řízení informační bezpečnosti. [online]. [cit. 06/07/2018]. Available from: https://www.cybersecurity.cz/data/srib.pdf p. 1

40.   REED, Chris. Internet Law. Cambridge: Cambridge University Press, 2004, p. 218

41.   Regional internet registries. [online]. [cit.04/08/2015]. Available from: https://www.nro.net/about-the-nro/regional-internet-registries

42.   ROSER, Christoph. The Many Flavors of the PDCA. [online]. [cit. 06/07/2018]. Available from: https://www.allaboutlean.com/pdca-variants/

43.   ŠKORNIČKOVÁ, Eva. Jednoduchý test: Jak jste na tom s přípravou na GDPR? [online]. [cit. 10/11/2017]. Available from:  https://www.gdpr.cz/blog/jednoduchy-test-jak-jste-na-tom-s-pripravou-na-gdpr/

44.   SMEJKAL, Vladimír. Internet a §§§. 2nd updat. and ext. ed. Prague: Grada, 2001, p. 32

45.  SMITH, Craig. By the Numbers: 100 Amazing Google Search Statistics and Facts. [online]. [cit. 04/08/2016]. Available from: http://expandedramblings.com/index.php/by-the-numbers-a-gigantic-list-of-google-stats-and-facts/

46.   The Court of Justice of the European Union. Press release No. 54/14, dated 8 April 2014. Judgment in joined cases C-293/12 and C-594/12. [online]. [cited 15/07/2016]. Available from: http://curia.europa.eu/jcms/upload/docs/application/pdf/2014-04/cp140054cs.pdf

47.   SPITZER, Manfred. Digitátlní demence. Brno: Host, 2014. ISBN 978-80-7294-872-7

48.   Opinion of Advocate General Pedro Cruz Villalón. Case C-293/12 and C-594/12. [online]. [cit.15/07/2016]. Available from: http://curia.europa.eu/juris/document/document.jsf?text=&docid=145562&pageIndex=0&doclang=CS&mode=req&dir=&occ=first&part=1&cid=727954

49.   Opinion of the Advocate General SAUGMANDSGAARD ØE, from 19/07/2016. In joined cases C-203/15 and C-698/15. [online]. [cited 10/8/2016]. Available from: http://curia.europa.eu/juris/document/document.jsf?text=&docid=181841&pageIndex=0&doclang=EN&mode=req&dir=&occ=first&part=1&cid=111650 

50.   ŠTOČEK, Milan. V Hitlerově duchu proti Hitlerovi. [online]. [cit.10/07/2016]. Available from: http://www.euro.cz/byznys/v-hitlerove-duchu-proti-hitlerovi-814325

51.   Surface Web, Deep Web, Dark Web – What’s the Difference. [online]. [cit. 20/07/2016]. Available from: https://www.cambiaresearch.com/articles/85/surface-web-deep-web-dark-web----whats-the-difference

52.   The dark Web explained. [online]. [cit. 20/07/2016]. Available from: https://www.yahoo.com/katiecouric/now-i-get-it-the-dark-web-explained-214431034.html

53.   The fragmentation of Android has new records: 24 000 different devices. [online]. [cit.15/07/2016]. Available from: http://appleapple.top/the-fragmentation-of-android-has-new-records-24-000-different-devices/ 

54.   The very first mobile malware: how Kaspersky Lab discovered Cabir. [online]. [cit.01/08/2016]. Available from: http://www.kaspersky.com/about/news/virus/2014/The-very-first-mobile-malware-how-Kaspersky-Lab-discovered-Cabir

55.   THOMAS, Douglas. Criminality on the Electronic Frontier. In Cybercrime. London: Routledge, 2003, p. 17 et seq.

56.   Tor security advisory: ”relay early” traffic confirmation attack. [online]. [cit.23/07/2016]. Available from:https://blog.torproject.org/blog/tor-security-advisory-relay-early-traffic-confirmation-attack

57.   TRADOC. Cyberspace Operations: Concept Capability Plan 2016–2028. [online]. [cit. 18/02/2018], pp. 8–9 Available from: www.fas.org/irp/doddir/army/pam525-7-8.pdf?

58.   VOŽENÍLEK, David. Promazání „sušenek“ nepomůže, na internetu vás prozradí i baterie. [online]. [cit.04/08/2016]. Available from: http://mobil.idnes.cz/sledovani-telefonu-na-internetu-stav-baterie-faz-/mob_tech.aspx?c=A160802_142126_sw_internet_dvz

59.   World Internet Users and 2015 Population Stats. [online]. [cit.09/08/2015]. Available from: http://www.internetworldstats.com/stats.htm

60.   Zlepšování zabezpečení, ochrana soukromí a vytváření jednoduchých nástrojů, které vám dávají možnost kontroly a výběru, je pro nás velmi důležité. [online]. [cit.04/04/2014]. Available from: https://www.google.cz/intl/cs/policies/?fg=1