1Dunniela Kaufman, "Does Security Trump Tradeg.", Law & Business Review of the America, Vol. 13,2007, p. 624.
2Dan Philpott, Edward N. Zalta, eds. , The Stanford Encyclo- paedia of Philosophy, 2003, http:// plato, stanford, edu/archives/ sum2003/entries/sovereignty.
3Carol M. Celestine, " ' Cloudy' Skies, Bright Futures.'? In Defense of a Private Regulatory Scheme for Policing Cloud Computing", University oflllinois Journal of Law, Technology and Policy, Vol. 13, 20t3, pp. 144 - 145.
4Omer Tene, Jules Polonetsky, "Privacy in the Age of Big Data: A Time for Big Decisions", Stanford Law Review Online, Vol. 64, 2012, p.63.
5Kristina Irion, "Government Cloud Computing and National Data Sovereignty", Policy & lnternet, Vol. 4, 2012, pp. 42 -43.
6Adeno Addis, "The Thin State in Thick Globalism: Sover- eignty in the Information Age" , Vanderbilt Journal of Transnational Law, Vol. 37, 2004, pp. 24 - 45.
7P. De Filippi, S. McCarthy, "Cloud Computing : Centrali- zation and Data Sovereignty", European Journal of Law and Technolo- gy, VoL3, No. 2, 2012, p. 15.
8Christopher Rees, "Tomorrow's Privacy : Personal Information as Property", International Data Privacy Law, Vol. 3, No. 4, 2013, pp. 220 - 221.
9Bryar A. Garner, ed., Black's Law Dictionary, 1999, p. 1402.
10Carol M. Celestine," ' Cloudy' Skies, Bright Futures? In De- fense of a Private Regulatory Scheme for Policing Cloud Computing", University of Illinois Journal of Law, Technology and Policy, Vol. 13, 2013, p. 149.