1. Allen, C. (2016). The path to self-sovereign identity. https://github.com/WebOfTrustInfo/self-sovereign-identity/blob/master/ThePathToSelf-SovereignIdentity.md
2. Bazarhanova, A., Lindman, J., Magnusson, J., Nilsson, A., & Chou, E. (2019). Blockchain-based electronic identification: Cross-country comparison of six design choices. In Proceedings of the 27th European Conference on Information Systems (ECIS). https://aisel.aisnet.org/ecis2019_rp/79
3. Cheesman, M., & Slavin, A. (2021). Self-sovereign identity and forced migration: Slippery terms and the refugee data apparatus. In E. E. Korkmaz (Ed.), Digital identity, virtual borders and social media (pp. 10–32). Edward Elgar Publishing. https://doi.org/10.4337/9781789909159.00006
4. Christl, W., & Spiekermann, S. (2016). Networks of control: A report on corporate surveillance, digital tracking, big data & privacy. Facultas. https://crackedlabs.org/dl/Christl_Spiekermann_Networks_Of_Control.pdf
5. Clifford, D., & Ausloos, J. (2017). Data protection and the role of fairness (CiTiP Working Paper). KU Leuven Centre for IT & IP Law.