- Aalipour, Hasan (2011), Information Technology Penal Law, Tehran, Khorsandi Publishing, First Printing. (Persian)
- Abuzari, Mehrnoush (1395) Criminology of Cyber Crimes, Tehran, Publishing Mizan, First Printing. (Persian)
- Aameli, saeed reza (2011) cyberspace, Tehran, Publishing Tehran University, First Printing. (Persian)
- Bocij, P. (2003). Victims of cyberstalking: An exploratory study of harassment perpetrated via the Internet. First Monday. Retrieved on 28th June, 2010, from http://131.193.153.231/www/issues/ issue8_10/
- BROADHURST, RODERIC AND JAYAWARDENA, KASUN (2011) Online Social Networking and Pedophilia: An Experimental Research “Sting” In: Cyber Criminology: Exploring Internet Crimes And Criminal Behavior, CRC Press.
- Citron, K. D. (2009). Cyber Civil Rights. Boston University Law Review. Vol. 89:61.
- Frith, Emily (2017) social media and children mental health: a review of the evidence, educational policy institute.
- darbandi Farahani, Elham (2012), The criminal approach to cybercrime, Master's Thesis for Criminal Law and Criminology, University of Moody.
- Haji deh abadi, mohammad ali, salami, ehsan (2016) Generalization of cybercrime, collection of articles international conference on: restorative justice & crime prevention, Tehran, publishing mizan. (Persian)
- Halder, D. And Jaishankar, K. (2010) Cyber Crime and Victimization of Women: Laws, Rights, and Regulations. Hershey, PA, USA: IGI Global.
- Herath, T, rao, H.r upadhyaya, s. (2012) internet crime: how vulnerable are you? Do gender social influence and education play a role in vulnerability? Psychology of cybercrime business science reference.
- Hindelang, M. J. Gottfredson, M. R. & Gaffalo, J. (1978). Victims of Personal Crime: An Empirical Foundation for a Theory of Personal Victimization. Cambridge, MA: Allinger.
- Holtfreter, k. M. D. reisig, and T.C. Pratt (2008) law self -control, routine activities, and fraud victimization, criminology and Criminal Justice, 46, 1.
- Javan jafari, abdoreza, shahideh, farhad (2013) The Role of Women Victims of Sex Crimes, Criminal Law Research, vol.7. (Persian)
- Kafashi, majeid. Pirjalili, Zahra. (2015) Spending Leisure Time in Women in Virtual Space (Tehran, 1394) Journal of Women and Society. Special Issue, pp.105-122. (Persian)
- Karmen, A. (2007) Crime Victims, an Introduction to Victimology. Wadsworth Publishing.
- Kordealivand, ruhdien, mohammadi, Mehdi, mirzaee, mohammad (2017) The typology of cybercrime in computer crime law, The first national cybercrime combating conference, Tehran, cyber police press. (Persian)
- Langos, Colette (2013) Cyberbullying, Associated Harm and the Criminal Law (PhD Thesis, University of South Australia, 2013), 55–60.
- McFarlane, L. & Bocij, P. (2005). An exploration of predatory behaviour in cyberspace: Towards a typology of cyber stalkers. First Monday, 8. Retrieved from http://fi rstmonday.org
- McQuade, S. C. (2006). Understanding and managing cybercrime. Boston, MA:
- Pearson/Allyn and Bacon.
- Marcum, Catherine, D. (2011), “Adolescent Online Victimization and Constructs of Routine Activities Theory”, In: Jaishankar, K. (Ed), Cyber Criminology: Exploring Internet Crimes and Criminal Behavior, CRC Press.
- Mitchell, K. Finkelhor, D. & Wolak. J. (2007). Youth internet users at risk for the more serious online sexual solicitations. American Journal of Preventive Medicine, 32.
- Mokhtari, Maryam & malek ahmadi, hakimeh, (2017) Pornography and hyper-reality, Culture strategy, vol.38. (Persian)
- Mustaine, E. And Tewksbury, R. (1998) Predicting Risks of Larceny Theft Victimization: A Routine Activity Analysis Using Refined Lifestyle Measures, Criminology, Vol. 36.
- SHICK CHOI, KYUNG (2011) Cyber-Routine Activities: Empirical Examination of Online Lifestyle, Digital Guardians, and Computer-Crime Victimization, Cyber Criminology: Exploring Internet Crimes And Criminal Behavior, CRC Press.
- Petrocelli, J. (2005). Cyber Stalking, Law & Order, Vol. 53, NO.12.
- Sadebeek, liave (2004). Internet ethnography: online and offline, international journal of qualitative method, vol,3, no.2
- Sanders, T. (2010). The sex industry, regulation and the internet. In Jewkes, Y. & Yar, M. (Eds.), Handbook of Internet crimes (pp. 302–319). Cullompton, UK: Willan.
- Van Wilsem, J. (2011) Worlds Tied Together? Online and Non-Domestic Routine Activities and Their Impact on Digital Threat Victimization, European Journal of Criminology, Sage.
- Williams, Matthew (2012), Virtual criminal: Crime, Deviation and Online Regulation, Translated by: Amir Hossein Jalali Farahani and Mahboubeh Monfared, Under the Supervision of Ali Hossein Najafi Ebrahbandadi, Tehran: Size, First Edition. (Persian)
- Willard, Nancy (2007), Cyberbullying and Cyberthreats: Responding to the Challenge of Online Social Aggression, Threats and Distress (Research Press, 2007),
- Yucedal, B. (2010) Victimization in Cyber Space: An Application of Routine Activity and Lifestyle Exposure Theories. Available In:
https://etd.ohiolink.edu/rws_etd/ document/ get/kent1279290984/inline
- Zararkh, Ehsan, (2010) Cyber Victims, Journal of Legislation and Strategy, No. 64. (Persian)