- ابوذری، مهرنوش (1391). جرمشناسی جرائم سایبری. پایاننامۀ کارشناسی ارشد به راهنمایی عباس شیری، دانشگاه تهران، دانشکده حقوق و علومسیاسی، گروه حقوق جزا و جرمشناسی.
- نجفی ابرندآبادی، علیحسین (1383). تقریرات درس جرمشناسی. مجموعه دو جلدی به کوشش شهرام ابراهیمی.
- نجفی ابرندآبادی، علیحسین (1388). دربارۀ بزهکاری و جرمشناسی سایبری (گفتگو)، مجلهتعالیحقوق، شماره 36، ص 1-7.
- نجفی ابرندآبادی، علیحسین (١٣٧٤). تقریراتبزهدیدهشناسی. دورۀ کارشناسی دانشگاه شهیدبهشتی. تنظیم فاطمه قناد.
- Back, Sinchul. (2016). Empirical Assessment of Cyber Harassment Victimization via Cyber-Routine Activities Theory. In BSU Master’s Theses and Projects. Item 30. Available at http://vc.bridgew.edu/theses/30.
- Baum, K.; Catalano, S.; Rand, M.; Rose, K. (2009). Stalking victimization in the United States. U.S. Department of Justice, Office of Justice Programs, Bureau of Justice Statistics.
- Bocij, P. & McFarlane, L. (2003a). Cyberstalking: The technology of hate. The Police Journal, 76: 204-221.
- Bocij, P.; McFarlane, L. (2003b). Seven fallacies about cyberstalking. Prison Service Journal, 149: 37-42.
- Bocij, P. (2004). Cyber stalking: Harassment in the Internet age and how to protect your family.Westport, CT: Praeger Publishers.
- Bocij, P., & McFarlane, L. (2003). Seven fallacies about cyberstalking. Prison Service Journal, 149: 37-42.
- Bocij, P., Griffiths, M., and McFarlane, L. (2002). Cyberstalking a new challenge for criminal law Criminal Lawyer, 122, 3-5.
- Bossler, A. M., & Holt, T. J. (2010). The Effect of self-control on victimization in the cyberworld. Journal of Criminal Justice, 38: 227-236.
- Burgess Alexy, E., , A., Baker, T., & Smoyak, S. (2005). Perceptions of cyber stalking among college students. Brief Treatment and Crisis Intervention, 5, 279–289.
- Clarke, R. V., & Felson, M. (1993). Routine activity and rational choice. New Brunswick, NJ: Transaction Publishers.
- D’Ovidio, R. & Doyle, J. (2003). A study on cyberstalking: Understanding investigative hurdles. FBI Law Enforcement Bulletin, 72(3): 10-17.
- Dignan, J. (2005), Understanding Victims and Restorative Justice, Maidenhead: Open.
- Finch, E. (2001). The criminalization of stalking: Constructing the problem and evaluating the solution. London: Cavendish.
- Fisher B., & S. Lab(2010) (Eds.), Encyclopedia of victimology and crime prevention. Thousand Oaks: SAGE Publications, Inc. doi: 10.4135/9781412979993.n334.
- Fukuchi, A. (2011). A balance of convenience: The use of burden-shifting devices in criminal cyberharassment law. Boston College Law Review, 52, 289-338.
- Goodno, Naomi Harlin(2007) Cyberstalking, a New Crime: Evaluating the Effectiveness of Current State and Federal Laws, Missouri Law Review, Available at: http://scholarship.law.missouri.edu/mlr/vol72/iss1/7.
- Grabosky, P.N. (2001). Virtual criminology: Old wine in new bottles? Social and Legal Studies, 10, 243-249.
- Grabosky, P.N. (2007). Electronic Crime. Upper Saddle River, NJ: Pearson.
- Hazelwood, Steven D.& Magnin, Sarah Koon(2013) Cyber Stalking and Cyber Harassment Legislation in the United States: A Qualitative Analysis, International Journal of Cyber Criminology (IJCC) ISSN: 0974 –Vol 7 (2): 155–168.
- Hirschi, T. (2004). Self-control and crime. In R. F. Baumeister & K. D. Vohs (Eds.), Handbook of self-regulation: Research, theory and applications (pp. 537-552). New York:Guilford Press.
- Jaishankar, K. (2008). Space Transition Theory of cyber crimes. In Schmallager, F., & Pittaro, M. (Eds.), Crimes of the Internet. (pp.283-301) Upper Saddle River, NJ: Prentice Hall.
- Jaishankar, K. and Sankary, U.V. (2006). Cyberstalking: A global menace in the information super highway. All India Criminology Conference. 16-18. Madurai: India Madurai Kamaraj University.
- Jaishankar. K (2011). Cyber Criminology: Exploring Internet Crimes and Criminal behavior. Boca Raton, FL, USA: CRC Press, Taylor and Francis Group.
- Lindberg, D. (2012). Prevention of cyberstalking: A review of the literature. In Portland State University. Retrieved October 18, 2015.
- Maple, Carsten & etal(2011) The Impact of Cyberstalking: review and analysis of the ECHO Pilot Project, National Centre for Cyberstalking Research.
- Marcum, C. D., Higgins, G. E., & Ricketts, M. L. (2010). Potential factors of online victimization of youth: An examination of adolescent online behaviors utilizing routine activity theory. Deviant Behavior, 31(5), 381-410.
- Marcum, C. D., Higgins, G. E., & Ricketts, M. L. (2014). Juveniles and cyber stalking in the United States: An analysis of theoretical predictors of patterns of online perpetration. International Journal of Cyber Criminology, 8, 47-56.
- McFarlane, L., & Bocij, P. (2003). An exploration of predatory behaviour in cyberspace: Towards a typology of cyberstalkers. First Monday, 8(9).
- Miethe, T. (1991). Citizen-Based Crime Control Activity and Victimization Risks: An Examination of Displacement and the Free-Rider Effect, Criminology, 29, 419-441.
- Miethe, T. D., & Meier, R. F. (1994). Crime and its social context : toward an integrated theory of offenders, victims, and situations. Albany: State University of New York Press.
- Mishra, Alok & Mishra, Deepti(2008) Cyber Stalking :A Challenge for Web Security, See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/259148587.
- Newman, G., & Clarke, R.V. (2003). Superhighway Robbery: Preventing E-commerce Crime. Portland, OR: Willan Publishing.
- Ogilvie, E. (2000). Cyberstalking. Trends & Issues in Crime and Criminal Justice, No 166. Canberra: Australian Institute of Criminology.1-6.
- Petrocelli, J. (2005). Cyber stalking. Law & Order, 53(12), 56-58.
- Pittaro, Michael L (2007) Cyber stalking: An Analysis of Online Harassment and Intimidation, International Journal of Cyber Criminology (IJCC) ISSN: 0974 – 2891 Vol 1 (2): 180–197.
- Poonia,Ajeet Singh(2014) Cyber Crime: Challenges and its Classification, International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) Issue 6, 3(6), 119-121.
- Reyns, B.W. (2010). A situational crime prevention approach to cyberstalking victimization: Preventive tactics for Internet users and online place managers. Crime Prevention & Community Safety, 12, 99-118.
- Reyns, B. W. (2013). Online Routines and Identity Theft Victimization: Further Expanding Routine Activity Theory beyond Direct-Contact Offenses. Journal of Research in Crime and Delinquency, 50(2), 216–238.
- Roberts, Lynne (2008) Jurisdictional and definitional concerns with computer-mediated interpersonal crimes: An Analysis on Cyber Stalking, International Journal of Cyber Criminology (IJCC) ISSN: 0974 – 2891, Vol 2 (1): 271–285.
- SPITZBERG, B. H. (2002). The Tactical Topography of Stalking Victimization and Management. Trauma, Violence, & Abuse, 3(4), 261–288.
- Stephenson, Peter R., and Walter, Richard D.( 2011) Toward Cyber Crime Assessment: Cyberstalking, Annual Symposium on Information Assurance (ASIA), JUNE 7-8, ALBANY, NY.
- Wall, D. S. (2008). Cybercrime and the culture of fear: Social science fiction(s) and the production of knowledge about cybercrime. Information Communication and Society, 11(6), 861–884.
- Somaiya,Jheel & etal(2014) A Survey: Web based Cyber Crimes and Prevention Techniques. International Journal of Computer Applications 105(17):6-9.
Yar, M. (2005). The Novelty of 'Cybercrime:' An Assessment in Light of Routine Activity Theory. European Journal of Criminology, 2(4), 407-427.