1. اسلامی، ابراهیم (1395) «جایگاه حمایت از بزهدیدگان جرایم سایبری در مقررات کیفری حقوق داخلی و حقوق بین الملل»، پژوهشنامة حقوق اسلامی، سال هفدهم، شمارة 1 (پیاپی 43): 157-182.
2. خبرگزاری مهر، (1394)، «تهران در صدر جرایم اینترنتی»، برگرفته از https://www.mehrnews.com/news/3575583، 5/5/1397.
3. دواس، دی.ای (1390) پیمایش در تحقیقات اجتماعی، ترجمة هوشنگ نایبی، تهران: نی.
4. زررخ، احسان (1390) «بزهدیدهشناسی سایبری»، مجلة پژوهش، سال هفدهم، شمارة 64: 127-157.
5. علیوردینیا، اکبر؛ منا علیمردانی (1395) «کاربست تجربی نظریۀ فعالیتهای روزمره در بررسی رفتارهای انحرافی دانشجویان»، جامعهشناسی کاربردی، سال بیست و هشتم، شمارة پیاپی (67)، شمارة 3: 1-24.
6. مالمیر، محمود؛ زررخ، احسان (1389) «پیشگیری از بزهدیدگی سایبری»، مطالعات پیشگیری از جرم، سال پنجم، شمارة 17: 59-86.
7. میر، فاطمه (1394) نقش بزهدیدگی در تحقق جرایم سایبری، پایاننامة دورة کارشناسی ارشد علوم اقتصادی دانشگاه فردوسی مشهد.
8. Addington, Lynn A (2013) "Reporting and Clearance of Cyberbullying Incidents: Applying 'Offline' Theories to Online Victims." Journal of Contemporary Criminal Justice,20(10):1-21. [
DOI:10.1177/1043986213507399]
9. Bennett, R. (1991) Routine activities: A Cross-National Assessment of a Criminological Perspective, Social Forces 70, 147-63. [
DOI:10.1093/sf/70.1.147]
10. Bauman, S., Toomey, R. B., & Walker, J. L. (2013) Associations Among Bullying, Cyberbullying, And Suicide In High School Students, Journal of Adolescence, 36(2), 341-350. [
DOI:10.1016/j.adolescence.2012.12.001]
11. Bossler, A. M., & Holt, T. J. (2009) On-line Activities, Guardianship, and Malware Infection: An Examination of Routine Activities Theory, International Journal of Cyber Criminology, 3(1), 400- 420.
12. Bossler, A. M., Holt, T. J., & May, D. C. (2012) Predicting online harassment victimization among a Juvenile population. Youth & Society, 44(4), 500- 523. [
DOI:10.1177/0044118X11407525]
13. Choi, K. S. (2008) Computer Crime Victimization and Integrated Theory: An Empirical Assessment, International Journal of Cyber Criminology, 2(1), 308-333.
14. Cohen, L. E., & Felson, M. (1979) Social Change and Crime Rate Trends: A Routine Activity Approach, American Sociological Review,44: 588-608. [
DOI:10.2307/2094589]
15. Cohen, L. E., Kluegel, J. R., & Land, K. C. (1981) Social Inequality and Predatory Criminal Victimization: An Exposition and Test of a Formal Theory. American Sociological Review, 46, 505-524. [
DOI:10.2307/2094935]
16. Dashora, K. (2011) "Cybercrime in the Society: Problems and Preventions" , Journal of Alternative Perspectives in the Social Sciences, 3 (1), 240-259.
17. Denning, D. (1999) Information Warfare and Security. New York: Addison Wesley.
18. Dilmac, Bulent & Aydogan, D. (2010) Parental Attitude as Predictor of Cyber Bullying among Primary School Children, International Journal of Social, Behavioral, Educational, Economic and Management Engineering, 4 (7), 1667-1671.
19. Drebing, H., Bailer, J., Anders, A., Wagner, H., & Gallas, C. (2014) Cyber stalking In a Large Sample of Social Network Users: Prevalence, Characteristics, And Impact Upon Victims, Cyber psychology, Behavior, and Social Networking, 17(2), 61-67. [
DOI:10.1089/cyber.2012.0231]
20. Felson, M. (1998) Crime and Everyday Life, 2nd ed. Thousand Oaks, CA: Pine Forge Press.
21. Hensler-McGinnis, N. F. (2008) Cyberstalking Victimization: Impact and Coping Responses in a National University Sample. Dissertation submitted to the Faculty of the Graduate School of the University of Maryland, College Park. [
DOI:10.1037/e611792009-001]
22. Henson, B., Reyns, B. W., & Fisher, B. S. (2011) Security in The 21st Century: Examining the Link Between Online Social Network Activity, Privacy, And Interpersonal Victimization. Criminal Justice Review, 36(3), 253-268. [
DOI:10.1177/0734016811399421]
23. Jeralds, L. M. (2011) Bullying Victimization, Target Suitability, and Guardianship: A Routine Activities Approach (Doctoral Dissertation, University of North Carolina Wilmington).
24. Kennedy, M. A., & Taylor, M. A. (2010) Online Harassment and Victimization of College Students, Justice Policy Journal, 7(1), 1-21.
25. Leukfeldt, E. R., & Yar, M. (2016) Applying Routine Activity Theory to Cybercrime: A Theoretical and Empirical Analysis, Deviant Behavior, 37(3), 263-280. [
DOI:10.1080/01639625.2015.1012409]
26. Lipton, J. D. (2011) Combating cyber-victimization. Berkeley Technology Law Journal, 26(2), 1103-1155.
27. Marcum, C. D., Higgins, G. E., & Ricketts, M. L. (2010) Potential Factors of Online Victimization of Youth: An Examination of Adolescent Online Behaviors Utilizing Routine Activity Theory, Deviant Behavior, 31(5), 381-410 [
DOI:10.1080/01639620903004903]
28. McNeeley, S. (2015). Lifestyle-Routine Activities and Crime Events, Journal of Contemporary Criminal Justice, 31(1), 30-52. [
DOI:10.1177/1043986214552607]
29. Miller, J, Mitchell Christopher, J, Schreck, T. (2006) Criminological Theory: a Brief Introduction Boston, Pearson/ Allyn and Bacon.
30. Miller, J. Mitchell (Ed). (2009) 21st Century Criminology A Reference Handbook, USA: SAGE Publications.
31. Ngo, F. T., & Paternoster, R (2011) Cybercrime Victimization: An Examination of Individual and Situational Level Factors. International Journal of Cyber Criminology, 5(1), 773.
32. Paullet, Karen & Rota, & Swan, T. (2009) Cyber stalking: An Exploratory Study Of Students at a Mid-Atlantic University, Issues in Information Systems, 10(2): 640-649.
33. Reychay, Iris, Sukenik, S. (2015) Cyberbullying: Keeping Our Children Safe in 21 st century, Handbook of Research on Digital Crime, Cyberspace Security and Information Assurance, 77-79. [
DOI:10.4018/978-1-4666-6324-4.ch006]
34. Reyns, B., B. Henson & S. F. (2011) Being Pursued Online. Applying Cyber lifestyle-Routine Activities Theory to Cyber stalking Victimization, Criminal Justice and Behavior 38(11):1149-1169. [
DOI:10.1177/0093854811421448]
35. Shinder, D. L., & Tittel, E. (2002) Scene of the Cybercrime: Computer Forensics Handbook, Syngress Publishing.
36. Smith, A., Rainie, L., & Zickuhr, K. (2010) College Students and Technology, Pew Research Center's Internet & American Life Project, Washington, DC.
37. Tseloni, A., Wittebrood, K., Farrell, G. and Pease, K. (2004) Burglary Victimization In England and Wales, The Unites States and The Netherlands: A Cross-national Comparative Test of Routine Activities and Lifestyle Theories. British Journal of Criminology 44, 66-91. [
DOI:10.1093/bjc/44.1.66]
38. Webster, F. (2002) Theories of The Information Society, 2nd edn. London: Routledge. [
DOI:10.4324/9780203426265]
39. Wilsem, Johan V. (2009) World Tied Together? Online and Non - Domestic Routine Activities and Their Impact on Digital and Traditional Threat Victimization, European Journal of Criminology, 8 (12), 115 - 127. [
DOI:10.1177/1477370810393156]
40. Yar, M. (2005) The Novelty of 'Cybercrime' An Assessment in Light of Routine Activity Theory. European Journal of Criminology, 2(4), 407-427. [
DOI:10.1177/147737080556056]
41. Yucedal, B. (2010) Victimization in cyberspace: An Application of Routine Activity and Lifestyle Exposure Theories (Doctoral Dissertation, Kent State University).