فهرست منابع
الف) منابع فارسی
الوانی، سیّد مهدی. مدیریت عمومی. چاپ سی و یکم. تهران: نشر نی، 1386.
بیابانی، غلامحسین. «جرایم سازمانیافته ملّی و فراملّی». نشریه کارآگاه 6(24) (1392): 46-31.
جامنیوز. «ایران هیچ حمله سایبری را بیپاسخ نمیگذارد». 25 اسفند 1392. http://www.jamnews.ir/detail/News/330781 (27/06/1395).
رحمانسرشت، حسین. «پیچیدگی در سازمان». فصلنامه مطالعات مدیریت 49 (1385): 24-1.
رضائیان، علی. تجزیه و تحلیل و طراحی سیستم. تهران: سمت، 1383.
شمس ناتری، محمدابراهیم. «بررسی سیاست کیفری ایران در قبال جرایم سازمانیافته با رویکردی به حقوق جزای بینالملل». رساله دکتری، تهران: دانشگاه تربیت مدرس، 1380.
شمس ناتری، محمدابراهیم. «جرایم سازمانیافته». نشریه فقه و حقوق 1 (1383): 130-109.
ب) منابع انگلیسی
Broadhurst, R., & Y. C. Chang. Cybercrime in Asia: Trends and Challenges. Asian Handbook of Criminology. NewYork: Springer, 2013.
Chang, Y. C. Cybercrime in the Greater China Region: Regulatory Responses and Crime Prevention across the Taiwan Strait. Cheltenham, UK: Edward Elgar Publishing, 2012.
Cubby, B., & A. McNeilage. “Police Investigate Rioters’ Text Messages.” Sydney Morning Herald. http://www.smh.com.au/nsw/police-investigate-rioters-text-messages-20120916-260mk.html (Accessed September 5, 2016).
Docket Alarm. United States of America v Aaron Swartz, Superseding Indictment (US District Court, District of Massachusetts September 12, 2012). Retrieved on 5th October, 2013 from https://www.docketalarm.com/cases/Massachusetts_District_Court/1--11-cr- 10260/USA_v._Swartz/53/.
International Computing Science Institute. United States of America v Ross William Ulbricht (2013) Sealed Complaint, Southern District of New York 27 September. Retrieved on 5th October, 2013. http://www1.icsi.berkeley.edu/~nweaver/UlbrichtCriminalComplaint.pdf.
Kshetri, N. Cyber-Victimization and Cyber-Security in China. New York, NY, United States: Communications of the ACM, 2013.
McGuire, M. Organised Crime in the Digital Age. London: John Grieve Centre for Policing and Security, 2012.
Moura, G. C. Internet Bad Neighborhoods. Enschede, The Netherlands: Centre for Telematics and Information Technology, 2013.
Pauli, D. “China is the “World’s Biggest Cybercrime Victim.” SC Magazine (2012). http://www.scmagazine.com.au/News/294653china-is-the-worlds-biggestcybercrime-victim.aspx (Accessed September 15, 2016).
Richmond, R. “Web Gang Operating in the Open.” New York Times (2012). http://www.nytimes.com/2012/01/17/technology/koobface-gang-that-usedfacebook-to-spread-worm-operates-in-the-open.html?pagewanted=all&_r=0 (Accessed September 14, 2016).
Sanger, D. E., D. Barboza & N. Perlroth. “China’s Army Is Seen as Tied to Hacking against U.S.” The New York Times (2013). http://www.nytimes.com/2013/02/19/technology/chinas-army-is-seenas-tied-to-hacking-against-us.html (Accessed September 18, 2016).
Stohl, M. “Strange Web: Or How They Stopped Worrying and Learned to Love Cyber War.” In Cyberterrorism: A Multidisciplinary Approach, edited by T. Chen, L. Jarvis, S. Macdonald. New York: Springer, 2014.
United States Attorney, Eastern District of New York (2003) Press Release Massive Internet and Credit Card Fraud Bilks Consumers out of $230 Million in Bogus “Free Tours” of Adult Entertainment Websites - Gambino Soldier, Two Executives and 5 Companies Indicted. Retrieved on 5th October, 2013. http://ebookbrowsee.net/cr-03-304-pressrelease-us-v-salvatore-locascio-pdfd19910473.