- Ahmadvand, Ali Mohammad and Amir Massoud Ataei Jafari, (2004), The role and strategy of information technology in the police system and cyberspace of crimes in Iran, Bi-Quarterly Journal of Humanities Development, First Year, Issue 3, December and January .
-Ardabili, Mohammad Ali, (2006), General Criminal Law, Volume One, Mizan Publishing.
- Ismaili, Mohsen and Nasrollahi, Mohammad Sadegh, "Refinement of cyberspace, its ruling and issues from the jurisprudential point of view", Journal of Research in Religion and Communication, 23rd year, p.49.
- Ansari, Morteza, (1431 AH), Kitab al-Makasib, vols. 1 and 2, Qom, Islamic Thought Association.
- Iko, Davidji, (2004), Strategies for Prevention and Combating Cybercrime, translated by Akbar Astraki and Mohammad Sadegh Roozbahani and Touraj Reyhani and Raheleh Elyasi, Tehran, Vice Chancellor for Research, University of Law Enforcement Sciences.
- Bastani, Boroumand, (2004), Computer and Internet Crimes, New Manifestations of Delinquency, First Edition, Behnami Publications.
- Bai, Hossein Ali Bai and Babak Pourghahrmani, (2009), Jurisprudential study of computer crimes, Research Institute of Islamic Sciences and Culture, first edition.
- Bojnurdi, Mohammad Hassan, (1430 AH), Rules of Jurisprudence, vol. 1, Qom, our reason.
- Parvizi, Reza, (2002), Abrar Eghtesadi, No. 1, 2, 8 and 7/23/81, Computer and Internet crimes.
- Torabzadeh, Hossein, (2009), Investigation of Electronic Crime Scenes, Detective Magazine, Volume 2, Year 2, Spring 2009, No. 6. 11- Tamimi Amadi, Abdul Wahed, (1410 AH), Gharr al-Hakam and Dar al-Kalam, Qom, Dar al-Kitab al-Islami.
- Javidnia, Javad, (2008), Electronic Commerce Crimes, First Edition, Khorsandi Publications, Tehran.
- Javan Jafari, Abdolreza, (2010), Cybercrime and the Differential Approach to Criminal Law, Journal of Knowledge and Development, Year 17, No. 34.
- Hor amli, Muhammad ibn Hassan, (1409 AH), Tafsil Wasa'il al-Shi'ah, vols. 12 and 25, Qom, Al-Bayt.
- Hosseini, Mehdi and Borzoi, Mohammad Reza, (2017), Principles and jurisprudential components of protecting the privacy of individuals in cyberspace, Research Journal of Islamic Human Rights Studies, Year 6, Vol.
- Khomeini, Seyyed Ruhollah, (1435 AH), Al-Makasib Al-Muharram, vols. 1 and 2, Tehran, Imam Khomeini Publishing House.
- Deziani, Mohammad Hassan, (2006), Introduction to Iran's criminal policy on cybercrime, Judgment Monthly, No. 38.
- Raijian Asli, Mehrdad, (2009), Computer Crime Law: Innovations and Shortcomings, Journal of Legal Research, No. 15, First Semester.
- Rashadati, Jafar, (2012), Factors distorting the crime scene, Judicial Monthly, No. 96.
- Rezaei, Ruhollah, (2006), The validity of electronic documents according to domestic and international laws, Gawah Law Journal, Nos. 6 and 7.
- Razavi, Mohammad, (2007), Cybercrime and the role of the police in preventing and detecting these crimes, Journal of Disciplinary Knowledge, No. 32.
- Sobhani, Jafar, (2007), Forough Eternity, Qom, Book Garden.
- Fazli, Mehdi, (2010), Criminal Liability in Cyberspace, Tehran, Khorsandi.
- Qajarghionloo, Siamak, (1374), A comparative study of evidence in digital environments and computer evidence according to the law of Iran, Tehran, Program and Budget Organization, Supreme Informatics Council.
- Kahvand, Mohammad, (2016), Telegram Social Network Pathology, Center for Strategic Studies in Cyberspace, Faculty of Social and Cultural Sciences, Imam Hossein University.
- Gatten, Alnham, (2004) Electronic Evidence, translated by Mosayeb Ramezani, Tehran, Secretariat of the Supreme Information Council, first edition.
- Mohammadi Rey Shahri, Mohammad, (1389), Mizan al-Hikma, vol. 12, Qom, Dar al-Hadith.
- Najafi, Hussein; Agriculture, Abbas, Yazdian Jafari, Jafar; Goli, Salman (1399), The Legitimacy of Criminalization of Production, Distribution and Dissemination of Malware in Cyberspace, Studies in Islamic Jurisprudence and Law, 23, 415-438.
- Najafi, Mohammad Hassan, (1404 AH), Jawahar al-Kalam fi Sharh Sharia al-Islam, vols. 21, 40 and 41, Beirut, Dar al-Qalam, Ch.