فهرست منابع
الف. منابع فارسی
رضویفرد، بهزاد. «محدودیتها و راهبردهای صلاحیت در جرایم سایبری». مجله حقوقی دادگستری 98 (1396): 102-83.
شهبازی، آرامش. «بایستههای حقوقی همکاری بینالمللی در مبارزه با جرایم سایبری». مقالۀ ارائهشده در همایش جنبههای حقوقی فناوری اطلاعات و ارتباطات ایران، تهران، 5 و 6 اسفند 1396.
عقیقی، نگار. صلاحیت در فضای مجازی از منظر حقوق بینالملل. تهران: مؤسسۀ مطالعات و پژوهشهای حقوقی شهر دانش، 1396.
مؤذنزادگان، حسنعلی. «دادرسی الکترونیکی در رویارویی با جرایم رایانهای». مجله حقوقی دادگستری 100 (1396): 196-169.
میرمحمدصادقی، حسین. «راهکارهای مقابله با جرم کلاهبرداری رایانهای در حقوق کیفری ایران». دیدگاههای حقوقی 43-42 (1386): 126-101.
ب. منابع خارجی
Angers, Lucie. “Combating Cyber-Crime: National Legislation as a Pre-Requisite to International Cooperation.” In Crime and Technology: New Frontiers for Regulations, Law Enforcement and Research, edited by Ernesto U. Savona. 39-54. Springer: New York, 2004.
Bell, R. E. “The Prosecution of Computer Crime.” Journal of Financial Crime 9 (2002): 308-325.
Chander, Anupam, and Uyên P. Lê. “Data Nationalism.” Emory Law Journal 64 (2015): 682-713.
Council of Europe Cybercrime Convention Committee. “Trans-Border Access and Jurisdiction: What Are the Options?” 2012. https://rm.coe.int/16802e79e8 (Accessed November 10, 2018).
Council of Europe. “International Co-operation under the Convention on Cybercrime.” 2009.
https://rm.coe.int/1680304352 (Accessed November 10, 2018).
Council of Europe. “T-CY Assessment REPORT: The Mutual Legal Assistance Provisions of the Budapest Convention on Cybercrime.” 2014.
https://rm.coe.int/16802e726c (Accessed November 10, 2018).
de Carvalho, Elcio Ricardo, Mirza Abdullahel Baqui, Rita Chun-fa Lam, Yoichi Omura, Hiroyuki Ito, Gilbert Caasi Sosa, Napoleon Bonaparte, Jesus Rodriguez Almeida, Yunsik Jang, Shintaro Naito, Ryuji Tatsuya, Tetsuya Sugano, Tetsuya Sugano, Koji Yamada, Haruhiko Higuchi. “Challenges and Best Practices in Cybercrime Investigation.” 2008. http://www.unafei.or.jp/english/pdf/RS_No79/No79_15RC_Group2.pdf (Accessed November 10, 2018).
Directive 2014/41/EU of the European Parliament and of the Council of 3 April 2014 regarding the European Investigation Order in Criminal Matters.
Gabuardi, Carlos A. “Institutional Framework for International Judicial Cooperation: Opportunities and Challenges for North America.” Mexican Law Review I (2009): 155-176.
Hooper, Christopher. “Cloud Computing and Its Implications for Cybercrime Investigations in Australia.” Computer Law & Security Review 29 (2013): 152-163.
Kettle, M., and O. Bowcott. “Computer Crime: The Age of Digital Sleuth.” The Guardian, December 12, 1997.
Lee-Makiyama, Hosuk. “A Multilateral Legal Assistance Protocol: Preventing Fragmentation and Re-dearterialisation of Internet.” 2013. http://www.ecipe.org/app/uploads/2014/12/PB9.pdf (Accessed November 10, 2018).
Leviathan Security Group. “Quantifying the Cost of Forced Localization.” 2015. https://static1.squarespace.com/static/556340ece4b0869396f21099/t/559dad76e4b0899d97726a8b/1436396918881/Quantifying™he+Cost+of+Forced+Localization.pdf (Accessed November 10, 2018), 13-14.
Lovells, Hogan, and Client Alert. “Marco Civil da Internet: Brazil’s New Internet Law Could Broadly Impact Online Companies’ Privacy and Data Handling Practices.” 2014. http://ehoganlovells.com/cv/92a5426dc5d9947a6ef3abd4eb988b549ae2472b (Accessed November 10, 2018).
Malby, Steven, Robyn Mace, Anika Holterhof, Cameron Brown, Stefan Kascherus and Eva Ignatuschtschenko. Comprehensive Study on Cyber-Crime. Vienna: UNODC, 2013.
Putnam, Tonya L., and David D. Elliott. “International Responses to Cyber Crime.” In International Dimension of Cyber Crime and Terrorism, edited by Abraham D. Sofaer and Seymour E. Goodman, 36-67. Stanford: Hoover Institution, 2001.
Stoll, Clifford, & John. W. D. Connolly. “The Cuckoo’s Egg: Tracking a Spy through the Maze of Computer Espionage.” Physics Today 43 (1990): 75-76.
Sussmann, Micheal A. “The Critical Challenges from International High-Tech and Computer-Related Crime at the Millennium.” Duke Journal of Computer & International Law 9 (1998): 451-489.
Swire, Peter, and Justin D. Hemmings. “Mutual Legal Assistance in an Era of Globalized Communications: The Analogy to the Visa Waiver Program.” New York Annual Survey of American Law 71 (2017): 687-800.
Swire, Peter. “From Real-Time Intercepts to Stored Records: Why Encryption Drives the Government to Seek Access to the Cloud.” International Data Privacy Law 2 (2012): 200-206.
UN General Assembly Resolution A/RES/55/63, Combating the Criminal Misuse of Information Technologies, 22 January, 2001.
United Nation Office on Drugs and Crime (UNODC). Comprehensive Study on Cybercrime. New York: United Nations, 2013.
Vodafone . “Respecting Our Customers’ Rights to Privacy and Freedom of Expression Is One of Our Highest Priorities.” Accessed November 10, 2018. http://www.vodafone.com/content/sustainabilityreport/2014/index/operating_responsibly/privacy_and_security/law_enforcement.html.
Westmoreland, Kate, and Gail Kent. “International Law Enforcement Access to User Data: A Survival Guide and Call for Action.” Canadian Journal of Law and Technology 13 (2015): 225-254.
Wolf, Christopher. “An Analysis of Service Provider Transparency Reports on Government Request for Data.” 2013. https://www.hldataprotection.com/files/2013/08/Hogan-Lovells-White-Papers-Analysis-of-Transparency-Reports.pdf (Accessed November 10, 2018).