Aalipour, H. (2016). Information Technology Criminal Law. Tehran: Khorsandi Publications, fifth edition. [in persian]
Afzali, M. (2011). Feasibility study of the use of information and communication technology in teaching physics and laboratory of Isfahan high schools from the perspective of physics teachers, school principals and information and communication technology experts. Supervisor: S.I.M.Sh.J.; Consultant Professor: M.R. Nili. Master Thesis. Educational Planning. Faculty of Educational Sciences and Psychology, University of Isfahan. [in persian]
Aghadavoud, S.R., Hatami, M. & Hakiminia, B. (2010). Investigating the Factors Affecting Organizational Innovation among Managers (Case Study of Senior Telecommunication Managers in Isfahan Province). Social Sciences, 4(11): 127-179. [in persian]
Alipour, M.R. (2006). Investigating the effect of information technology on the organizational structure of Iran Insurance Company in Tehran. Master Thesis. Allameh Tabatabai University. [in persian]
Asemani, N. (2016). Familiarity with the concepts of big data. Educational booklet of Statistics and Information Technology Management of Tabriz University of Medical Sciences for officials and information technology experts of the units. [in persian]
Ayati, M., Ataran, M. & Mehrmohammadi, M. (2007). Model for developing a curriculum based on information and communication technology (ICT) in teacher training. Curriculum Studies, 1(5): 55-80. [in persian]
Bagheri, A.S. (2016). Investigating the role of mobile social networks in the occurrence of various crimes, Isfahan study area. Supervisor: R. Abdolrahmani. Master Thesis. Faculty of Security and Information Science Management, Amin University of Law Enforcement Sciences. [in persian]
Bastani, B. (2007). Computer and cybercrime. Tehran: Behnami Publications, second edition.
Biglari, A. & Agahi, H. (2010). Investigating the effective factors on the application of information and communication technology by the faculty members of Razi University of Kermanshah. Journal of Information Processing and Management, 26(1): 29-44. [in persian]
Biriyaee, H.S., Jamprazmi, M. (2010) The Challenge of Business and Information Technology Alignment: Implementing Organizational Architecture, a Strategy for Strategic Alignment. Production and Operations Management, 1(1): 87-102. [in persian]
Chanopas, A., KrairIT, D. & Khang, D.B. (2006). Managing information technologyinfrastructure: A new flexibilIT y framework. Management Research News, 29(10): 633-651.
Farajollahi, M. & Zarif Sanee, N. (2009). ICT-based education in higher education. Teaching Strategies in Medical Sciences, 2(4): 167-171. [in persian]
Fathiyan, M. (2007). Fundamentals and management of information technology. Tehran: Iran University of Science and Technology Publications, second edition. [in persian]
Fink, L. & Neumann, S. (2009). Exploring the perceived business value of flexibilIT y enabled by information technology infrastructure. Information and Management, 46(2): 90-99.
Gouyabadi, A.L. & Riyahi, M.R. (2003). The prosperity of Iranian women in a knowledge-based society. Rihanna, 1(4).
Gupta, D. (2009). A lost profits for information technology. Start up. A Thesis of Master of Business Administration. University of Nebraska.
Hadizadeh Moghadam, A. & Salehi, A. (2009). Information technology and its role on organizational characteristics and consequences. Management and Development, 10(40). [in persian]
Harkin, D. & Whelan, C. (2021). Perceptions of police training needs in cyber-crime. International Journal of Police Science & Management. 24(1): 66-76.
Hennessy, S., Harrison D. & Wamakote, L. (2007). Pedagogical approaches for technology-integrated science teaching. Journal of Computer & Education. 48: 137-152.
Hitt, L.M. & Brynjolfsson, E. (1996). Productivity, business profit abilit y and consumer surplus: three different measures of information technology value. MIS Quarterly, 20(2): 121-142.
Keramati Moez, H. (2020). Child Victimology in Virtual Networks. Tehran: Justice Publications. [in persian]
Khalafi, A. (2016). Crime prevention with a focus on crime detection. Detective, 10(34): 23-38.
Laak, B. (2012). Identify and prevent cyber ambushes in cyberspace. Detective, 6(18): 90-109.
Mollahosseini, A. & Moshkdanian, F. (2011). The impact of information technology on the organizational structure of customs according to the year of economic jihad. In: Special Issue of New Marketing Research, Kerman: Proceedings of the International Conference on Economic Jihad: 59-80. [in persian]
Niazpour, A.H. (2021). Crime Prevention. Tehran: Justice Publications. [in persian]
Nilipour Tabatabaee, S.A., Khayambashi, B., Karbasian, M. & Shariati, M. (2012). Optimization of information technology application in supply chain management and marketing of aviation products by AHP method. New Marketing Research, 2(5): 143-146. [in persian]
Payne, J. & Fryer, J. (2020). Knowledge management and information management: A tale of two siblings. Business Information Review, 37(2): 69-77.
Portela, F., Lima, L. & Santos, M. F. (2016). Why Big Data? Towards a Project Assessment Framework. Procedia Computer Science, 98: 604-609.
Raeesi Dana, F.L. (2002) Applications and benefits of information technology. Educational technology, 2. [in persian]
Razavi, M. (2007) Cybercrime and the role of the police in preventing and detecting these crimes. Disciplinary Knowledge, 1(9): 120-140. [in persian]
Razmi, J. & Dehghan, S. (2004) The role of information technology in the supply chain of its application and implementation. In: Tehran: The first logistics seminar. [in persian]
Sanaee, A., Feyzpour, M.A. & Naderpour, M. (2012). The Impact of Information Technology on the Value Chain of Iranian Export Companies. Modern Marketing Research, 2(7): 23-44.
Sen, S. (2019). Book review: Debarati Halder and K. Jaishankar, Cyber Crimes Against Women in India. Sociological Bulletin, 68(1): 114-115. DOI: https://doi.org/10.1177/0038022918819649
Sohrabi, B. & Eraj, H. (2015). Macro data management in the private and public sectors. Tehran: Samat. Publications. [in persian]
Talebiyan, H. (2012). Explain the process of forming a police intelligence cloud in crime detection. Detective, 6(19): 126-157. [in persian]
Turban, R., Rainer, K. & Potter, R. (2005). Introduction To Information Technology. John Wiley & Sons, inc. Third Edition.
Word, J. (2000). Strategic Planning for Information Systems. Prentice Hall,
Xianfeng, Q., Boxing, L. & Zhenwei, G. (2008). Conceptual model of IT infrastructure capability and IT's emperical justification. Tsinghua Science and Technology, 13(3): 390-394.
Yadegarnejad, A., Habibzadeh, A. & Niknafs, A. (2014). The role of information exchange management on the crime detection process in the Kerman Disciplinary Command. Kerman Disciplinary Knowledge, 3(9): 78-108. [in persian]
Zalaghi, A. (2020). Legal and enforcement gaps and strategies to prevent cybercrime. Detective, 14(52): 82-98. [in persian]