1.	Bandura, A. (2001). Social cognitive theory of mass communication. Media Psychology, 3,265-299. 
2.	Baron, L. S. (1988). Legitimate violence, violent attitudes, and rape: A test of cultural spillover theory. Annals of the New York Academy of Sciences, 528(1), 79-110. DOI: 10.1111/j.1749-6632.1988.tb50853.x. 
3.	Furnell, S. (2002).Cyber crime: Vandalizing the information society. London: Addison Wesley.
4.	Gordon, M. P., Loef, M. P., Lucyshyn, W., & Richardson, R. (2004). CSI/FBI computer crime and security survey. Los Angeles: Computer Security Institute.
5.	Grabosky, P., & Smith, R. (2001). Telecommunication fraud in the digital age: The convergence of technologies. In D. Wall (Ed.) Crime and the Internet (pp. 23-45). London: Routledge.Jaishankar, K. (2008). Space transition theory of cyber crimes. In F. Schmalleger & M. 
6.	Pittaro (Eds.), Crimes of the Internet (pp. 283−301). Upper Saddle River, NJ: Prentice Hall.
7.	RUSSEL
G. SMITH
ET
AL, CYBER
CRIMINALS
ON
TRIAL
5 (2004) 
D. PARKER, FIGHTING
COMPUTER
CRIME
242
(1988)
8.	Computer
 Misuse
 Act
 (1990),
 ch.
 18,
 the
 full
 text
 of
 it
 is
 available
 at:
http://www.opsi.gov.uk/acts/acts1990/Ukpga_19900018_en_1.htm
(last
accessed
14
June
2010).Robert
Ditzion
et
al.,
Computer
Crimes,
40
AMERICAN
CRIMINAL
LAW
REVIEW
(AM. CRIM. L. REV.)285
(2003),
286.
9.	Julie A.Tower, Hacking
 Vermont's
 Computer
 Crimes
 Statute,
 25
VERMONT
 LAW
REVIEW 945
 (2001),
 950
 (citing
National
 Institute
 of
 Justice,
 U.S.
Department
 of
 Justice,
 Computer
 Crime:
 Criminal
 Justice
 Resource
 Manual
 2
(1989)). 
10.	Brian
C.
Lewis,
Prevention
of
Computer
Crime
Amidst
International
Anarchy,
AMERICAN
CRIMINAL
LAW
REVIEW (AM.CRIM. L. REV.) 1353
 (2004(,
1355)
11.	Elizabeth
A.
Glynn,Computer
Abuse:
The
Emerging
Crime
and
the
Need
for
Legislation,12
FORDHAM
URBAN
LAW
JOURNAL
(FORDHAM
URB. L.J.)
73
(1984),
74‐5.
 
12.	BERNADETTE
H. SCHNELL
& CLEMENS
MARTIN, CYBERCRIME
– A REFERENCE
HANDBOOK
XII
(2004)