1. “2015 Costs of Cyber Crime Study: United States,” http://www8.hp.com/us/en/ software-solutions/ponemon-cyber-security-report, Hewlett Packard Enterprise, October, 2015.
4. Denning, Dorothy E. (1990), “Concerning Hackers Who Break into Computer Systems,” 13th National Computer Security Conference, Washington, D.C, Oct. 1-4.
5. Ethical hacking, Student Guide, Internet Security Systems, Inc., 2000.
6. Falk, Courtney (2004), “Gray Hat Hacking Morally Black And White”, Cyber Security Group (CSG), Training Conference.
7. Fötinger, Christian S. (2004), Ziegler, Wolfgang; Understanding a hacker’s mind – A psychological insight into the hijacking of identities, Krems, Austria: Donau-University Krems.
8. Graves, Kimberly (2010), CEH: Certified Ethical Hacker Study Guide, Indiana: Wiley Publishing, Inc.
9. Himma, Ken (2005), “Information and Intellectual Property Protection: Evaluating the Claim that Information Should be Free”, APA Newsletter on Philosophy and Law, 4, 3–9.
10.
Himma, Kenneth Einar (2007),
Internet security: hacking, counterhacking, and Society, United States of America:
Jones & Bartlett Publishers, Inc.
11. Himma, Kenneth Einar Tavani, Herman T. (2008), The handbook of computer ethic, Canada: John Wiley & Sons, Inc.
12. http://www.ashiyane.ir/archive.php?id=2
14. http://www.usatoday.com/story/news/nation/2015/08/06/russia-reportedly-hacks-pentagon-email-system/31228625/
15. Jennings, Richard C. (2010), “Professional Practice & Ethics”, Computer Science Tripos Part IA, Department of History and Philosophy of Science University of Cambridge.
16. Levy, Steven (1994), HackersHeroes of the Computer Revolution, New York: Dell Publishing a division of Bantam Doubleday Dell Publishing Group.
17.
Martin, Mike W. (2005),
Schinzinger, Roland; Ethics in Engineering, Fourth Edition, Mc-Graw Hill.
18. Spafford, Eugene H. (1992), “Are computer break-ins ethical?” Journal of Systems Software, 17.
19. Stallman, Richard M. (1992), “Against User Interface Copyright,” 92 Proceedings of the conference on TRI-Ada.
20. Tavani,
Herman T. (2004),
Ethics and Technology: Ethical Issues in an Age of information and Communication Technology, New York: John Wiley & Sons, Inc.
21. Young, Susan; Aitel, Dave (2004), the hackers handbook: The Strategy behind Breaking into and Defending Networks, United States of America: Auerbach Publications.
22. سعیدی، سینا، حجت اله حاجیحسینی و صبا سعیدی (1392)، «بررسی عوامل مؤثر بر نقض قانون حق نشر توسط کاربران اینترنت»، اخلاق در علوم و فنّاوری، سال هشتم، ش2.