احمدی، حبیب، عباسی شوازی، محمدتقی، یادگاری، رامین و کرمی، فرشاد. (۱۳۹۶). مطالعه رابطه بین استفاده از رسـانههای مـدرن و تمـایل به بزهکـاری در بین نوجوانان دانشآموز (مطالعه دانشآموزان مقطع متوسطه شهر بستک). پژوهشهای راهبردی مسائل اجتماعی ایران، ۶ (۴)، ۱۹، ۷۰-۵۳.
ایسپا، مرکز افکارسنجی دانشجویان ایران. (۱۴۰۰). برگرفته از http://ispa.ir/Default/Details/fa/3382/-78.5
برومیده، کامران. (۱۳۹۶). بررسی نقش شبکههای اجتماعی تلگرام و اینستاگرام در افزایش دادخواست طلاق با موضوع خیانت در دادگاههای خانواده شهر تهران (پایاننامه کارشناسی ارشد، دانشگاه آزاد اسلامی واحد تهران مرکزی، دانشکده علوم اجتماعی).
تولایی، روحالله، صباغی، زهرا و نظافتی، نوید. (۱۳۹۶). شناسایی و تحلیل فرصتها و تهدیدهای شبکههای اجتماعی در فضای مجازی (مورد مطالعه، دانشجویان دانشگاه شهید بهشتی). تحقیقات فرهنگی ایران، 39، ۱۷۵-۱۵۳.
داودی دهاقانی، ابراهیم، شمسایی، مهدی و بارانی، محمد. (۱۳۹۷). رابطه شبکههای اجتماعی مجازی با ارتکاب جرائم خشن. پژوهشهای اطلاعاتی و جنایی، ۱۳ (۱)، ۹۰-۶۵.
رضویفرد، بهزاد، رباط جزی، محمدتقی و عمرانی، گلسا. (1397). پیشگیری از بزهدیدگی جنسی در شبکههای اجتماعی. مجله حقوقی دادگستری، 82(104)، ۶۵-۳۹.
شایگان، فریبا، رحیمی، محمد. (۱۳۹۵). بررسی جامعهشناختی رابطه مصرف شبکههای اجتماعی مجازی و گرایش به انحرافات اخلاقی (مورد مطالعه جوانان 15 تا 29 سال شهر تهران). مطالعات راهبردی ورزش و جوانان، 34، 193-۱۶۹.
شیرمحمدی، جلال. (۱۳۹۶). بررسی انگیزههای اصلی بزهکاران در فضای سایبری. مطالعات علوم سیاسی، حقوق و فقه، ۳ (۱)، ۱۳۶-۱۲۶.
عبدالرحمانی، رضا، حسین پور، جعفر، بشیری، هادی. (الف ۱۳۹۷). بررسی نقش مصرف شبکة پیامرسان تلگرام در گرایش جوانان به جرائم اخلاقی. پژوهشهای انتظامی - اجتماعی زنان و خانواده، ۶ (۱)، ۱۲۲-۱۰۳.
عبدالرحمانی، رضا، حکیمینیا، بهزاد، باقری، امیرسعید و سپیانی، مریم. (ب ۱۳۹۷). نقش شبکههای اجتماعی موبایلی در وقوع انواع جرائم اخلاقی. پژوهشهای اطلاعاتی و جنایی، ۱۳ (۳)، ۱۸۸-۱۶۵.
عبداللهی نژاد، علیرضا و مجلسی، نوشین. (۱۳۹۶). خشونت کلامی در فضای مجازی، مطالعه موردی اظهارنظرهای دنبال کنندگان در صفحات اینستاگرام هنرمندان ایرانی. مطالعات رسانههای نوین، ۴ (۱۳)، ۶۲-۱.
عدلیپور، صمد، اکبرپور، حامد و محکی، محمد. (۱۳۹۵). رابطه استفاده از فیسبوک و پایبندی به ارزشهای خانوادگی و دینی با کجروی فرهنگی (مورد مطالعه: جوانان شهر تبریز). مطالعات راهبردی ورزش و جوانان، 34، ۱۵۰-۱۲۹.
قربانی، ابراهیم، کیانی، جواد، ابراهیمی، علی و مالکی، اسدالله. (۱۳۹۶). پیشبینی سهم فضای سایبر (شبکههای مجازی) در میزان گرایش به سوءمصرف مواد مخدر و روانگردان. پژوهشهای اطلاعاتی و جنایی، ۱۲ (۲)، ۲۸-۹.
کللی خورموجی، راضیه. (۱۳۹۷). میزان و تأثیر استفاده از اپلیکیشن اینستاگرام بر دوستی نوجوانان دختر و پسر مقطع متوسطه شهر بوشهر. مطالعات ماهواره و رسانههای جدید، ۱۴، ۸۸-۶۵.
Ahmad, S., Ullah, A., Shafi, B., & Shah, M. (2014). The Role of Internet use in the Adoption of Deviant Behavior among University Students. Pakistan Journal of Criminology, 6(1), 133.
Al-khateeb, S., & Agarwal, N. (2019a). Deviance in social media. In Deviance in social media and social cyber forensics (pp. 1-26). Springer, Cham.
Al-khateeb, S., & Agarwal, N. (2019b). Tools and Methodologies for Data Collection, Analysis, and Visualization. In Deviance in Social Media and Social Cyber Forensics (pp. 45-65). Springer, Cham.
Bichler, G., & Malm, A. (2013). Small arms, big guns: a dynamic model of illicit market opportunity. Global Crime, 14(2-3), 261-286.
Borgatti, S. P., Everett, M. G., & Freeman, L. C. (2002). Ucinet for Windows: Software for social network analysis. Harvard, MA: Analytic Technologies.
Bott, E. (1957). Family and social networks. London: Tavistock Publications.
Bouchard, M., & Konarski, R. (2014). Assessing the core membership of a youth gang from its co-offending network. in C. Morselli (Ed.). Crime and Networks Criminology and Justice Series (Pp. 81-93). New York: Routledge.
Bouchard, M., & Malm, A. (2016). Social network analysis and its contribution to research on crime and criminal justice. In Oxford Handbooks Online (Pp. 1-23). Oxford University Press.
Brantingham, P. J., Tita, G. E., Short, M. B., & Reid, S. E. (2012). The ecology of gang territorial boundaries. Criminology, 50(3), 851-885.
Bright, D. A., & Delaney, J. J. (2013). Evolution of a drug trafficking network: Mapping changes in network structure and function across time. Global Crime, 14(2-3), 238-260.
Bruinsma, G., & Bernasco, W. (2004). Criminal groups and transnational illegal markets. Crime, Law and Social Change, 41(1), 79-94.
Burris, V., Smith, E., & Strahm, A. (2000). White supremacist networks on the Internet. Sociological focus, 33(2), 215-235.
Calderoni, F. (2012). The structure of drug trafficking mafias: the ‘Ndrangheta and cocaine. Crime, law and social change, 58(3), 321-349.
Cale, J., Leclerc, B., & Gil, F. (2020). Big data in criminology and criminal justice through the lens of the business literature. In Big Data (pp. 1-16). Routledge.
Carley, K. M., Dombroski, M., Tsvetovat, M., Reminga, J., & Kamneva, N. (2003). Destabilizing dynamic covert networks. In Proceedings of the 8th international Command and Control Research and Technology Symposium(pp. 79-92). Washington DC: National Defense War College.
Carrington, P.J. (2011). Crime and social network analysis. in J. Scott and P.J. Carrington (eds.), SAGE Handbook of Social Network Analysis (Pp. 236-255(. London: Sage.
Chan, T. K., Cheung, C. M., & Wong, R. Y. (2019). Cyberbullying on social networking sites: the crime opportunity and affordance perspectives. Journal of Management Information Systems, 36(2), 574-609.
Clifford, W. (1976). Crime and Control in Japan. Lexington, MA: Lexington Books.
Clinard, M. B. (1978). Cities with little crime: The case of Switzerland. Cambridge: Cambridge University Press.
Craven, P., & Wellman, B. (1973). The network city. Sociological inquiry, 43(3‐4), 57-88.
Décary-Hétu, D., & Dupont, B. (2013). Reputation in a dark network of online criminals. Global Crime, 14(2-3), 175-196.
Dupont, B. (2013). Skills and trust: a tour inside the hard drives of computer hackers. In Crime and networks (pp. 195-217). Routledge.
Ennett, S. T., Bauman, K. E., Hussong, A., Faris, R., Foshee, V. A., Cai, L., & DuRant, R. H. (2006). The peer context of adolescent substance use: Findings from social network analysis. Journal of research on adolescence, 16(2), 159-186.
Feld, S. L. (1981). The focused organization of social ties. American journal of sociology, 86(5), 1015-1035.
Fischer, C. S., Jackson, R. M., Stueve, C. A., Gerson, K., & Jones, L. M. & Baldassare, M. (1977). Networks and places: social relations in the urban setting. New York: Free Press.
Friday, P. C., & Hage, J. (1976). Youth crime in postindustrial societies: an integrated perspective. Criminolo- -gy, 14(3), 347-368.
Gephi. (2023). Features. Retrived from https://gephi.org/features/
Granovetter, M. S. (1973). The strength of weak ties. American journal of sociology, 78(6), 1360-1380.
Gruzd, A., Mai, P., & Kampen, A. (2022). Using Netlytic to Analyze Twitter Conversations about the 2014 Euromaidan Revolution in Ukraine. The SAGE Handbook of Social Media Research Methods, 467-475.
Gundur, R. V., Berry, M., & Taodang, D. (2021). Using digital open source and crowdsourced data in studies of deviance and crime. In Researching Cybercrimes: Methodologies, Ethics, and Critical Approaches (pp. 145-167). Palgrave Macmillan, Cham.
Hawdon, J. (2012). Applying differential association theory to online hate groups: A theoretical statement. Research on Finnish Society, 5, 39–47.
Habiba, U., Farid, N., & Saud, M. (2018). Social Networking Sites and Deviance among Youth in Islamabad, Pakistan. European Journal of Behavioral Sciences, 1(1), 48-58.
Haynie, D. L. (2001). Delinquent peers revisited: Does network structure matter? American Journal of Sociology, 106(4), 1013-1057.
Haynie, D. L., Doogan, N. J., & Soller, B. (2014). Gender, friendship networks, and delinquency: A dynamic network approach. Criminology, 52(4), 688-722.
Hofmann, D. C., & Gallupe, O. (2015). Leadership protection in drug-trafficking networks. Global Crime, 16(2), 123-138.
Kadushin, C. (1983). Mental health and the interpersonal environment: a reexamination of some effects of social structure on mental health. American sociological review, 48(2), 188-198.
Kadushin, C. (2012). Understanding social networks: Theories, concepts, and findings. Oxford university press.
Kenney, M. (2007). The architecture of drug trafficking: network forms of organisation in the Colombian cocaine trade. Global crime, 8(3), 233-259.
King, J. E., Walpole, C. E., & Lamon, K. (2007). Surf and turf wars online—growing implications of internet gang violence. Journal of Adolescent Health, 41(6), S66-S68.
Kitchin, R., & Lauriault, T. P. (2015). Small data in the era of big data. GeoJournal, 80(4), 463-475.
Krohn, M. D. (1986). The web of conformity: A network approach to the explanation of delinquent behavior. Social Problems, 32, 455–473.
Laney, D. (2001). 3-D data management: Controlling data volume, velocity and variety. Application Delivery Strategies by META Group Inc. disponibile sul sito, available at: https://blogs. gartner. com/doug-laney/files/2012/01/ad949-3D-Data-Management-Controlling-Data-Volume-Velocity-and-Variety. pdf (accessed 6 February 2001).
Laumann, E. O., Galaskiewicz, J., & Marsden, P. V. (1978). Community structure as inter organizational linkages. Annual Review of Sociology, 4(1), 455-484.
Laestadius, L. & Witt, A. (2022). Instagram revisited. In The SAGE handbook of social media research methods (2nd ed.) (pp. 581-597).
Malm, A., Bichler, G., & Nash, R. (2011). Co-offending between criminal enterprise groups. Global Crime, 12(2), 112-128.
Malm, A. E., Kinney, J. B., & Pollard, N. R. (2008). Social network and distance correlates of criminal associates involved in illicit drug production. Security Journal, 21(1), 77-94.
McCuddy, T., & Vogel, M. (2015). More than just friends: Online social networks and offending. Criminal Justice Review, 40(2), 169-189.
McCuish, E. C., Bouchard, M., & Corrado, R. R. (2015). The search for suitable homicide co-offenders among gang members. Journal of Contemporary Criminal Justice, 31(3), 319–336.
McDonald, H., Hortsmann, B., Strom, K., & Pope, M. (2009). The impact of the internet on deviant behavior and deviant communities. Washington, DC: Institute for Homeland Security Solutions. Retrieved October 15, 2014 from http://sites.duke.edu/ihss/files/2011/12/IRW-Literature-Reviews-Deviance-and-the-Internet.Pdf
McGloin, J. M., & Nguyen, H. (2013). The importance of studying co-offending networks for criminological theory and policy. In C. Morselli (Ed.). Crime and networks (pp. 13-27). New York: Routledge.
Mercken, L., Candel, M., Willems, P., & De Vries, H. (2007). Disentangling social selection and social influence effects on adolescent smoking: the importance of reciprocity in friendships. Addiction, 102(9), 1483-1492.
Mitchell, J. C. (1969). The concept and use of social networks. In J. Clyde Mitchell (ed.). Social networks in urban situations (Pp. 1-50). Manchester: The University Press.
Moreno, J. L. (1947). Contributions of sociometry to research methodology in sociology. American Sociological Review, 12(3), 287-292.
Moreno, J. L., & Jennings, H. H. (1938). Statistics of social configurations. Sociometry, 342-374.
Morselli, C. (2001). Structuring Mr. Nice: Entrepreneurial opportunities and brokerage positioning in the cannabis trade. Crime, law and social change, 35(3), 203-244.
Morselli, C. (2003). Career opportunities and network-based privileges in the Cosa Nostra. Crime, Law and Social Change, 39(4), 383-418.
Morselli, C. (2009). Inside criminal networks (Vol. 8). New York: Springer.
Morselli, C., & Petit, K. (2007). Law-enforcement disruption of a drug importation network. Global Crime, 8(2), 109-130.
Nash, R., Bouchard, M., & Malm, A. (2013). Investing in people: The role of social networks in the diffusion of a large-scale fraud. Social networks, 35(4), 686-698.
Nau, C., & Quan-Haase, A. (2022). Defining social media and asking social media research questions: How well does the Swiss army knife metaphor apply?. In The Sage handbook of social media research methods (pp. 13-26). Sage.
Netlytic. (2023). About. Retrived from https://netlytic.org/home/?page_id=10834
Newman, G. R., & Clarke, R. V. (2013). Superhighway robbery. London: Willan.
Papachristos, A. V. (2009). Murder by structure: Dominance relations and the social structure of gang homicide. American journal of sociology, 115(1), 74-128.
Papachristos, A. V. (2014). The network structure of crime. Sociology Compass, 8(4), 347-357.
Papachristos, A. V., Braga, A. A., & Hureau, D. M. (2012). Social networks and the risk of gunshot injury. Journal of Urban Health, 89(6), 992-1003.
Papachristos, A. V., Hureau, D. M., & Braga, A. A. (2013). The corner and the crew: The influence of geography and social networks on gang violence. American sociological review, 78(3), 417-447.
Patton, D., Eschmann, R., & Butler, D. (2013). Internet banging: New trends in social media, gang violence, masculinity and hip hop. Computers in Human Behavior, 29, A54–A59.
Parks, R. F., Lowry, P. B., Wigand, R. T., Agarwal, N., & Williams, T. L. (2018). Why students engage in cyber-cheating through a collective movement: A case of deviance and collusion. Computers & Education, 125, 308-326.
Pyrooz, D., Decker, S., & Moule, R. (2013). Criminal and routine activities in online settings: Gangs, offenders, and the internet. Justice Quarterly, 30, 1–29.
Rambaran, J. A., Dijkstra, J. K., & Veenstra, R. (2020). Bullying as a group process in childhood: A longitudinal social network analysis. Child development, 91(4), 1336-1352.
Reynolds, A. D., & Crea, T. M. (2015). Peer influence processes for youth delinquency and depression. Journal of adolescence, 43, 83-95.
Rice, E., & Yoshioka-Maxwell, A. (2015). Social network analysis as a toolkit for the science of social work. Journal of the Society for Social Work and Research, 6(3), 369-383.
Sarnecki, J. (2001). Delinquent Networks: Youth Co-offending in Stockholm. Cambridge, UK: Cambridge University Press.
Sageman, M. (2004). Understanding terror networks. Philadelphia, PA: University of Pennsylvania Press.
Schaefer, D. R. (2012). Youth co-offending networks: An investigation of social and spatial effects. Social networks, 34(1), 141-149.Siegel, L. J. (2016). Criminology: Theories, patterns and typologies. Boston. USA: Cengage.
Short, J. F., & Strodtbeck, F. L. (1965). Group process and gang delinquency (pp. 25-46). Chicago: University of Chicago Press.
Smith, G. J., Bennett Moses, L., & Chan, J. (2017). The challenges of doing criminology in the big data era: Towards a digital and data-driven approach. The British journal of criminology, 57(2), 259-274.
Socialdatalab. (2023). Introducing COSMOS 2.0. Retrived from http://socialdatalab.net/cosmos-blog
Tayebi, M., Glässer, U., & Andresen, M. A. (2020). Future applications of big data in environmental criminology. In Big Data (pp. 40-53). Routledge.
Tita, G. E., & Radil, S. M. (2011). Spatializing the social networks of gangs to explore patterns of violence. Journal of Quantitative Criminolo - -gy, 27(4), 521-545.
Waring, E. (2018). Co-offending as a network form of social organization. In Crime & Social Organization (pp. 31-48). Routledge.
Wasserman, S., & Faust, K. (1994). Social network analysis: Methods and applications (Vol. 8). Cambridge, UK: Cambridge University Press.
Weerman, F. M. (2011). Delinquent peers in context: A longitudinal network analysis of selection and influence effects. Criminology, 49(1), 253-286.
Westlake, B. G., & Bouchard, M. (2016a). Liking and hyperlinking: Community detection in online child sexual exploitation networks. Social science research, 59, 23-36.
Westlake, B. G., & Bouchard, M. (2016b). Criminal careers in cyberspace: Examining website failure within child exploitation networks. Justice Quarterly, 33(7), 1154-1181.
Weulen Kranenbarg, M., Ruiter, S., & Van Gelder, J. L. (2021). Do cyber-birds flock together? Comparing deviance among social network members of cyber-dependent offenders and traditional offenders. European Journal of Criminology, 18(3), 386-406.
White, W. E., & Carmody, D. (2018). Preventing online victimization: College students’ views on intervention and prevention. Journal of interpersonal violence, 33(14), 1-17.
Williams, M. L. (2015). Towards an ethical framework for using social media data in social research. presented at Social Research Association Workshop, Institute of Education, 15 June 2015, available at http://the-sra.org.uk/wp-content/uploads/ethicsin-social-media-research-matthew-williams.pdf.
Williams, M. L., Burnap, P., & Sloan, L. (2017). Crime sensing with big data: The affordances and limitations of using open-source communicatio- -ns to estimate crime patterns. The British Journal of Criminology, 57(2), 320-340.
Zeller, F. (2022). The Good, the Bad, and the How-to of Analysing Social Media Data. In The SAGE Handbook of Social Media Research Methods, (pp. 363-381).