Bulach,T; Osborn, R., & Samara, M., (2012) Bullying in Secondary Schools: What it looks like aiitl How to Manage it?. New York: Sage Publishing.
Connell, N., Schell-Busey, N., Pearce, A., & Negro, P. (2013). Badgrlz? Exploring sex differences in cyberbullying behaviors. Youth Violence and Juvenile Justice, 12 (3), 209.
Debray Stéphane (2013) Internet face aux substances illicite complice de la cybercriminalité ou outil de prevention – DESS media électronique et internet – uinversité de Paris.
Jaana, J; Cornell, D; Sheras, G. (2011). Identification of School Bullies by Survery Methods. Professional School Counseling, 9 ,(4), 305 - 313.
Kotler, James. “A Survey of Sanctions Awarded for E-Discovery Violations.” Proof, Vol. 17, No. (2), American Bar Association, (Winter 2009(.
Kraut, R., Patterson, M., lundmark, V., kiesler, S., Mukophadhyay, T. & scherlis, W. (1998). Internet paradox: A social technology that reduces social involvement and psychological well-being? American Psychologist, 53(9), 1017- 1031.
Lapidot-Lefler, N., & Dolev-Cohen, M. (2015). Comparing cyberbullying and school bullying among school students: prevalence, gender, and grade level differences. Social psychology of education, 18(1), 1-16.
Lim, Cher Ping, Yan, Hanbing & Xiong, Xibei. (2015). Development of pre-service teachers’ information and communication technology (ICT) in education competencies in a mainland Chinese university. Educational Media International, 52(1), 15-32.
Lipson, G. (2001). Bullying in schools fighting the bully Battle. Eribaum: National School Safety Center, NJ.
Rossein, Merrick T. Nuts and Bolts of Electronic Evidence. Employment Discrimination Law and Litigation, (November 2010).
Sheikli, Mazen Haitham Razouki. "Firewall Using Genetic Algorithm as Computational Tools." Al - Ma'amoun College Journal: Al - Ma'moun College, University, p. 24 (2014): 217 - 228.
Shepherd, K. & Edelmann, M. (2005) Reasons for internet use and anxiety, Journal of Personality and Individual Differences, 39(5), 949-958.