1-اصلانی، حمیدرضا، (1389)، حقوق فناوری اطلاعات (چاپ دوم)، تهران، میزان.
2-تقی پور، عبدا...، (1390)، دولت الکترونیکی (چاپ اول)، تهران، مبنای خرد.
3-روسو، ژان ژاک، (1366)، قرارداد اجتماعی یا اصول حقوقسیاسی(چاپ اول)،(منوچهرکیا)، تهران، گنجینه.
4-عالم، عبدالرحمن، (1380)، بنیادهای علم سیاست(چاپ اول)، تهران، نشر نی.
5-کاتوزیان، ناصر، (1366)، فلسفه حقوق، جلد اول(چاپ اول)، تهران، انتشارات بهنشر.
6-یعقوبی، نورمحمد، (1392)، دولت الکترونیک: رویکرد مدیریتی(چاپ سوم)، تهران، افکار.
7-Abu-Shanab, E., (2014), Antecedents of trust in e-government services: an empirical test in Jordan. Transforming Government: People, Process and Policy, 8(4), 480-499.
8-Anthony, D., Stablein, T., & Carian, E. K., (2015), Big Brother in the information age: Concerns about government information gathering over time, IEEE Security & Privacy, (4), 12-19.
9-Belanger, F., & Hiller, J. S., (2006), A framework for e-government: privacy implications, Business Process Management Journal , 12(1), 48-60.
10-BeVier, L. R., (1995), Information about individuals in the hands of government: some reflections on mechanisms for privacy protection, William and Mary Bill of Rights Journal, 4(2), 455-506.
11-Canadian Personal Information Protection Act, [2015], [online], Personal Information Protection & Electronic Documents Act of 2015(PIPEDA), <
https://www.priv.gc.ca>[17/08/2015].
12-Cullen, R., (2009), THEME ARTICLE Culture, identity and information privacy in the age of digital government, Online Information Review, 33(3), 405-421.
13-Cullen, R., & Reilly, P., (2007), Information privacy and trust in government: a citizen-basedperspective from New Zealand, Journal of Information Technology and Politics, 4(3), 61-80.
15-Douglas, R, [2016], [online], Identity Theft Victim Statistics, <www.identitytheft.info/about.aspx>[13/01/2016].
16-England Data Protection Act, [1998], [online], Data Protection Act of 1998(DPA), <https://ico.org.uk>[17/08/2015].
19-Gayton, C. M., (2006), Beyond terrorism: data collection and responsibility for privacy, The journal of information and knowledge management systems, 36(4), 377-394.
20-Germany Federal Data Protection Act, [2014], [online], Federal Data Protection Act of 2014(FDPA), <
www.bfdi.bund.de> [17/08/2015].
22-James, G., (2000), Empowering bureaucrats, MC Technology Marketing Intelligence , 20(12), 62-68.
23-Korean Personal Information Protection Act, [2011], [online], Personal Information Protection Act of 2011(PIPA),<
www.law.go.kr>[17/08/2015].
24-Landau, S., (2014), Making Sense of Snowden Part II: What’s Significant in the NSA Surveillance Revelations. IEEE Security and Privacy, 12(1), 62-64.
26-Spanish Data Protection Act, [2008], [online], Data Protection Act, <
www.agpd.es>[17/08/2015].
28-Stanford Encyclopedia of Philosophy, [2016], [online], Information Privay Definition, <
http://plato.stanford.edu >[12/01/2016].
29-Stark, L., (2016), The emotional context of information privacy, The Information Society, 32(1), 14-27.
30-Thibodeau, P., (2000), E-government spending to soar through. Computerworld , 34 (17), 12-13.
31-Westin, A., (1967), Privacy and Freedom, New York, Atheneum.