[1] خالقی، ابوالفتح و ثقفی، پریسا (1401). تحریم اینترنتی: کنش یا واکنش کیفری در سطح حقوق بینالملل. پژوهش حقوق کیفری، 11(40)، 105-125.
[2] ضیایی، سیدیاسر و محمدیثقفی، علیرضا (1393). تحریم اشخاص حقیقی از منظر حقوق بینالملل با تأکید بر تحریم برخی اتباع ایرانی. مجله حقوقی دادگستری،78(88)، 145-178.
[3]علوی، سیدحسین، حسینی، محمدرضا و رامک، مهراب (1402). بررسی ََِچگونگی اعمال حاکمیت بر قلمرو سایبری ملی بهمثابه قدرت نرم در پرتو حقوق بینالملل. مطالعات قدرت نرم، 13(4)، 35-54.
[4] گوردون، ریچارد، اسمیت، میشل و کورنل، تام (1400). حقوق تحریم. ترجمه سعید باغبانکندری. چاپ اول. تهران: اداره چاپ و انتشارت
وزارت امورخارجه.
[5] ماتامفارال، جرمی (1399). تحریمهای سازمان ملل متحد و حاکمیت قانون. ترجمه مجید عباسی و احمدرضا عصاری. چاپ اول. تهران: بنیاد حقوقی میزان.
[6] نمامیان، پیمان و حسینی، میرهادی (1402). سرکوب اقدامهای تروریستی با تحریمهای اقتصادی سازمان ملل متحد. پژوهشهای حقوق اقتصادی و تجاری، 1(2)، 149-172.
[7] نمامیان، پیمان و حسینی، میرهادی (1403). رویکردها و سازوکارهای رویارویی با پولشویی دیجیتالی در موازین بینالمللی. پژوهشهای حقوق مالی و اقتصادی، 1(2)، 149-172.
[8] Abikoye, B., Ebunlomo, U., Stanley Chidozie, A., Adesola O., & Ayodele, O. (2024). Regulatory compliance and efficiency in financial technologies: Challenges and innovations. World Journal of Advanced Research and Reviews, 23(1), 1830-1844.
[9] Adel, A. & Norouzifard, M. (2024). Weaponization of the growing cybercrimes inside the dark net: The question of detection and application. Big Data Cognition and Computation, 8(91), 1-37.
[10] Afina, Y., Buchser, M., Krasodomski, A., Rowe, J., Sun, N. & Wilkinson, R. (2024). Towards a global approach to digital platform regulation: Preserving openness amid the push for internet sovereignty (Research Paper). Chatham House, the Royal Institute of International Affairs. Digital Society Initiative.
[11] Antoniuk, D. (2024, July 19). US sanctions two members of Russian ‘Cyber Army’ hacktivist group. The Record. https://therecord.media/cyber-army-russia-us-sanctions
[12] Alavi, S.H.R. (2024). The evolution of cyber conflicts and its impact on international security: A comprehensive analysis [Tesi di laurea, Università degli Studi di Padova, Scuola di Economia e Scienze politiche, European and Global Studies]. https://thesis.unipd.it/retrieve/9ecfb519-e683-4fb6-8a26-a8d1d129bc21/Thesis-SeyedhamidrezaAlavi.pdf
[13] Al-Qarawee, H.H. (2015). The discourse of ISIS: Messages, propaganda, and indoctrination. In Monica Maggioni & Paolo Magri (Eds.), Twitter and jihad: The communication strategy of ISIS (pp. 145-166). ISPI. Via Clerici, 5.
[14] Bogdanova, I. (2022). The legality of unilateral economic sanctions under public international law. In Unilateral sanctions in international law and the enforcement of human rights: The impact of the principle of common concern of humankind (Vol. 9, pp. 59–158). Brill Nijhoff.
[15] Burgess, A., Hamilton, R. & Leuprecht, C. (2024). Terror on the blockchain: The emergent crypto-crimeterror nexus. In Doron Goldbarsht & Louis de Koker (Eds.), Financial crime, law and governance: Navigating challenges in different contexts (pp. 203-227). Springer.
[16] Chertoff, M., Bury, P. & Richterova, D. (2020). Bytes not waves: Information communication technologies, global jihadism, and counterterrorism. International Affairs, 96(5), 1305-1325.
[17] Davis, S. (2021). Economic sanctions, communication infrastructures, and the destruction of communicative sovereignty. In Sanctions as war: Anti-imperialist perspectives on American geo-economic strategy (Vol. 212, pp. 63-76). Brill.
[18] Dowlah, C. (2025). Economic and financial sanctions of the United States: Legal perspectives. In Economic and
financial sanctions under international law (pp. 28-69). Cambridge University Press.
[19] Douhan, A. (2022). The changing nature of sanctions in the digital age. In Digital transformations in public international law (1st ed., Vol. 317, pp. 99–132). https://sanctionsplatform.ohchr.org/record/20981?ln=en&v=pdf
[20] De Silva De Alwis, R. (2025). Gendering the new international convention on cybercrimes and new norms on artificial intelligence and emerging technologies. Washington Journal of Law, Technology & Arts, 20(2), 1-41.
[21] Erickson, J.L. (2020). Punishing the violators? Arms embargoes and economic sanctions as tools of norm enforcement. Review of International Studies, 46(1), 96-120.
[22] Passalacqua, M. (2024). Online radicalization and cybersecurity: Case study - Belgium [PDF]. University of Bologna. Prepared for Cybersecurity & Cyber Warfare Courses.
[23] Packin, N.G. & Volovelsky, U. (2024). Digital assets, anti-money laundering, and counter financing of terrorism: An analysis of evolving regulations and enforcement in the era of NFTs. In N. G. Packin (Ed.), The Cambridge Handbook of Law and Policy for NFTs (pp. 78-102). Cambridge University Press.
[24] Purcell, J., Schantz, D. & Shire, J. (2023). Terrorismrelated targeted financial sanctions. In C. A. El Khoury (Ed.), Countering the financing of terrorism: Good practices to enhance effectiveness (pp. 113-152). International Monetary Fund.
[25] Pytlak, A. & Lad, S. (2024). The UN Security Council discussescyberthreatstointernationalsecurity: Highlights and takeaways from a Security Council meeting on the cyber threat landscape and implications for international peace and security. The Henry L. Stimson Center. (April 15). https://www.stimson.org/2024/un-security-councilcyber-threats-to-international-security/
[26] Giumelli, F., Hoffmann, F. & Książczaková, A. (2021). The when, what, where and why of European Union sanctions. European Security, 30(1), 1-23.
[27] Gul, S. & Ullah, N. (2024). Cybersecurity and international law: Addressing state responsibility in a digitally interconnected world. International Journal of Human and Society (IJHS), 4(3), 601-609.
[28] Jayawickrama, N. (2017). The right to freedom of movement. In The judicial application of human rights law: National, regional and international jurisprudence (pp. 448–489). Cambridge University Press.
[29] Kuleshova, G. (2020). The legal basis of countering cyber-terrorism in Russia and in other countries from the standpoint of its social and political dimension. Russian Journal of Criminology, 14(1), 156-165.
[30] Kuzior, A., Tiutiunyk, I., Zielińska, A. & Kelemen, R. (2024). Cybersecurity and cybercrime: Current trends and threats. Journal of International Studies, 17(2), 220-239.
[31] Nave, E. & Lane, L. (2023). Countering online hate speech: How does human rights due diligence impact terms of service? Computer Law & Security Review, 51, 105884, 1-18.
[32] McDonnell, E. (2024). Challenging externalisation through the lens of the human right to leave. Netherlands International Law Review, 71(2), 119-154.
[33] Miao, M. (2024). Regulating digital platforms through sanctions. Washington International Law Journal, 33(2), 389-452.
[34] Moiseienko, A. (2024). Crime and sanctions: Beyond sanctions as a foreign policy tool. German Law Journal, 25(1), 17-47.
[35] Faraji Dizaji, S. & Murshed, S.M. (2024). External arms embargoes and their implications for government expenditure, democracy, and internal conflict. World Development, 173, 106410, 1-17.
[36] Farber, S. (2025). The evolving nexus of cybercrime and terrorism: A systematic review of convergence and policy implications. Security Journal, 38(29), 1-23.
[37] Fidler, D.P. (2016). Cyberspace, terrorism and international law. Journal of Conflict and Security Law, 21(3), 463-485.
[38] Fidler, M. (2025). Fragmentation of international cybercrime law. Utah Law Review, 3(4), 737-804.
[39] Ferreira, I.C. (2024). Description of the Financial Action Task Force. In The legal status of the Financial Action Task Force in the international legal system (Vol. 7, pp. 8-120). Brill Nijhoff.
[40] Tsesis, A. (2017). Social media accountability for terrorist propaganda. Fordham Law Review, 86(3), 605-631.
[41] Lombardo, G. & El Khoury, C. (2023). Investigating, prosecuting, and sanctioning terrorist financiers. In Chady El Khoury (Ed.), Countering the financing of terrorism: Good practices to enhance effectiveness (pp. 89-112). International Monetary Fund.
[42] Lemnitzer, J.M. (2022). Back to the roots: The laws of neutrality and the future of due diligence in cyberspace. The European Journal of International Law, 33(3), 789-819.
[43] Li, E. (2019). Fighting the “Three Evils”: A structural analysis of counter-terrorism legal architecture in China. Emory International Law Review, 33(4), 311-365.
[44] Theodore, O. (2017). How international law can deal with lack of sanctions and binding targets in the Paris Agreement. Journal of Sustainable Development, 10(5), 225-241.
[45] Tran, D. (2018). The law of attribution: Rules for attributing the source of a cyber-attack. Yale Journal of Law & Technology, 20(3), 376-441.
[46] Wood, M. (2013). The role of the UN Security Council in relation to the use of force against terrorists. In Larissa van den Herik & Nico Schrijver (Eds.), Counterterrorism strategies in a fragmented international legal order: Meeting the challenges (pp. 317-333). Cambridge University Press.
[47] Stănciulescu, A. & Andreea, A.M. (2025). Impact of digital platforms on individual rights. In Encyclopedia of contemporary constitutionalism (pp. 1–10). Latest edition.