1. Alizadeh Bahrami K, Abdullahi Fard. (2016) "J48 Decision Tree in Intelligent Intrusion Detection Systems", National Conference on New Researches in Electrical, Computer and Medical Engineering, Islamic Azad University, Kazeroon Branch. [Persian]
2. Atafar A, Khazaei Pool J, Pour Mostafa Khoshkroudi M. (2012), Factors Affecting the Adoption of Information Technology in Tourism Industry, Tourism Management Studies. 7(18): 131-156. [Persian]
3. Awazu Y, Desouza KC. (2004). The Knowlege Chiefs: CKOs, CLOs and CPOs. European Management Journal. 22(3): 339-344. [
DOI:10.1016/j.emj.2004.04.009]
4. Baharloo Y. (2020). "Improving the method of identifying phishing websites using data mining on web pages", Iranian Journal of Information and Communication Technology, Iranian Information and Communication Technology Association. 12(44): 27-38. [Persian]
5. Bamberger KA, Mulligan DK. (2013). Business perceptions and satisfaction with e-government Information Quarterly. 30(1): 1-9. [
DOI:10.1016/j.giq.2012.06.009]
6. Buhalis D, Law R. (2008). Progress in information technology and tourism management: 20 years on and 10 years after the internet- the state of etourism research. Tourism management. 29(4): 609:623. [
DOI:10.1016/j.tourman.2008.01.005]
7. Büyüközkan G, Ergün B. (2011). Intelligent System Applications in Electronic Tourism, Expert Systems with Applications. 38(6): 6586- 6598.
https://doi.org/10.1016/j.eswa.2011.01.103
https://doi.org/10.1016/j.eswa.2010.11.080 [
DOI:10.1016/j.eswa.2011.04.171]
8. Chaudhry JA, Rittenhouse RG. (2015). "Phishing: Classification and Countermeasures", 7th International Conferece on Multimedia, Computer Graphics and Broadcasting. 28-31. [
DOI:10.1109/MulGraB.2015.17] [
PMID]
9. Doshi R, Noah A, Nick F. (2018). "Machine learning ddos detection for onsumer internet of things devices." 2018 IEEE Security and Privacy Workshops (SPW). [
DOI:10.1109/SPW.2018.00013]
10. Ismaili M. (2013). Concepts and Techniques of Data Mining, Kashan: Sura. [Persian]
11. Jensen C, Potts C, Jensen C. (2005). Privacy practices of Internet users: Self-reports versus observed behavior. International Journal of Human-Computer Studies. 63(1-2): 203-227. [
DOI:10.1016/j.ijhcs.2005.04.019]
12. Jutla DN, Bodonk P, Zhang Y. (2006). PeCAN: An architecture for users privacy-aware electronic commerce contexts on the semantic web. Information Systems. 31(4): 295-320. [
DOI:10.1016/j.is.2005.02.004]
13. Khosravi title A, Ganjoo M, Mazarei H. (2017), Presenting a Model for Privacy Concerns in Electronic Banking, Third International Conference, Web Research.
14. Langari N, Abdolrazaqnejad M. (2015). "Identification of Phishing Website in Internet Banking Using Sloping Page Optimization Algorithm", Journal of Electronic and Cyber Defense. 1: 40-29. [Persian]
15. Latif Sh. (2020). "A Novel Attack Detection Scheme for the Industrial Internet of Things Using a Lightweight Random Neural Network." (8): 89337-89350. [Persian] [
DOI:10.1109/ACCESS.2020.2994079]
16. Laufer RS, Wolfe M. (1977). Privacy as a Concept and a Social Issue: Amultidimensional Developmentl Developmental Theory. Journal of Social ISSues, 33(3): 22-42. [
DOI:10.1111/j.1540-4560.1977.tb01880.x]
17. Ma'ouni M. (2015). "Detection of attacks in electronic banking using fuzzy-rough combination system (Fuzzy_rough)" Department of Computer, Imam Reza University (AS). [Persian]
18. Manimurugan S. (2020). "Effective Attack Detection in Internet of Medical Things Smart Environment Using a Deep Belief Neural Network." (8): 77396-77404. [
DOI:10.1109/ACCESS.2020.2986013]
19. Milne GR, Gordon ME. Direct mail privacy-efficiency trade-offs within an implied social contract framework. Journal of Pulicy and Marketing. 12(2): 206-215. [
DOI:10.1177/074391569101200206]
20. Mohammad RM, Thabtah F, McCluskey L. (2015). "Tutorial and critical analysis of phishing websites methods", Computer Science Review. 17: 1-24. [
DOI:10.1016/j.cosrev.2015.04.001]
21. Morvati Sharifabadi A, Asadian Ardakani F. (2014), Presenting a health tourism development model with an integrated approach of fuzzy TOPSIS and interpretive structural modeling in Yazd province, Health Management. 17(55): 73-8. [Persian]
22. Pandey M, Ravi V. (2012). "Detecting phishing e-mails using Text and Data mining", IEEE International Conference on Computational Intelligence and Computing Research(ICCIC). 2012. [
DOI:10.1109/ICCIC.2012.6510259]
23. Rezaei F, Afshar Kazemi MA, Keramati MA. (2021). Detection of E-commerce Attacks and Anomalies using Adaptive Neuro-Fuzzy Inference System and Firefly Optimization Algorithm . 13(1) :32-39. [Persian] [
DOI:10.52547/ijict.13.1.32]
24. Shafi'i S. (2010). Civil Liability for Violation of Privacy, Master Thesis in Private Law, Kashan University. [Persian]
25. Singh P, Jain N, Maini A.(2015). "Investigating the Effect Of Feature Selection and Dimensionality Reduction On Phishing Website Classification Problem", 1st International Conference on Next Generation Computing Technologies (NGCT) Dehradun, India. 388-393. [
DOI:10.1109/NGCT.2015.7375147]
26. Syed Naeem F. (2020). "Denial of service attack detection through machine learning for the IoT." Journal of Information and Telecommunication. 1-22.