Document Type : Original Article


1 Media Management, Imam Reza International University, Mashhad

2 Assistant Prof. in Media Management, Islamic Azad University, Tehran Department of Communication


The paper reviewing research texts in the field of general policy making of virtual space, provides a comprehensive classification plan for future research in this area. The study reviewed articles published in English-language research publications between 1979 and 2015, based on the existing literature.
 Using a simple single-criterion method, according to the results, 427 articles from 267 valid scientific journals were identified. All of them were analyzed based on the year of publication, the number of papers in the selected journal, and topics in a particular area. This research, can be used for public decision making and policy making in this field as a comprehensive and valuable resource in policy making of virtual space.


Al-Kadhi, M. A. (2011). Assessment of the Status of spam in the Kingdom of Saudi Arabia. Journal of King Saud University – Computer and Information Sciences, Vol. 23, No. 2, P. 50. doi:10.1016/j.jksuci.2011.05.001
American Nurses Association. (1991, October 22). Retired PositionStatement: Cultural Diversity in Nursing Practice.
Archuleta, K. S. & Steinfeld, L. (2006). Privacy Protection and Compliance in Higher Education: The Role of the CPO. EDUCAUSE Review, Vol. 41, No. 5, P. 68.
Basel Committee on Banking Supervision. (1998, March). Risk Management for Electronic Banking and Eectronic Money Activities.
Benkler, Y. (2000). From Consumers to Users: Shifting the Deeper Structures of Regulation Towards Sustainable Commons and User Access. Federal Communications Law Journal, Vol. 52, No. 3, Pp. 561-579.
Best, S. J. & Teske, P. (2002). Explaining State Internet Sales Taxation: New Economy, Old-Fashioned Interest Group Politics. State Politics & Policy Quarterly, Vol. 2, No. 1, Pp. 37-51.
European Central Bank. (2012). Virtual Currency Schemes. Frankfurt am Main: European Central Bank.
Girsberger, D. & Schramm, D. (2002). Cyber-Arbitration. European Business Organization Law Review, Vol. 3, No. 3, Pp. 611-628. doi:10.1017/S1566752900001075
Iosifidis, P. (2002). Digital Convergence: Challenges for European Regulation. Javnost - The Public, Vol. 9, No. 3, Pp. 27-47. doi:10.1080/13183222.2002.11008805
Kelly, B. (1999). The Evolution of web Protocols. Journal of Documentation, Vol. 55, No. 1, Pp.71 - 81. doi:10.1108/EUM0000000007138
Kling, R.; Lee, Y. C.; Teich, A. & Frankel, M. S. (1999). Assessing Anonymous Communication on the Internet: Policy Deliberations. The Information Society: An International Journal, Vol. 15, No. 2, Pp. 79-90. doi:10.1080/019722499128547
Lamberton, D. (1996). A Telecommunications Infrastructure is not an Information Infrastructure. Prometheus: Critical Studies in Innovation, Vol. 14, No. 1, Pp. 31-38. doi:10.1080/08109029608632014
Lanham Act 15 U.S.C. & 1127. (1988). Retrieved from,
Manheim, K. M. & Solum, L. B. (2003). An Economic Analysis of Domain Name Policy. Hastings Communications and Entertainment Law Journal, Vol. 25, No. 3, Pp. 359-498.
Mell, P. & Grance, T. (2011). The NIST Definition of Cloud Computing. Gaithersburg, MD: Computer Security Division Information Technology Laboratory National Institute of Standards and Technology.
Meuller, M. L. (2004). Ruling the Root: Internet Governance and the Taming of Cyberspace. Massachusetts London, England: MIT Press Cambridge.
Mueller, M. L. (2010). Networks and States: The Global Politics of Internet Governance. MIT Press.
Natarajan, M. (2006). Use of online Technology for Multimedia Education. Information Services & Use, Vol. 26, No. 3, P. 250.
Nord, J. H. & Nord, G. D. (1995). MIS Research: Journal Status Assessment and Analysis. Information & Management, Vol. 29, No. 1, Pp. 29 - 42. doi:10.1016/0378-7206(95)00010-T
OECD. (2001). Understanding the Digital Divide. Paris: OECD Publishing. doi:10.1787/236405667766
Perset, K. (2010). The Economic and Social Role of Internet Intermediaries. Directorate for Science Technology and Industry. Paris: Organisation for Economic and Co-operation and Development DSTI/ICCP (2009) 9/ FINAL.
Psannis, K. E.; Xinogalos, S. & Sifaleras, A. (2014). Convergence of Internet of things and Mobile Cloud Computing. Systems Science & Control Engineering, Vol. 2, No. 1, Pp. 476-483. doi:10.1080/21642583.2014.913213
Pusey, P. & Sadera, W. A. (2011). Cyberethics, Cybersafety, and Cybersecurity. Journal of Digital Learning in Teacher Education, Vol. 28, No. 2, P. 82. doi:10.1080/21532974.2011.10784684
Rosenoer, J. (1997). CyberLaw: the law of the Internet (1st ed.). New York, Inc.: Springer-Verlag. doi: 0.1007/978-1-4612-4064-8
Ryan, S. M.; Plzak, R. A. & Curran, J. (2007). Legal and Policy Aspects of Internet Number Resources. Santa Clara High Technology Law Journal, Vol. 24, No. 2, Pp. 335-374.
Shirey, R. (2007). Internet Security Glossary, Version 2. Retrieved from
The Universal Declaration of Human Rights. (1948, December 10). United Nations. Retrieved from
Walker, D. B. (1999). Privacy in the Digital Age: Encryption Policy-A Call for Congressional Action. Stanford Technology Law Review, 3, P. 12.
Wall, D. (2004). What are Cybercrimes? Criminal Justice Matters, Vol. 58, No. 1, Pp. 20-21. doi:10.1080/09627250408553239
WGIG (The Working Group on Internet Governance). (2005). Report of the Working Group on Internet Governance. Retrieved from,
World Trade Organization (WTO). (1998). Work Programme on Electronic Commerce. Geneva.
Wu, T. (2003). Network Neutrality, Broadband Discrimination. Journal of Telecommunications and High Technology Law, Vol. 2, No .1, Pp. 141-176.