SİBER GÜVENLİĞİN SAĞLANMASINDA ULUSLARARASI HUKUKUN VE TÜRK HUKUKUNUN ROLÜ

Teknolojinin gelişmesiyle birlikte, enerji, haberleşme, su kaynakları, tarım, sağlık, ulaşım, eğitim ve finansal hizmetler gibi kritik altyapı sektörlerinde faaliyet gösteren kamu kurumları ile özel kurum ve kuruluşlar bilgi ve iletişim teknolojilerini kullanmaya başlamışlardır. Ancak siber ortamın, önemli kamu hizmetlerinde ve özel kişilerin sağladığı hizmetlerde kullanılması, beraberinde yeni bir güvenlik sorunu; aynı şekilde özel şahısların pek çok faaliyetine sirayet eden bilgisayar kullanımı, beraberinde yeni bir suç tipi doğurmuştur. İşbu noktada siber güvenlik, siber faaliyetlerin aksamasının yaratacağı sonuçlar göz önüne alındığında hem ulusal hem de uluslararası bir mesele olarak karşımıza çıkmaktadır. Dolayısıyla, siber güvenliğin sağlanması ve muhafazasında hem ulusal hukuk düzeninin hem de uluslararası hukuk düzeninin rolü yadsınamaz.

The Role of Internatıonal Law and Turkish Law in Providıng Cyber Security

Along with the development of the technology, public facilities and private facilities which operates at the critical infrastructures like energy, communication, water resources, agriculture, transportation, education and financial services have started use information and communication technologies. However, the utilization of cyber platform for the public services and the services provided by the private persons has raised a brand new security problem, in the same way the computer usage which spread into private person’s a lot of activities has caused to create a brand new crime type. At this point cyber security constitutes a national and international issue, considering the consequences which are caused by the hitch of the cyber activities. Therefore, the role of national and international law cannot be ignored to provide and to maintain the cybersecurity.

___

  • Kitap ve Makaleler
  • ALTUNDAL, Ömer Faruk, “DDoS Nedir, Ne Değildir?” http://www.academia.edu/14209169/SİBER_GÜVENLİK_DERNEĞİ_ DDo_S_nedir_ne_değildir, (e.t. 01.04.2018).
  • BARLOW, John Perry, A Declaration of the Independence of Cyberspace, ELECTRONIC FRONTIER FOUND., 8 February 1996), bkz. https://www.eff.org/ cyberspace-independence (e.t. 15.04.2018).
  • BARRY, Sean; “Smoking Microchips Tells It All : Computer Forensic Experts Mine Hard Drives For Data That Too-Clever Users Thought Long Deleted”, http://www.dataforensics. com/articles/ smoking_ microchip_ tells_it_all.pdf, (e.t. 15.10.2017).
  • BAŞEREN, Sertaç Hami, Uluslararası Hukukta Devletlerin Münferiden Kuvvet Kullanmalarının Sınırları, Ankara Üniversitesi Basımevi, Ankara 2003, ss. 1- 19.
  • BENTHELEM, Sir Daniel QC, “Principles relevant to the Scope of a State’s Right of Self-Defence against an Imminent or Actual Armed Attack by Non-State Actors,” Amer. JIL., Vol. 106, 2012.
  • BOOTHBY, William H., “Methods and Means of Cyber Warfare”, International Law Studies, Vol. 89, 2013.
  • BOZDOĞAN AKBULUT, Berrin; “Bilişim Suçları”, Selçuk Üniversitesi Hukuk Fakültesi Dergisi Milenyum Armağanı, Sayı 1-2, C. 8, Konya, 2000.
  • BRING, Owe, “The Use of Force under the UN Charter: Modification and Reform through Practice or Consensus”, içinde International Law and Changing Perceptions of Security Liber Amicorum Said Mahmoudi (EBBESSON, Jonas vd. ed.), BRILL, The Netherlands, 2014.
  • BROWN, Gary, “International Law Applies to Cyber Warfare! Now What?, Southwestern Law Review, Vol. 46, 2017.
  • BYERS, Micheal: “Terrorism, The Use of Force and International Law After 11 September” International Law and Comparative Law Quarterly, Vol. 51, Iss. 2, 2002.
  • CASSESE, Antonio, International Law, Oxford University Press, UK, 2005. CENTEL, Nur/ZAFER, Hamide/ÇAKMUT, Özlem, Türk Ceza Hukukuna Giriş, Beta, İstanbul, 2006.
  • “Cybercrime Model Laws”, Discussion paper prepared fort he Cybercrime Convention Committee (T-CY), 9 December 2014, https://rm.coe.int/ 1680303ee1 (e.t. 30.05.2018).
  • “Cyberspace in Peacetime Regime for State Activities in Cyberspace International Law”, International Relations and Diplomacy NATO CCD COE Publication, Tallinn, 2013.
  • “Defense Department Cyber Efforts: Definitions, Focal Point and Methodology Needed for DOD to Develop Full-Spectrum Cyberspace Budget Estimates”, US Department of Defense, Memo CM-0477-08” 2011, bkz. http://www.gao.gov/ assets/100/97674.pdf (e.t. 01.04.2018) DEREK, Jinks, “State Responsibility for the Acts of Private Armed Groups”, Chicago Journal of International Law Vol. 4, 2003.
  • DeWEESE, Geoffrey S., “Anticipatory and Preemtive Self-Defence in Cyberspace: The Challange of Imminence”, in the 7th International Conference on Cyber Conflict: Architectures in Cyberspace, (MAYBAUM, M./OSULA, A. A./LINSTRÖM, M. L. ed.), NATO CCD COE Publications, Tallinn, 2015.
  • DINNIS, Hether Harrison, Cyber Warfare and the Laws of War”, Cambridge, 2012.
  • DINSTEIN, Yoram, “Computer Network Attacks”, INT'L L. STUD., Vol. 76, 2002.
  • DUCHEINE, P.A.L./ POUW, E.H., “Legitimizing the Use of Force: Legal Bases for Operations Enduring Freedo and ISAF”, içinde Mission Uruzgan: Colloborating in Multiple Coalations for Afganistan, Pallas Publications, Amsterdam, 2012.
  • DÜLGER, Murat Volkan; Bilişim Suçları ve İnternet İletişim Hukuku, Ankara, 2014.
  • EICHENSEHR, Kristen E., “Cyberwar & International Step-Zero”, Texas Law Journal Vol. 50, Iss. 2, 2015.
  • ERDEM Merve/ ÖZOCAK Gürkan, “Sınıraşan Bir Suç Olarak Siber Suçlarla Mücadelede Uluslararası İşbirliği”, 19. Akademik Bilişim Konferansı, 8-10 Şubat 2017, Aksaray Üniversitesi, Aksaray.
  • EREM, Faruk; “Bilgisayar Suçları ve TCY”, Yargıtay Dergisi, C. 17, Sayı 4, Ekim 1991.
  • GEERS, Kenneth, “Cyberspace and the Changing Nature of the Warfare”, http://www. blackhat.com/presentations/bh-jp-08/bh-jp-08-Geers/ BlackHat-Japan-08-Geers-CyberWar fare-Whitepaper.pdf, (e.t. 09.03.2018).
  • GERVAIS, Michail, “Cyber Attacks and the Laws of War”, Berkeley J. Int'l L., Vol. 30, 2012.
  • GILL, Terry D. – DUCHEINE, Paul A.L., “Anticipatory Self Defence in the Cyber Context”, “Int’l L. Stud.”, Vol. 89, 2013.
  • GRAY, Christine, International Law and the Use of Force, Oxford University Press, Third Edition, the UK, 2008.
  • GREENWOOD, Christopher: “International Law and the Pre-emtive Use of Force: Afganistan, AL-Qaiada and Iraq”, San Diego Int’l Law, Journal, 2003.
  • GUIORA, Amos, Cybersecurity, Geopolitics, Law and Policy, Routhledge, NewYork, 2017.
  • GÜRPINAR, Bulut, “Milli Güvenlik Kurulu ve Dış Politika”, Uluslararası İlişkiler, Cilt 10, Sayı 39, 2013.
  • HAFIZOĞULLARI, Zeki /ÖZEN, Muharrem, Türk Ceza Hukuku Özel Hükümler, Kişilere Karşı Suçlar, Ankara, 2010.
  • HAKIMI, Monika, “Defensive Force Against Non-State Actors: The State of Play”, International Legal Studies, Vol. 91, 2015.
  • HALATÇI, Ülkü: “11 Eylül Terörist Saldırıları ve Afganistan Operasyonu’nun Bir Değerlendirmesi”, Uluslararası Hukuk ve Politika, C.2, No. 7.
  • HATHAWAY, Oana vd., “The Law of Cyber-Attack,” CALIF. L. REV., Vol. 100, 2012.
  • İÇEL, Kayıhan: “Avrupa Konseyi Siber Suç Sözleşmesi Bağlamında ‘Avrupa Siber Suç Politikasının Ana İlkeleri’, İstanbul Üniversitesi Hukuk Fakültesi Mecmuası, C: LIX, Sayı: 1-2, 2001.
  • JENNINGS, R.Y. “The Caroline and McLeod Cases”, American Journal of International Law, Vol. 32, 1938.
  • JENSEN, Eric Talbot Jensen, “The Future of the Law of Armed Conflict: Ostriches, Butterflies, and Nanobots”, 35 MICH. J. INT'L L., Vol. 35, 2014.
  • JESCHECK, Hans- Heinrich, Alman Ceza Hukukuna Giriş, Çev. Feridun Yenisey, İstanbul, 2007.
  • JUTTA, B.- STEPHEN J. T., Legitimacy and Legality in International Law: An Interactional Account, Cambridge University Press, Cambridge, 2010.
  • KAJTAR, Gabor, “The Use of Force Against ISIL in Iraq and Syria- A Legal Battlefield”, Wisconsin International Law Journal, Vol. 34, No. 3.
  • KANUCK, Sean, “Sovereign Discourse on Cyber Conflict Under International Law”, Texas Law Review, Vol. 88, 2010.
  • KARAGÜLMEZ, Ali, Bilişim Suçları ve Soruşturma-Kovuşturma Evreleri, 3. Bası, Ankara, 2011.
  • KAYA, İbrahim, Terörle Mücadele ve Uluslararası Hukuk, USAK Yayınları, Ankara, 2005.
  • KESKİN, Funda, Uluslararası Hukukta Kuvvet Kullanma: Savaş, Karışma ve Birleşmiş Milletler, Mülkiyeliler Birliği Vakfı Yayınları, Tezler Dizisi: 4. KETİZMEN, Muammer; Türk Ceza Hukukunda Bilişim Suçları, Ankara, 2008.
  • KEYMAN, Selahattin, “Tipiklik ve Ceza Hukuku”, AÜHFD, C. 37, S.1-4, 1980,
  • KITTICHAISAREE, Kriangsak., Public International Law of Cyberspace, Springer, Switzerland, 2017.
  • KURT, Levent, Tüm Yönleriyle Bilişim Suçları ve Türk Ceza Kanunundaki Uygulaması, Ankara, 2005.
  • KURT, Levent; Tüm Yönleriyle Bilişim Suçları ve Türk Ceza Kanunundaki Uygulaması, Ankara, 2005.
  • LENTZ, Christopher, “A State’s Duty to Prevent and Respond to Cyberterrorist Acts”, Chicago Journal of International Law, Vol. 10, 2010.
  • LOTRIONTE, Catherine, “State Sovereignity and Self Defence in Cyberspace: A Normative Framework for Balancing Legal Rights”, Emory International Law Review, Vol. 26, 2012.
  • MAOGOTO, Jackson, Ntamuya, “War on the Enemy: Self-Defence and StateSponsored Terrorism”, Melbourne Journal of International Law, Vol. 4, No. 2, 2003.
  • MARION, Nancy, “The Council of Europe’s Cyber Crime Treaty: An Exercise in Symbolic Legislation”, International Journal of Cyber Criminology, Vol. 4, Issue: 1&2, 2010.
  • MIDOĞLU, Çise / ÖZOCAK, Gürkan; “IPv6, Güvenlik Açıkları ve Hukuki Durum”, Bilişim 2013 – 30. Ulusal Bilişim Kurultayı Bildiriler Kitabı, Ankara, 2013.
  • MURPHY, Sean, “Contemporary Practice of the United States Relating to International Law”, American Journal of International Law, Vol. 96, 2002.
  • MÜLLERSON, Rein, “Jus ad Bellum: Plus ça Change (Le Monde) Plus C’est L Même Chose (Le Droit)?”, J. CONFLICT & SECURITY L., Vol. 7, 2002.
  • NYE, Joseph S., “The Regime Complex for Managing Global Cyber Activities”, The Centre for International Governance; Global Commission on Internet Governance: Paper Series No. 1, 2014.
  • O’CONNEL, Mary, “Cyber Security and International Law”, Clatham Hause International Law: Meeting Summary, 29 May 2012.
  • OSTROM, Elinor. vd., Revisiting the Commons: Local Lessons, Global Challenges, Science, 1999.
  • OWENS William A./ DAM, Kenneth W./ LIN, Herbert S., Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities, The National Academies Press, Washington, 2009.
  • ÖZBEK, Veli Özer / KANBUR, M. Nihat / DOĞAN, Koray / BACAKSIZ, Pınar / TEPE, İlker; Ceza Muhakemesi Hukuku, Ankara, 2012.
  • ÖZDİLEK, Ali Osman, Uygulamadan Örnek Olaylarla Bilişim Suçları ve Hukuku, İstanbul, 2006.
  • ÖZEN, Muharrem / ÖZOCAK, Gürkan; “Adli Bilişim, Elektronik Deliller ve Bilgisayarlarda Arama ve El Koyma Tedbirinin Hukuki Rejimi (CMK m. 134)”, Ankara Barosu Dergisi, S. 2015/1.
  • ÖZEN, Muharrem/BAŞTÜRK, İhsan, Bilişim – İnternet ve Ceza Hukuku, Ankara, 2011.
  • ÖZOCAK, Gürkan “DDoS Saldırısı ve Failin Cezai Sorumluluğu”, Bilişim 2012 – 29. Uluslararası Bilişim Kurultayı Bildiriler Kitabı, Ankara, 2012.
  • ÖZOCAK, Gürkan, “Penetrasyon Testlerinin (Pentestlerin) Hukuki Durumu ve Zararlı Yazılımlar”, http://www.bilisimdergisi.org.tr/yazarlar/konukyazarlar/penetrasyon-testlerinin-pentestlerin-hukuki-durumu-zararliyazilimlar.html, (e.t. 02.04.2018).
  • ÖZOCAK, Gürkan; “Ceza Muhakemesinde Elektronik Delillerin Tespiti ve Toplanması”, 2. Uluslararası Bilişim Hukuku Kurultayı Bildiriler Kitabı, İzmir, Kasım 2011.
  • ÖZTÜRK, Bahri / ERDEM, Mustafa Ruhan, Uygulamalı Ceza Muhakemesi Hukuku, 11. Baskı, Ankara, 2007.
  • PALOJARVI, Pia, “A Battle in Bits and Bytes: Computer Network Attacks and the Law of Armed Conflict”, Erik Castrén Institute of International Law, Helsinki, 2009.
  • PAUST, Jordan J., “Use of Armed Force against Terrorists in Afghanistan, Iraq, and Beyond”, Cornell International Law Journal, Vol. 35, No. 3, 2002.
  • RAYMOND Mark, “Puncturing the Myth of the Internet as a Commons”, Georgetown Journal of Internet Affairs, Special Issue, 2013.
  • Remarks on the Department of Defense Cyber Strategy, As Delivered by Deputy Secretary of Defense William J. Lynn, III, 14 July 2011, http://archive.defense.gov/speeches /speech.aspx?speechid=1593 (e.t. 15.04.2018).
  • RID, Thomas, “Cyber War Will Not Take Place”, Journal of Strategic Studies, Vol. 35, Iss. 1, 2012.
  • ROBERTSON, Horace B. Jr., “Self-Defense Against Computer Network Attack Under International Law”, 76 INT'L L. STUD., Vol. 76, 2002.
  • ROSCINI, Marco, Cyber Operations and the Use of Force in International Law, Oxford University Press, the UK, 2014.
  • RYAN, Daniel J./DION, Maeve/ TIKK, Eneken/RYAN, Julie JCH, “International Cyberlaw: A Normative Approach”, Georgetown Journal of International Law, Vol. 42, 2011.
  • SCHMIT, Michael, “Computer Network Attack and the Use of Force in International Law: Thoughts on a Normative Framework”, COLUM. J. TRANSNAT'L L. Vol. 37, 1999.
  • SCHMITT, Michael/VIHUL, Liis (ed.), Tallinn Manual 2.0 On the International Law Applicable to Cyber Operations, Cambridge University Press, UK, 2017.
  • SCHMITT, Micheal: “Pre-emtive Strategies in International Law”, Michigan Journal of International Law, Vol. 24, 2003.
  • SEAN, D. M., “Terrorism and the Concept of "Armed Attack" in Article 51 ofthe UN. Charter”, HARV. INT'L L.J., Vol. 43, 2002.
  • SHARP Sr, Walter Gary. “The Past, Present, and Future of Cybersecurity”, Journal of National Security Law and Policy Vol. 4, 2010.
  • SHARP, Sr., Walter Gary, Cyberspace and the Use of Force, Aegeis Research Corporation, USA, 1999.
  • SINAR, Hasan, İnternet ve Ceza Hukuku, İstanbul, 2001.
  • SINGER, P.W. / FRIEDMAN, Allan, Cybersecurity and Cyberwar: What Everyone Needs to Know, NewYork, 2014.
  • SZABO, Kinga Tibori, “Anticipatory Action in Self Defence Essence and Limits Under International Law”, Springer, The Netherlands, 2011.
  • TAŞDEMİR, Kubilay/ÖZKEPİR, Ramazan; Mala Karşı Suçlar, Ankara, 1993.
  • THOMAS, M. F., “Terrorism and the Right of Self-Defense”, AM. J. INT'L. L., Vol. 95, 2001.
  • TOROSLU, Nevzat; Ceza Hukuku Genel Kısım, Ankara, 2012.
  • TOURE, Hamadoun, “The International Response to Cyberwar”, içinde The Quest for Cyber Peace (TOURE, Hamadoun), ITU, January 2011.
  • Van STEENBERGHE, R., “Self-Defence in Response to Attacks by Non-State Actors in the Light of Recent State Practice: A Step Forward?”, LEIDEN J. INT'L L., Vol. 23, 2010.
  • WAXMAN, Matthew C., “Cyber-Attacks and Use of Force: Back to the Future of Article 2(4)”, Yale Journal of International Law, Vol. 2, Iss. 2, 2011.
  • WEBER, Amalie: The Council of Europe’s Convention on CyberCrime, Berkeley Technology Law Journal, Vol. 18, 2003.
  • WEBER, Rolf H., “Elements of a Legal Framework for Cyber Space”, Swiss Review of International and European Law, Vol. 26, No. 2, 2016.
  • WEE YEN, Jean, “The Use of Force Against Non-State Actors: Justifying and Delimiting the Exersice of the Right of Self-Defence”, Singapure Law Review, Juris Illuminae, Vol. 9, 2017.
  • WILMSHURST, Elizabeth, Principles of International Law on the Use of Force By States in Self-Defence, Clatham House Paper, ILP WP 05/01, 2005.
  • YAPICI, Utku: “Uluslararası Hukukta Terörizme Karşı Kuvvet Kullanımı Sorunu”, Uluslararası Hukuk ve Politika, C. 2, No.7, 2006.
  • YAZICIOĞLU, Yılmaz; Kriminolojik, Sosyolojik ve Hukuki Boyutları İle Bilgisayar Suçları, İstanbul, 1997.
  • ZIOLKOWSKI, Katharina, “General Principles of International Law as Applicable in Cyberspace”, in Peacetime Regime for State Activities in Cyberspace International Law, International Relations and Diplomacy NATO CCD COE Publication, Tallinn, 2013.
  • Belgeler
  • 2002 National Security Strategy of the United States of America, https://www.state.gov/documents/organization/63562.pdf (e.t. 15.04.2018).
  • 2006 National Security Strategy of the United States of America, https://www.state.gov/documents/organization/64884.pdf (e.t. 15.04.2018).
  • 2010 National Security Strategy of the United States of America, http://www.whitehouse.gov/sites/default/files/rss_viewer/national_secur ity_strategy.pdf, (e.t. 30.03.2018).
  • Comprehensive Study on Cyber Crime, Draft, United Nations, February 2013, s. xvii. https://www.unodc.org/documents/organizedcrime/UNODC_ CCPCJ_EG.4_2013/CYBERCRIME_STUDY_210213.pdf (e.t. 30.05.2018).
  • Council Framework Decision of 28 May 2001 combatting fraud and counterfeiting of non-cash means of payment, 2001/413/JHA, https://eur-lex.europa.eu/legalcontent/EN/TXT/PDF/?uri=CELEX: 32001F0413&from=EN (e.t. 31.05.2018).
  • Directive 2002/58/EC of the European Parliment and of The Council of 12 July 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector, https://eurlex.europa.eu/legalcontent/EN/TXT/PDF/?uri=CELEX:32 002L0058&from=EN (e.t. 31.05.2018).
  • Directive 2011/92/EU of the Europen Parliament and of the Council of 13 December 2011 on combating the sexual abuse and sexual explotitation of children and child pronography and replacing Council Framework Decision 2004/68/JHA, https://eur-lex.europa.eu/legal-content/EN/TXT/ PDF/?uri=CELEX:32011L0093&from=EN (e.t. 31.05.2018).
  • Diretive 2013/40/EU of the European Parliament and of the Council of 12 August 2013 on Attacks Against Information Systems and Replacing Council Framework Decision 2005/222/JHA, https://eur-lex.europa.eu/ legalcontent/EN/TXT/PDF/?uri=CELEX:32013L00 40&from=EN (e.t. 31.05.2018).
  • Draft Convention on International Information Security (Concept), 2011, http://www.mid.ru/en/foreign_policy/official_documents//asset_publish er/CptICkB6BZ29/content/id/191666 (e.t. 30.05.2018).
  • E-Gorvernment Interoperability Framework, https://www.itu.int/en/ITU-D/ Projects/ITU-EC-ACP/ICB4PAC/Pages/default.aspx (e.t. 31.05.2018).
  • Group of Govermental Experts on Developments in the Field of Information and Telecommunicatipns in the Context of International Security, A/68/98, 24 June 2013, S. 7.
  • Group of Govermental Experts on Developments in the Field of Information and Telecommunicatipns in the Context of International Security, A/68/98, 24 June 2013.
  • Group of Govermental Experts on Developments in the Field of Information and Telecommunicatipns in the Context of International Security, A/70/174, 22 July 2015.
  • Harmonizing Cyberlaws and Regulations: The Experinece of the East African Community, UNCTAD/STICT/2012/4, United Nations, 2012, http://repository.eac.int:8080/bitstream/handle/11671/1815/EAC%20 Framework%20for%20Cyberlaws.pdf?sequence=1&isAllowed=y (e.t. 30.05.2018).
  • High-Level Panel Report, UN Doc. A/59/565, 21 March 2005.
  • In Larger Freedom Raporu, UN Doc. A/59/2005, 21 March 2005.
  • In Larger Freedom: Towards Development, Security and Human Rights for All, Report of the UN Secretary-General, UN Doc A/59/2005, 21 March 2005.
  • Memorandum for Chefs of the Military Services Commanders of the Combatant Commands Directors of the Joınt Staff Directorates, Joint Terminology for Cyberspace Operations, bkz. http://www.nsciva.org/CyberReferenceLib/2010-11joint%20Terminology%20for %20Cyber space%20Opera tions.pdf (e.t. 01.04.2018).
  • UN Doc. A/RES/29/3314, 14 December 1974
  • UN Doc. A/RES/53/70, 4 December1998.
  • UN Doc. A/RES/54/49, 1 December1999.
  • UN Doc. A/RES/55/28, 20 November 2000.
  • UN Doc. A/RES/56/19, 29 November 2001.
  • UN Doc. A/RES/57/53, 22 November 2002.
  • UN Doc. A/RES/58/32, 8 December 2003.
  • UN Doc. A/RES/59/61, 3 December 2004.
  • UN Doc. A/RES/60/45, 8 December 2005.
  • UN Doc. A/RES/61/54, 6 December 2006.
  • UN Doc. A/RES/62/17 5 December 2007.
  • UN Doc. A/RES/63/37, 2 December 2008.
  • UN Doc. A/RES/64/25, 2 December 2009.
  • UN Doc. A/RES/65/41, 8 December 2010.
  • UN Doc A/66/152, 15 July 2011.
  • UN Doc. A/RES/66/24, 2 December 2011.
  • UN Doc. A/RES/65/230, 21 December 2011.
  • UN Doc. A/RES/67/27, 3 December 2012
  • UN Doc. A/RES/68/243, 27 December 2013.
  • UN Doc. A/RES/69/28, 2 December 2014.
  • UN Doc. A/RES/70/237, 23 December 2015.
  • UN Doc. A/RES/ 71/28, 9 December 2016.
  • UNODC/CCPCJ/EG.4/2011/2, 21January 2011.
  • UNODC/CCPCJ/EG.4/2011/INF/2/Rev.1, 21 January 2011.
  • UNODC/CCPCJ/EG.4/2013/3, 1 March 2013.
  • Strategic Concept fort he Defence and Security of the Members of the North Atlantic Treaty Organization, Adopted by Heads of State and Governments at the NATO Summit in Lisbon, 19- 20 November 2010, https://www.nato.int/cps/ua/natohq/official_texts_68580.htm (e.t. 15. 04. 2018).
  • Working Paper on Recent Developments in the Use of Science and Technology by Offenders and by Competent Authorities in Fighting Crime, Including the Case of Cybercrime, 12- 19 April, 2010.
  • http://www.unodc.org/documents/crime-congress/12thCrimeCongress/ Docu ments/A_CONF.213_9/V1050382 e.pdf (e.t. 31.05.2018).
  • Mahkeme Kararları
  • Armed Activities on the Territory of the Congo (Democratic Republic of the Congo v. Uganda), Judgement, I.C.J. Reports 2005.
  • Legal Consequences of the Construction of a Wall in the Occupied Palestinian Territory, Advisory Opinion, I.C.J. Reports 2004.
  • Legality of the Threat or Use of Nuclear Weapons, Advisory Opinion, 8 July 1996, I.C.J. Reports 1996.
  • Military and Paramilitary Activities in and against Nicaragua (Nicaragua v. United Stataes of America), Judgement, I.C.J. Reports, 1986.
  • Linkler
  • http://blog.normaturk.com/some-nedir/ (e.t. 01.03.2018).
  • http://www.coe.int/en/web/conventions/full-list//conventions/treaty/189/ signatures?p_auth=n Otm1q80 (e. t.30.05.2018).
  • http://eng.sectsco.org/documents/ (e.t. 30.05.2018).
  • http://itlaw.wikia.com/wiki/Arab_Convention_on_Combating_Infor mation_ Technology_Offences (e.t. 30.05.2018).
  • http://thecommonwealth.org/sites/default/files/key_reform_pdfs/P15370_11 _ROL_ Model_Law_Computer_Related_Crime.pdf (e.t. 30.05.2018).
  • http://www.oecs.org/jobs/e-gov (e.t. 31.05.2018).
  • http://www.ohchr.org/EN/ProfessionalInterest/Pages/OPSCCRC.aspx (e.t. 30.05.2018).
  • http://www.udhb.gov.tr/doc/siberg/2016-2019guvenlik.pdf (e.t. 01.03.2018).
  • http://www.udhb.gov.tr/doc/siberg/Kurumsal_SOME_Reh_V1.pdf (e.t. 01.03.2018).
  • https://ec.europa.eu/growth/sectors/tourism/business-portal/understandinglegislation/legal-regulations-e-commerce_en (e.t. 31.05.2018).
  • https://www.coe.int/en/web/conventions/search-ontreaties/conventions/ treaty/185/signatures? p_auth=kyheDJdz (et. 15.05.2018).
  • https://www.itu.int/en/ITUD/Cybersecurity/Documents/SADC%20Model%2 0Law%20Cybercrime.pdf (e.t. 31.05.2018).
  • https://www.itu.int/ITUD/projects/ITU_EC_ACP/hipcar/incountry_assistanc e/Grenada/HIPCARGrenada_Cybercrime_Report_Final_Draft_April20 12.pdf (e.t.31.05.2018).
  • https://www.tbmm.gov.tr/komisyon/insanhaklari/pdf01/3-30.pdf (e.t.15.04.2018) https://www.unodc.org/unodc/en/organized-crime/open-ended-intergovernmentalexpertgrou p-meeting-on-cybercrime.html (e.t. 28.05.2018).
  • www.udhb.gov.tr/doc/siberg/Sektorel_SOME_Reh.docx (e.t. 01.03.2018).