KARŞILAŞTIRMALI HUKUK BAĞLAMINDA BİRLEŞİK KRALLIK İNGİLTERE HUKUKUNDA BİLİŞİM SUÇLARI MEVZUATI VE UYGULAMASI

Bu makalenin konusunu karşılaştırmalı hukuk bağlamında Birleşik Krallık İngiltere hukukunda bilişim suçlarına ilişkin mevzuat ve bunun uygulanması oluşturmaktadır. Bu amaçla Birleşik Krallık’ta bu alanı düzenleyen temel yasalar ve bu yasalarda yer alan suç tipleri incelenmiştir. Bunun yanı sıra uygulamayı göstermek için belli bazı davalardaki savcılığın suçlaması, savunma avukatlarının savunmaları ve yargı makamlarının verdiği kararlar incelenmiştir. Bu alanda Birleşik Krallık hukukunun seçilmesinin öne çıkan nedenleri bu ülkede bilişim suçlarının sıklıkla işlenmesi ve uluslararası boyutunun olması, günlük yaşamın ve iş yaşamının büyük ölçüde bilişim sistemlerine bağlı olması ve devlet olarak bu suçlarla mücadelenin bir politika olarak seçilmesidir. Mevzuat ve uygulamadan örnekler verilirken, Anglo Amerikan hukuk sisteminin önemli bir üyesi olan Birleşik Devletler’in mevzuatı ve mahkeme kararlarına da yer verilmiştir. Sonuç olarak hem Anglo Amerikan sisteminin hem de Avrupa Konseyi’nin bir üyesi olarak bu sisteme dahil olan Birleşik Krallık’ın bilişim suçlarına ilişkin rejimi incelenerek, bu açıdan ülkemizle arada bir köprü kurulmaya çalışılmıştır

The Cybercrime Law and Its Practice in United Kingdom Within the Context of Comperative Law

The subject of this article is the computer crime legislations and practice in United Kingdom in respect of comperative law. In this respect, the essential statuaries United Kingdom and the related offences are examined. Also the accusative arguments of prosecutors, the defence arguments of defendand’s attorneys and the court decisions for certain cases are also cited in order to explain the practice in field. The reasons of choosing the United Kingdom law are, the frequency and international nature of this kind of offences in UK, the dependecy of the daily and business life on ICT systems, and existence of a Govermental policy to tackle this kind of offences in UK. When examining computer crimes legislations and practice, also legislations and court decisions of the U.S which is an important member of common law system are discussed. Consequently, the regime against the computer crimes in UK, which is both a member of the common law system and a member of Council of Europe, is examined, an in this way it is aimed to establish a law bridge liason beetwen UK’s and Turkey’s computer crimes and practices

___

  • Akdeniz, Yaman, “Section 3 of the Computer Misuse Act 1990 – An Antidote for Computer Viruses”, Web Journal of Current Legal Issues, 1996.
  • Ashworth, Andrew/Jeremy Horder, Principles of Criminal Law, 7. Bası, Oxford, Oxford University Press, 2009.
  • Bainbridge, David, “Cannot Employees also be a Hackers?”, Computer Law and Security Report, Vol. 13, No. 5, 1997, s. 352-354.
  • Barlow, John Perry, “Crime and Puzzlement: in Advance of the Law on the Electronic Frontier”, Whole Earth Review, No. 68, Fall 1990, s. 44-57.
  • Battcock, Rupert, “Prosecutions under the Computer Misuse Act 1990”, Computers and Law, Vol. 6, No. 6, 1996, s. 22-26.
  • Bonnici, Jeanne Pia Mifsud, Self-Regulation in Cyberspace, The Hague, TMC Asser Press, 2008.
  • Bowker, Arthur L./Gregory B. Thompson, “Computer Crime in the 21st Century and Its Effect on the Probation Officer”, Federal Probation: A Journal of Correctional Philosophy and Practice, Vol. 65, No. 2, September 2001, s. 18-24.
  • Brenner, Susan W., Cybercrime and the Law: Challanges Issues and Outcomes, Boston, Northwestern University, 2012.
  • Brenner, Susan W., “Nanocrime?”, University of Illinois Journal of Law, Technology and Policy, No. 1, 2011, s. 39-105.
  • Brenner, Susan W., Cybercrime: Criminal Threats from Cyberspace, Santa Barbara, Praeger, 2010.
  • Brenner, Susan W., “Cybercrime Metrics: Old Wine, New Bottles?”, Virginia Journal of Law and Technology, Vol. 9, No. 13, Fall 2004, s. 1-54.
  • Brenner, Susan W. /Brian Carrier/Jef Henninger, “The Trojan Horse Defense in Cybercrime Cases”, Santa Clara Computer & High Technology Law Journal, Volume 21, Issue 1, 2004, s. 3-53.
  • Brunst, Philip W., “Terrorism and the Internet: New Threats Posed by Cyberterrorism and Terrorist Use of the Internet”, A War on Terror? The European Stance on a New Threat, Changing Laws and Human Rights Implications, Ed: Marianne Wade/Almir Maljević, Heilderberg, Springer, 2010, s. 51-80.
  • Clough, Jonathan, Principles of Cybercrime, Second Edition, Cambridge, Cambridge University Press, 2015.
  • Coppel, Philip, Informations Rights: Law and Practice, 4th Edition, Oxford & Portland, Hart Publishing, 2014.
  • Cusack, Carmen C., Pornography and yhe Criminal Justice System, Boca Raton, CRC Press, 2015.
  • DeKeseredy, Walter S./Marilyn Corsianos, Violance Against Women in Pornography, New York, Routledge, 2016.
  • Dressler, Joshua, Understanding Criminal Law, Sixth Edition, San Francisco, LexisNexis, 2012.
  • Dubber, Markus D./Tatjana Hörnle, Criminal Law: A Comparative Approach, Oxford, Oxford University Press, 2014.
  • Dülger, Murat Volkan, Bilişim Suçları ve İnternet İletişim Hukuku, 6. Bası, Ankara, Seçkin Yayıncılık, 2015.
  • Dülger, Murat Volkan, “Hukuka Uygunluk Nedenleri ile Mazeret Nedenleri Arasındaki Ayrımın Tarihçesi, Niteliği ve Gerekliliği Üzerine Karşılaştırmalı Bir Deneme”, Ceza Hukuku Dergisi, Y. 9, S. 24, Nisan 2014, s. 121-180.
  • Dülger, Murat Volkan, Suç Gelirlerinin Aklanmasına İlişkin Suçlar ve Yaptırımlar, Ankara, Seçkin Yayıncılık, 2011.
  • Dülger, Murat Volkan, “Teknolojideki ve Kitle İletişim Araçlarındaki Gelişmelerin Uluslararası Terörizme Etkileri”, Hukuk ve Adalet Eleştirel Hukuk Dergisi, İstanbul, Y. 4 S. 8, Nisan 2007, s. 55–76.
  • Dyson, Matthew/James Lee/Shona Wilson Stark (Ed), Fifty Years of the Law Commissions: The Dynamics of Law Reform, Oxford and Oregon, Hurt Publishing, 2016.
  • Elliott, Catherine/Frances Quinn, English Legal System, Eleventh Edition, Harlow, Pearson Longman, 2010.
  • Elliott, Catherine, English Legal System Essential Cases and Materials, Second Edition, Harlow, Pearson Longman, 2009.
  • Fafinski, Stefan/Emily Finch, English Legal System, 3rd Edition, Harlow, Pearson Longman, 2010.
  • Fafinski, Stephan, “Computer Misuse: The Implications of the Police and Justice Act 2006”, Journal of Criminal Law, Vol. 72, Issue 1, 2006, s. 53-66.
  • Fafinski, Stephan, “Access Denied: Computer Misuse on an Era of Technological Change” Journal of Criminal Law, Vol. 70, Issue 5, 2006, s. 424-442.
  • Fafinski, Stefan, “Divisional Court: Computer Misuse: Denial-of-Service Attacks” Journal of Criminal Law, Vol. 70, Issue 6, 2006, s. 474-478.
  • Fearon, G., “All Party Internet (APIG) Report on the Computer Misuse Act”, Comps. & Law, Vol. 15, 2004.
  • Freedman, C. D., “Criminal Misappropriation of Confidential Commercial Information and Cyberspace: Comments on the Issues”, International Review of Law, Computers and Technology, Vol. 13, 1999.
  • Gillespie, Alisdair A., Cybercrime: Key Issues and Debates, London and New York, Routledge, 2016.
  • Gillespie, Alisdair A., The English Legal System, 5th Edition, Oxford, Oxford University Press, 2015.
  • Gillespie, Alisdair A., Child Pornography: Law and Policy, London & New York, Routledge-Cavendish, 2012.
  • Gillespie, Alisdair A., “Restricting Access to the Internet by Sex Offenders”, International Journal of Law and Information Technology, Vol. 19, No. 3, 2011, s. 165-186.
  • Gillespie, Alasdair A., “Child Protection on the Internet – challenges for Criminal Law”, Child adn Family Law Quarterly, Vol. 14, No. 4, 2002, s. 411- 425.
  • Goodman, Marc D., “Why the Police Don’t Care about Computer Crime”, Harvard Journal of Law and Technology, Vol. 10, Number 3, Summer 1997, s. 465-494.
  • Grabosky, Peter/Russell G. Smith/Gillian Dempsey, Electronic Theft: Unlawful Acquisition in Cyberspace, Cambridge, Cambridge University Press, 2001.
  • Hafner, Katie/John Markoff, Cyberpunk: Outlaws and Hackers on the Computer Frontier, New York, Simon and Schuster, 1991.
  • Hessick, Carissa Byrne (Ed), Refining Child Pornography Law: Crime, Language and Social Consequances, Michigan, University of Michigan Press, 2016.
  • Hirst, Michael, Jurisdiction and the Ambit of the Criminal Law, Oxford, Oxford University Press, 2003.
  • Hodes, W. William, “Seeking the Truth versus Telling the Truth at the Boundaries of the Law: Misdirection, Lying, and ‘Lying with an Explanation’”, South Texas Law Review, Vol. 44, Winter 2002, s. 53-79.
  • Holder, C., “Staying One Step Ahead of the Criminals”, IT Law, Vol. 10, Issue 3, 2002, s. 17 vd.
  • Hollinger, Richard C., Crime, Deviance and the Computer, Aldershot, Dartmouth Publishing, 1997.
  • Horder, Jeremy, “The Classification of Crimes and the Special Part of the Criminal Law”, Defining Crimes Essays on The Special Part of the Criminal Law, Ed: R. A. Duff/Stuart P. Green, Oxford, Oxford University Press, 2005.
  • Hunton, Paul, “The Growing Phenomenon of Crime and the Internet: A Cybercrime Execution and Analysis Model”, Computer Law and Security Report, Vol. 25, 2009, s. 528-535.
  • Kilger, Max/Ofir Arkin/Jeff Stutzman, “Profiling”, in Honeynet Project, Know Your Enemy, Learning about Security Threats, 2nd edn, Addison-Wesley Professional, 2004.
  • Kerr, Orin S., “Cybercrime’s Scope: Interpreting ‘Access’ and ‘Authorization’ in Computer Misuse Statutes”, New York University Law Review, Vol. 78, 2003, s. 1596-1668.
  • Kohl, Uta, Jurisdiction and Internet: Regulatory Competence over Online Activity, Cambridge, Cambridge University Press, 2007.
  • Koops, Bert-Jaap, “Should ICT Regulation Be Technology-Neutral?”, Ed: BertJaap Koops/Miriam Lips/Corien Prins/Maurice Schellekers, Starting points for ICT Regulation: Deconstructing Prevalent Policy One-liners, IT & Law Series Vol. 9, The Hague, TMC Asser Press, 2006, s. 77-108.
  • Kowalski, Melaine, Cyber-Crime: Issues, Data Sources, and Feasibility of Collecting Police-Reported Statistics, Cat. No. 85-558-XIE, Canadian Centre for Justice Statistics, 2002.
  • Kshetri, Nir, “The Simple Economics of Cybercrimes”, IEEE Security and Privacy, Vol. 4, No. 1, January/February 2006, s. 8-13, (available at SSRN: http://ssrn. com/abstract=881421).
  • LaFave, Wayne R., Criminal Law, Fourth Edition, St. Paul, Thomson & West, 2003.
  • Lessig, Lawrence, Code and other Laws of Cyberspace, New York, Basic Books, 1999.
  • Levi, Michael, “Between the Risk and the Reality Falls the Shadow”, Crime and the Internet: Cybercrimes and Cyberfears, Ed: David S. Wall, London & New York, Routledge, 2001, s. 44-58.
  • Lixian, Cong, “Chinese E-Commerce (2) and Legal Environment”, Chinese Intellectual Property and Technology Laws, Ed: Rohan Kariyawasam, Edward Elgar Publishing, 2011.
  • MacEwan, Neil, “The Computer Misuse Act 1990: Lessons from Its Past and Predictions for Its Future” Criminal Law Review, Vol. 12, 2008, s. 955-967.
  • Marsden, Christopher T., Internet Co-Regulation: European Law Regulatory Governance and Legitimacy in Cyberspace, Cambridge, Cambridge University Press, 2011.
  • Martin, Jacqueline, English Legal System: Key Facts Key Cases, London and New York, Routledge, 2014.
  • Masiola, Rosanna/Renato Tomei, Law, Language and Translation From Concepts to Conflicts, Heidelberg, Springer, 2015.
  • McAlinden, Anne-Marie, ‘Grooming’ and the Sexsual Abuse of Children; Instituonal, Internet and Familial Dimensions, Oxford, Oxford University Press, 2012.
  • McKnight, Gerald, Computer Crime, Walker and Co., 1973.
  • Mitnick, Kevin D./William L. Simon, Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers, Wiley Publishing, 2005.
  • Moore, G. E., “Cramming More Components onto Integrated Circuits”, Electronics, Vol. 38, No. 8, 1965, s. 114–117.
  • Morris, Sheridan, The Future of Netcrime Now: Part 1 – Threats and Challenges, Home Office Online Report 62/04, 2014.
  • Noam, Eli M., “Beyond Liberalization II: The Impending Doom of Common Carriage”, Telecommunications Policy, Vol. 18, No. 6, 1994, s. 435-452.
  • Ormerod, David /David Perry, Blackstone’s Criminal Practice 2017, Oxford, Oxford University Press, 2016.
  • Ormerod, David, Smith & Hogan’s Criminal Law, 13th Edition, Oxford, Oxford University Press, 2011.
  • Ormerod, David /Simon McKay, “Telephone Intercepts and their Admissibility”, Criminal Law Review, January 2004, s. 15-38.
  • Parker, Donn B., Crime by Computer, New York, Scribner, 1976.
  • Pieth, Mark/Radha Ivory, Corporate Criminal Liability: Emergence Convergence and Risk, Ius Gentium: Comparative Perspectives on Law and Justice 9, Heidelberg, Springer, 2011.
  • Pinto, Amanda/Martin Evans, Corporate Criminal Liability, Second Edition, Sweet & Maxwell, 2008.
  • Reed, Chris, Internet Law: Text and Materials, 2nd Edition, Cambridge, Cambridge University Press, 2004.
  • Reid, A. S. /N. Ryder, “The Case of Richard Tomlinson: The Spy Who E-mailed Me”, Information and Communications Technology Law, Vol. 9, Issue 1, 2000, s. 61 vd.
  • Rosci, Marco, Cyber Operations and the Use of Force in International Law, Oxford, Oxford University Press, 2014.
  • Rowbottom, Jacop, “Obscenity Laws and the Internet: Targeting the Supply and Demand”, Criminal Law Review, February 2006, s. 97-109.
  • Sieber, Ulrich, Legal Aspects of Computer – Related Crime in the Information Society - COMCRIME Study, http://www.edc.uoc.gr/~panas/PATRA/sieber. pdf; 25.11.2016.
  • Sieber, Ulrich, “Instruments of International Law: Against Terrorist Use of the Internet, A War on Terror? The European Stance on a New Threat, Changing Laws and Human Rights Implications, Ed: Marianne Wade/Almir Maljević, Heilderberg, Springer, 2010, s. 171-220.
  • Simester, Andrew /G. Robert Sullivan, Criminal Law: Theory and Doctrine, Second Edition, Portland, Hart Publishing, 2004.
  • Spink, Paul, “Misuse of Police Computers”, Juridical Review, Vol. 42, 1997, s. 219-231.
  • Stoll, Cliff, Cuckoo’s Egg, New York, Pocket Books, 1998.
  • Thomas, Douglas, “Criminality on the Electronic Frontier: Corporality and the Judicial Construction of the Hacker”, Cybercrime: Law Enforcement, Security and Surveillance in the Information Age, Ed: Douglas Thomas/Brian D. Loader, London & New York, Routledge, 2000, s. 17-35.
  • Tomlinson, Richard, The Big Breach: From Top Secret to Maximum Security, Narodny Variant Publishers, Moskova, 2001.
  • Xu, Zhengchuan /Qing Hua/ Chenghong Zhang, “Why Computer Talents Become Computer Hackers”, Communications of the ACM, Vol. 56, No. 4, 2013, s. 64-74.
  • Wagner, Ben, Global Free Expression – Governing the Boundaries of Internet Content, Law Governance and Technology Series, Vol. 28, Switzerland, Springer, 2016.
  • Walden, Ian, Computer Crimes and Digital Investigations, Second Edition, Oxford, Oxford University Press, 2016.
  • Walden, Ian /Martin Wasik, “The Internet: Access Denied Controlled!”, Criminal Law Review, Issue 5, 2011, s. 377-387.
  • Walden, Ian, “Harmonising Computer Crime Laws in Europe”, European Journal of Crime, Criminal Law and Criminal Justice, Vol. 12, Issue 4, 2004, s. 321-336.
  • Walker, Claire, “Email Interception and RIPA: the Court of Appeal Rules on the ‘Right to Control’ fence”, Communications Law: Journal of Computer, Media & Telecommunication, Vol. 11, Issue 1, 2006.
  • Wall, David S., Cybercrime: The Transformation of Crime in the Information Age, Cambridge, Polity Press, 2014.
  • Wall, David S., Cyberspace Crime, London, Dartmouth, 2003.
  • Wall, David S., “Policing the Internet: Maintaining Order and Law on the Cyber-beat”, The Internet, Law and Society, Ed: Yaman Akdeniz/Clive Walker/ David Wall, Longman, 2000.
  • Wasik, Martin, Crime and the Computer, Oxford, Clarendon Press, 1991.
  • Wasik, Martin, “Law Reform Proposals on Computer Misuse”, Criminal Law Review, 1989, s. 257-270.
  • Whittle, Helen /Catherine Hamilton-Giachritsis/Anthony Beech/Guy Collings, “A Review of Online Grooming: Characteristics and Concerns” Aggression and Violence Behaviour, Vol. 18, Issue 1, 2013, s. 62-70.
  • Willems, Eddy, Cybergefahr: Wie wir uns gegen Cyber-Crime und OnlineTerror wehren können, Wiesbaden, Springer Vieweg, 2015.
  • Williams, D., Not in the Public Interest; the Problem of Security in Democracy, London, Hutchison, 1965.
  • Wright, Tim /Dominic Hodgkinson, “Government Response to House of Lords Science and Technology Committee Report on Personal Internet Security”, Computer and Telecommunications Law Review, Vol. 14, 2008, s. 65 vd.