KARŞILAŞTIRMALI HUKUK BAĞLAMINDA BİRLEŞİK KRALLIK (İNGİLTERE) HUKUKUNDA BİLİŞİM SUÇLARI MEVZUATI VE UYGULAMASI

Bu makalenin konusunu karşılaştırmalı hukuk bağlamında Birleşik Krallık (İngiltere) hukukunda bilişim suçlarına ilişkin mevzuat ve bunun uygulanması oluşturmaktadır. Bu amaçla Birleşik Krallık'ta bu alanı düzenleyen temel yasalar ve bu yasalarda yer alan suç tipleri incelenmiştir. Bunun yanı sıra uygulamayı göstermek için belli bazı davalardaki savcılığın suçlaması, savunma avukatlarının savunmaları ve yargı makamlarının verdiği kararlar incelenmiştir. Bu alanda Birleşik Krallık hukukunun seçilmesinin öne çıkan nedenleri bu ülkede bilişim suçlarının sıklıkla işlenmesi ve uluslararası boyutunun olması, günlük yaşamın ve iş yaşamının büyük ölçüde bilişim sistemlerine bağlı olması ve devlet olarak bu suçlarla mücadelenin bir politika olarak seçilmesidir. Mevzuat ve uygulamadan örnekler verilirken, Anglo Amerikan hukuk sisteminin önemli bir üyesi olan Birleşik Devletler'in mevzuatı ve mahkeme kararlarına da yer verilmiştir. Sonuç olarak hem Anglo Amerikan sisteminin hem de Avrupa Konseyi'nin bir üyesi olarak bu sisteme dahil olan Birleşik Krallık'ın bilişim suçlarına ilişkin rejimi incelenerek, bu açıdan ülkemizle arada bir köprü kurulmaya çalışılmıştır.

The Cybercrime Law and Its Practice in United Kingdom Within the Context of Comperative Law

The subject of this article is the computer crime legislations and practice in United Kingdom in respect of comperative law. In this respect, the essential statuaries United Kingdom and the related offences are examined. Also the accusative arguments of prosecutors, the defence arguments of defendand's attorneys and the court decisions for certain cases are also cited in order to explain the practice in field. The reasons of choosing the United Kingdom law are, the frequency and international nature of this kind of offences in UK, the dependecy of the daily and business life on ICT systems, and existence of a Govermental policy to tackle this kind of offences in UK. When examining computer crimes legislations and practice, also legislations and court decisions of the U.S which is an important member of common law system are discussed. Consequently, the regime against the computer crimes in UK, which is both a member of the common law system and a member of Council of Europe, is examined, an in this way it is aimed to establish a law bridge (liason) beetwen UK's and Turkey's computer crimes and practices.

___

  • Akdeniz, Yaman, "Section 3 of the Computer Misuse Act 1990 - An Antidote for Computer Viruses", Web Journal of Current Legal Issues, 1996.
  • Ashworth, Andrew/Jeremy Horder, Principles of Criminal Law, 7. Bası, Oxford, Oxford University Press, 2009.
  • Bainbridge, David, "Cannot Employees also be a Hackers?", Computer Law and Security Report, Vol. 13, No. 5, 1997, s. 352-354.
  • Barlow, John Perry, "Crime and Puzzlement: in Advance of the Law on the Electronic Frontier", Whole Earth Review, No. 68, Fall 1990, s. 44-57.
  • Battcock, Rupert, "Prosecutions under the Computer Misuse Act 1990", Computers and Law, Vol. 6, No. 6, 1996, s. 22-26.
  • Bonnici, Jeanne Pia Mifsud, Self-Regulation in Cyberspace, The Hague, TMC Asser Press, 2008.
  • Bowker, Arthur L./Gregory B. Thompson, "Computer Crime in the 21st Century and Its Effect on the Probation Officer", Federal Probation: A Journal of Correctional Philosophy and Practice, Vol. 65, No. 2, September 2001, s. 18-24.
  • Brenner, Susan W., Cybercrime and the Law: Challanges Issues and Outcomes, Boston, Northwestern University, 2012.
  • Brenner, Susan W., "Nanocrime?", University of Illinois Journal of Law, Technology and Policy, No. 1, 2011, s. 39-105.
  • Brenner, Susan W., Cybercrime: Criminal Threats from Cyberspace, Santa Barbara, Praeger, 2010.
  • Brenner, Susan W., "Cybercrime Metrics: Old Wine, New Bottles?", Virginia Journal of Law and Technology, Vol. 9, No. 13, Fall 2004, s. 1-54.
  • Brenner, Susan W. /Brian Carrier/Jef Henninger, "The Trojan Horse Defense in Cybercrime Cases", Santa Clara Computer & High Technology Law Journal, Volume 21, Issue 1, 2004, s. 3-53.
  • Brunst, Philip W., "Terrorism and the Internet: New Threats Posed by Cyberterrorism and Terrorist Use of the Internet", A War on Terror? The European Stance on a New Threat, Changing Laws and Human Rights Implications, Ed: Marianne Wade/Almir Maljevic, Heilderberg, Springer, 2010, s. 51-80.
  • Clough, Jonathan, Principles of Cybercrime, Second Edition, Cambridge, Cambridge University Press, 2015.
  • Coppel, Philip, Informations Rights: Law and Practice, 4th Edition, Oxford & Portland, Hart Publishing, 2014.
  • Cusack, Carmen C., Pornography and yhe Criminal Justice System, Boca Raton, CRC Press, 2015.
  • DeKeseredy, Walter S./Marilyn Corsianos, Violance Against Women in Pornography, New York, Routledge, 2016.
  • Dressler, Joshua, Understanding Criminal Law, Sixth Edition, San Francisco, LexisNexis, 2012.
  • Dubber, Markus D./Tatjana Hörnle, Criminal Law: A Comparative Approach, Oxford, Oxford University Press, 2014.
  • Dülger, Murat Volkan, Bilişim Suçları ve İnternet İletişim Hukuku, 6. Bası, Ankara, Seçkin Yayıncılık, 2015.
  • Dülger, Murat Volkan, "Hukuka Uygunluk Nedenleri ile Mazeret Nedenleri Arasındaki Ayrımın Tarihçesi, Niteliği ve Gerekliliği Üzerine Karşılaştırmalı Bir Deneme", Ceza Hukuku Dergisi, Y. 9, S. 24, Nisan 2014, s. 121-180.
  • Dülger, Murat Volkan, Suç Gelirlerinin Aklanmasına İlişkin Suçlar ve Yaptırımlar, Ankara, Seçkin Yayıncılık, 2011.
  • Dülger, Murat Volkan, "Teknolojideki ve Kitle İletişim Araçlarındaki Gelişmelerin Uluslararası Terörizme Etkileri", Hukuk ve Adalet Eleştirel Hukuk Dergisi, İstanbul, Y. 4 S. 8, Nisan 2007, s. 55-76.
  • Dyson, Matthew/James Lee/Shona Wilson Stark (Ed), Fifty Years of the Law Commissions: The Dynamics of Law Reform, Oxford and Oregon, Hurt Publishing, 2016.
  • Elliott, Catherine/Frances Quinn, English Legal System, Eleventh Edition, Harlow, Pearson Longman, 2010.
  • Elliott, Catherine, English Legal System Essential Cases and Materials, Second Edition, Harlow, Pearson Longman, 2009.
  • Fafinski, Stefan/Emily Finch, English Legal System, 3rd Edition, Harlow, Pearson Longman, 2010.
  • Fafinski, Stephan, "Computer Misuse: The Implications of the Police and Justice Act 2006", Journal of Criminal Law, Vol. 72, Issue 1, 2006, s. 53-66.
  • Fafinski, Stephan, "Access Denied: Computer Misuse on an Era of Technological Change" Journal of Criminal Law, Vol. 70, Issue 5, 2006, s. 424-442.
  • Fafinski, Stefan, "Divisional Court: Computer Misuse: Denial-of-Service Attacks" Journal of Criminal Law, Vol. 70, Issue 6, 2006, s. 474-478.
  • Fearon, G., "All Party Internet (APIG) Report on the Computer Misuse Act", Comps. & Law, Vol. 15, 2004.
  • Freedman, C. D., "Criminal Misappropriation of Confidential Commercial Information and Cyberspace: Comments on the Issues", International Review of Law, Computers and Technology, Vol. 13, 1999.
  • Gillespie, Alisdair A., Cybercrime: Key Issues and Debates, London and New York, Routledge, 2016.
  • Gillespie, Alisdair A., The English Legal System, 5th Edition, Oxford, Oxford University Press, 2015.
  • Gillespie, Alisdair A., Child Pornography: Law and Policy, London & New York, Routledge-Cavendish, 2012.
  • Gillespie, Alisdair A., "Restricting Access to the Internet by Sex Offenders", International Journal of Law and Information Technology, Vol. 19, No. 3, 2011, s. 165-186.
  • Gillespie, Alasdair A., "Child Protection on the Internet - challenges for Criminal Law", Child adn Family Law Quarterly, Vol. 14, No. 4, 2002, s. 411- 425.
  • Goodman, Marc D., "Why the Police Don't Care about Computer Crime", Harvard Journal of Law and Technology, Vol. 10, Number 3, Summer 1997, s. 465-494.
  • Grabosky, Peter/Russell G. Smith/Gillian Dempsey, Electronic Theft: Unlawful Acquisition in Cyberspace, Cambridge, Cambridge University Press, 2001.
  • Hafner, Katie/John Markoff, Cyberpunk: Outlaws and Hackers on the Computer Frontier, New York, Simon and Schuster, 1991.
  • Hessick, Carissa Byrne (Ed), Refining Child Pornography Law: Crime, Language and Social Consequances, Michigan, University of Michigan Press, 2016.
  • Hirst, Michael, Jurisdiction and the Ambit of the Criminal Law, Oxford, Oxford University Press, 2003.
  • Hodes, W. William, "Seeking the Truth versus Telling the Truth at the Boundaries of the Law: Misdirection, Lying, and 'Lying with an Explanation'", South Texas Law Review, Vol. 44, Winter 2002, s. 53-79.
  • Holder, C., "Staying One Step Ahead of the Criminals", IT Law, Vol. 10, Issue 3, 2002, s. 17 vd.
  • Hollinger, Richard C., Crime, Deviance and the Computer, Aldershot, Dartmouth Publishing, 1997.
  • Horder, Jeremy, "The Classification of Crimes and the Special Part of the Criminal Law", Defining Crimes Essays on The Special Part of the Criminal Law, Ed: R. A. Duff/Stuart P. Green, Oxford, Oxford University Press, 2005.
  • Hunton, Paul, "The Growing Phenomenon of Crime and the Internet: A Cybercrime Execution and Analysis Model", Computer Law and Security Report, Vol. 25, 2009, s. 528-535.
  • Kilger, Max/Ofir Arkin/Jeff Stutzman, "Profiling", in Honeynet Project, Know Your Enemy, Learning about Security Threats, 2nd edn, Addison-Wesley Professional, 2004.
  • Kerr, Orin S., "Cybercrime's Scope: Interpreting 'Access' and 'Authorization' in Computer Misuse Statutes", New York University Law Review, Vol. 78, 2003, s. 1596-1668.
  • Kohl, Uta, Jurisdiction and Internet: Regulatory Competence over Online Activity, Cambridge, Cambridge University Press, 2007.
  • Koops, Bert-Jaap, "Should ICT Regulation Be Technology-Neutral?", Ed: BertJaap Koops/Miriam Lips/Corien Prins/Maurice Schellekers, Starting points for ICT Regulation: Deconstructing Prevalent Policy One-liners, IT & Law Series Vol. 9, The Hague, TMC Asser Press, 2006, s. 77-108.
  • Kowalski, Melaine, Cyber-Crime: Issues, Data Sources, and Feasibility of Collecting Police-Reported Statistics, Cat. No. 85-558-XIE, Canadian Centre for Justice Statistics, 2002.
  • Kshetri, Nir, "The Simple Economics of Cybercrimes", IEEE Security and Privacy, Vol. 4, No. 1, January/February 2006, s. 8-13, (available at SSRN: http://ssrn. com/abstract=881421).
  • LaFave, Wayne R., Criminal Law, Fourth Edition, St. Paul, Thomson & West, 2003.
  • Lessig, Lawrence, Code and other Laws of Cyberspace, New York, Basic Books, 1999.
  • Levi, Michael, "Between the Risk and the Reality Falls the Shadow", Crime and the Internet: Cybercrimes and Cyberfears, Ed: David S. Wall, London & New York, Routledge, 2001, s. 44-58.
  • Lixian, Cong, "Chinese E-Commerce (2) and Legal Environment", Chinese Intellectual Property and Technology Laws, Ed: Rohan Kariyawasam, Edward Elgar Publishing, 2011.
  • MacEwan, Neil, "The Computer Misuse Act 1990: Lessons from Its Past and Predictions for Its Future" Criminal Law Review, Vol. 12, 2008, s. 955-967.
  • Marsden, Christopher T., Internet Co-Regulation: European Law Regulatory Governance and Legitimacy in Cyberspace, Cambridge, Cambridge University Press, 2011.
  • Martin, Jacqueline, English Legal System: Key Facts Key Cases, London and New York, Routledge, 2014.
  • Masiola, Rosanna/Renato Tomei, Law, Language and Translation From Concepts to Conflicts, Heidelberg, Springer, 2015.
  • McAlinden, Anne-Marie, 'Grooming' and the Sexsual Abuse of Children; Instituonal, Internet and Familial Dimensions, Oxford, Oxford University Press, 2012.
  • McKnight, Gerald, Computer Crime, Walker and Co., 1973.
  • Mitnick, Kevin D./William L. Simon, Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers, Wiley Publishing, 2005.
  • Moore, G. E., "Cramming More Components onto Integrated Circuits", Electronics, Vol. 38, No. 8, 1965, s. 114-117.
  • Morris, Sheridan, The Future of Netcrime Now: Part 1 - Threats and Challenges, Home Office Online Report 62/04, 2014.
  • Noam, Eli M., "Beyond Liberalization II: The Impending Doom of Common Carriage", Telecommunications Policy, Vol. 18, No. 6, 1994, s. 435-452.
  • Ormerod, David /David Perry, Blackstone's Criminal Practice 2017, Oxford, Oxford University Press, 2016.
  • Ormerod, David, Smith & Hogan's Criminal Law, 13th Edition, Oxford, Oxford University Press, 2011.
  • Ormerod, David /Simon McKay, "Telephone Intercepts and their Admissibility", Criminal Law Review, January 2004, s. 15-38.
  • Parker, Donn B., Crime by Computer, New York, Scribner, 1976.
  • Pieth, Mark/Radha Ivory, Corporate Criminal Liability: Emergence Convergence and Risk, Ius Gentium: Comparative Perspectives on Law and Justice 9, Heidelberg, Springer, 2011.
  • Pinto, Amanda/Martin Evans, Corporate Criminal Liability, Second Edition, Sweet & Maxwell, 2008.
  • Reed, Chris, Internet Law: Text and Materials, 2nd Edition, Cambridge, Cambridge University Press, 2004.
  • Reid, A. S. /N. Ryder, "The Case of Richard Tomlinson: The Spy Who E-mailed Me", Information and Communications Technology Law, Vol. 9, Issue 1, 2000, s. 61 vd.
  • Rosci, Marco, Cyber Operations and the Use of Force in International Law, Oxford, Oxford University Press, 2014.
  • Rowbottom, Jacop, "Obscenity Laws and the Internet: Targeting the Supply and Demand", Criminal Law Review, February 2006, s. 97-109.
  • Sieber, Ulrich, Legal Aspects of Computer - Related Crime in the Information Society - COMCRIME Study, http://www.edc.uoc.gr/~panas/PATRA/sieber. pdf; 25.11.2016.
  • Sieber, Ulrich, "Instruments of International Law: Against Terrorist Use of the Internet, A War on Terror? The European Stance on a New Threat, Changing Laws and Human Rights Implications, Ed: Marianne Wade/Almir Maljevic, Heilderberg, Springer, 2010, s. 171-220.
  • Simester, Andrew /G. Robert Sullivan, Criminal Law: Theory and Doctrine, Second Edition, Portland, Hart Publishing, 2004.
  • Spink, Paul, "Misuse of Police Computers", Juridical Review, Vol. 42, 1997, s. 219-231.
  • Stoll, Cliff, Cuckoo's Egg, New York, Pocket Books, 1998.
  • Thomas, Douglas, "Criminality on the Electronic Frontier: Corporality and the Judicial Construction of the Hacker", Cybercrime: Law Enforcement, Security and Surveillance in the Information Age, Ed: Douglas Thomas/Brian D. Loader, London & New York, Routledge, 2000, s. 17-35.
  • Tomlinson, Richard, The Big Breach: From Top Secret to Maximum Security, Narodny Variant Publishers, Moskova, 2001.
  • Xu, Zhengchuan /Qing Hua/ Chenghong Zhang, "Why Computer Talents Become Computer Hackers", Communications of the ACM, Vol. 56, No. 4, 2013, s. 64-74.
  • Wagner, Ben, Global Free Expression - Governing the Boundaries of Internet Content, Law Governance and Technology Series, Vol. 28, Switzerland, Springer, 2016.
  • Walden, Ian, Computer Crimes and Digital Investigations, Second Edition, Oxford, Oxford University Press, 2016.
  • Walden, Ian /Martin Wasik, "The Internet: Access Denied Controlled!", Criminal Law Review, Issue 5, 2011, s. 377-387.
  • Walden, Ian, "Harmonising Computer Crime Laws in Europe", European Journal of Crime, Criminal Law and Criminal Justice, Vol. 12, Issue 4, 2004, s. 321-336.
  • Walker, Claire, "Email Interception and RIPA: the Court of Appeal Rules on the 'Right to Control' fence", Communications Law: Journal of Computer, Media & Telecommunication, Vol. 11, Issue 1, 2006.
  • Wall, David S., Cybercrime: The Transformation of Crime in the Information Age, Cambridge, Polity Press, 2014.
  • Wall, David S., Cyberspace Crime, London, Dartmouth, 2003.
  • Wall, David S., "Policing the Internet: Maintaining Order and Law on the Cyber-beat", The Internet, Law and Society, Ed: Yaman Akdeniz/Clive Walker/ David Wall, Longman, 2000.
  • Wasik, Martin, Crime and the Computer, Oxford, Clarendon Press, 1991. Wasik, Martin, "Law Reform Proposals on Computer Misuse", Criminal Law Review, 1989, s. 257-270.
  • Whittle, Helen /Catherine Hamilton-Giachritsis/Anthony Beech/Guy Collings, "A Review of Online Grooming: Characteristics and Concerns" Aggression and Violence Behaviour, Vol. 18, Issue 1, 2013, s. 62-70.
  • Willems, Eddy, Cybergefahr: Wie wir uns gegen Cyber-Crime und OnlineTerror wehren können, Wiesbaden, Springer Vieweg, 2015.
  • Williams, D., Not in the Public Interest; the Problem of Security in Democracy, London, Hutchison, 1965.
  • Wright, Tim /Dominic Hodgkinson, "Government Response to House of Lords Science and Technology Committee Report on Personal Internet Security", Computer and Telecommunications Law Review, Vol. 14, 2008, s. 65 vd.
  • Australian Communications and Media Authority, "Like, post, share: Young Australians' experience of social media", Quantitative Research Report, 2013.
  • Attorney General's Department (Australia), National plan to combat cybercrime, 2013.
  • Barrett, Neil, "Scary Whodunit Will Have Sequels" IT Week, 27 Ekim 2003.
  • Bird, Steve, "Lovelorn Hacker Sabotaged Network of U.S. Port", Times (UK), 7 Ekim 2003, s. 9.
  • Chapman, John, "The Nerdy Brit Who Paralysed a U.S. City", Express (UK), 7 Ekim 2003, s. 24.
  • Computer Crime and Intellectual Property Section, The National Information Infrastructure Protection Act of 1996, Legislative Analysis, US Depertmant of Justice, 1998.
  • CPS, Legal Guidance to Computer Misuse Act 1990, at "Section 3A CMA - Making, supplying or obtaining articles" http://www.cps.gov.uk/legal/a_to_c/ computer_misuse_act_1990/index. html, 2.10.2016.
  • Cullen, Drew, "Dutch Smash 100.000-Strong Zombie Army, DDoS Attacks and Paypal Fraud", The Register, 7 Ekim 2005, http://www.theregister. co.uk/2005/10/07/dutch_police_smash _zombie_network/, 23.9.2016.
  • Cummings, Roger, Director of the UK National Infrastructure Security Coordination Centre (NISCC) in Tom Espiner, "Foreign Powers are Main Cyberthreat, UK Says", CNET News.com, 23 Kasım 2005, http://www.cnet. com/au/news/foreign-powers-are-main-cyberthreat-u-k-says/, 27.9.2016.
  • DJNZ and The Action Tool Development Group of the Electrohippies Collective, "Client-side Distributed Denial-of-Service: Valid Campaign Tactic or Terrorist Act?", The Electrohippies Collective, Occasional Paper No. 1, Şubat 2000.
  • Depertmant of Justice, "Computer Virus Broker Arrested for Selling Armies of Infected Computers to Hackers and Spammers", Press Release, 3 Kasım 2005, https://www.justice.gov/ archive/criminal/cybercrime/press-releases/2005/ anchetaArrest.htm, 23.9.2016.
  • Europol, "Cybercriminal Darkode forum taken down through global action", Press Release, 15 Temmuz 2015, https://www.europol.europa.eu/content/ cybercriminal-darkode-forum-taken-down-through-global-action, 1.10.2016.
  • Hancock, David, "Spammer gets 9 years", CBS News, 8 Nisan 2005, http:// www.cbsnews.com/news/spammer-gets-9-years/, 6.10.2016.
  • House of Lords Science and Technology Report, Personal Internet Security, 2007.
  • Kotadia, Munir, "Accused Port Hacker Says Log Files Were 'Edited'", ZDNet. co.uk, 8 Ekim 2003, http://www.zone-h.org/news/id/3300?zh=1, 25.12.2016.
  • Krotoski, Aleks, "Population Explosion Puts Our Virtual Worlds at Risk", Guardian, 12 Ocak 2006, https://www.theguardian.com/technology/2006/ jan/12/games.guardianweekly technologysection, 23.9.2016.
  • Law Commission, Legislating the Criminal Code: Misuse of Trade Secrets, Consultation Paper No 150, 1997.
  • Leyden, John, "Caffrey Acquittal a Setback for Cybercrime Prosecutions", Register, 17 Ekim 2003, http://www.theregister.co.uk/2003/10/17/caffrey_ acquittal_a_setback/, 15.12.2016.
  • McCue, Andy, "'Revenge' Hack Downed US Port Systems", ZDNet UK, 7 Ekim 2003, http://www.zdnet.com/article/revenge-hack-downed-us-portsystems/; 25.12.2016.
  • McGuire, Mike/Samantha Dowling, Cyber Crime: A Review of the Evidence, Research Report 75, Summary of Key Findings and Implications, Home Office, October 2013.
  • "Nurse Alters Hospital Prescriptions", Computer Fraud & Security Bulletin, Issue 2, 1994, s. 4-5.
  • Office of Telecommunications (Oftel), Guidelines for the Interconnection of Public Electronic Communication Networks, 23 Mayıs 2003.
  • Oxford English Dictionary Online, Oxford University Press, December 2014.
  • Purdy, Alison, "Hacker Cleared of Causing Biggest US Systems Crash", Birmingham Post, 18 Ekim 2003, s. 5, https://www.thefreelibrary.com/ Hacker+cleared+of+causing+biggest+US +systems+crash.-a0109001502; 25.12.2016.
  • Schwartz, John, "Acquitted Man Says Virus Put Pornography on Computer", New York Times, 11 Ağustos 2003.
  • Turner, Michael J. L., "Computer Misuse Act 1990 Cases" http://www. computerevidence.co.uk/ Cases/CMA.htm, 30.8.2016.
  • United Nations Office on Drugs and Crime, Comprehensive study on cybercrime, 2013. The Cybercrime Law and Its Practice in United Kingdom Within the Context of Comperative Law Assoc. Prof. Dr. Murat Volkan DÜLGER TAAD, Yıl:8, Sayı:31 (Temmuz 2017) 257
  • US Department of Justice (DoJ), "U.S. Charges Five Chinese Military Hackers with Cyber Espionage Against U.S. Corporations and a Labor Organization for Commercial Advantage", Press Release, 19 Mayıs 2014, https://www.fbi.gov/ contact-us/field-offices/pittsburgh/news/press-releases/u.s.-charges-fivechinese-military-hackers-with-cyber-espionage-against-u.s.-corporationsand-a-labor-organization-for-commercial-advantage, 1.1.2017.
  • US Sentencing Commission, Guidelines Manual (yürürlüğe giriş 1 Kasım 2015), s 2B1.1, bkz: http://www.ussc.gov/guidelines/2015-guidelines-manual/ archive, 6.10.2016.
  • Vixie, Paul/Gerry Sneeringer/Mark Schleifer, "Events of 21 Oct 2002", 24 Kasım 2002, http://c.root-servers.org/october21.txt, 23.9.2016.
  • Ward, Mark, "Bookies suffer Online Onslaught", BBC News, 19 Mart 2004, http://news.bbc. co.uk/2/hi/technology/3549883.stm, 23.9.2016.
  • Webster, Stephen/Julia Davidson/Antonia Bifulco/Petter Gottschalk/
  • Vincenzo Caretti/Thierry Pham/Julie Grove-Hills,/Caroline Turley/Charlotte Tompkins/Stefano Ciulla/Vanessa Milazzo/Adriano Schimmenti/Giuseppe
  • Craparo, European Online Grooming Project, Final Report, European Commision Sefer Internet Plus Programme, Mart 2012.