S İ B E R T E R Ö R , T E R Ö R İ Z M V E M Ü C A D E L E
279
[4] Sadeghi, A.R., “Games without Frontiers: Whither Information Security
and Privacy?”, IEEE Security & Privacy, vol. 14(1), pp. 3-5, 2016.
[5] Lapayese, M.J.G., “Terrorism and Its Transition to Cyberspace”, IEEE
European Intelligence and Security Informatics Conference, pp. 178,
2015.
[6] Morgan, S., “2017 Cybercrime Report”,
Cybersecurity Ventures,
Herjavec Group, pp. 1-24, 2017.
[7] Weimann, G., “Terror on the Internet: The New Arena, the New
Challenges”, United State Institute of Peace,
Washington DC, 2006.
[8] Dewan, P., Kumaragru, P., “Towards Automatic Real Time Identification
of Malicious Posts on Facebook”, 13th Annual Conference on
Privacy, Security and Trust (PST), pp. 85-92, 2015.
[9] Zech, M. “17 Spam Scams on Facebook, Twitter”, https://nltimes.nl/
2014/07/22/flight-17-spam-scams-facebook-twitter/, 2014.
[10] Berghel, A., “Farewall to Air Gaps, Part 2”, IEEE Computers &
Magazines, vol. 48(7), pp. 59-63, 2015.
[11] Hoffman, B., “Inside Terrorism”, New York: Columbia University
Press, 2006.
[12] Post, J. “The Mind of Terrorist: The Psychology of Terrorism from IRA
to al-Qaeda”, New York:
Palgrave Macmillian, 2007.
[13] Kilger, M., “Integrating Human Behavior into the Development
of Future Cyberterrorism Scenarios”, IEEE 10th International
Conference on Availability,
Reliability and Security, pp. 693-700,
2015.
[14] Silke, A., “Terrorists, Victims and Society: Psychological Perspectives
on Terrorism and its Consequences (The Psychology of Cyber-
terrorism)”, John Wiley & Sons, 2003.
[15] Canetti, D., Gross, M.L., Waismel-Manor, I., “Binary Bullets: The Ethics
of Cyberwarfare (Immune from Cyberfire?)”, Oxford University
Press, 2016.
[16] Cuevas ve Rennison, “The Psychology of Violence (The Psychology of
Cyberviolence)”, Wiley-Blackwell, 2016.
[17] Bosco, F., “The New Cybercriminals HPP: Hacker Profiling Project”,
SECURE 2012, Poland, 2012.
[18] DARPA: Defense Advanced
Research Projects Agency, “Proposal
for R&D Support of DARPA Cyber Genome Program”, General
Y I L D I R A Y Y A L M A N
280
Dynamics Advanced Information Systems, Virgiia, USA, pp. 1-45,
2010.
[19] Cho, H., Lee, S., Kim, B., Shin, Y., Lee, T., “The Study of Prediction of
Same Attack Group by Comparing Similarity Domain”, International
Conference on Information and Communication Technology
Convergence (ICTC), pp. 1220-1222, 2015.
[20] Blazic, B.J.,
Klobucar, T., “Missing Solutions in the Fight against
Cybercrime and Cyberterrorism – the New EU Research Agenda”,
European Intelligence and Security Informatics Conference, pp. 128-
131, 2016.
[21] TÜİK, http://www.tuik.gov.tr/HbPrint.do?id=24862, 2017.
[22] Kara, M. “Türkiye’de yazılım/donanım güvenliği değerlendirme
çalışmaları”, TÜBİTAK-UEKAE, 2009.
[23] Yalman, Y. Yesilyurt, M., “Information Security Threats and Information
Assurance”, TEM Journal - Technology, Education,
Management,
Informatics, vol. 2(3), pp. 247–252, 2013.
[24] Kam, H.J., Katerattanakul, P., “Diversifying Cybersecurity Education:
A Non-Technical Approach to Technical Studies”, IEEE Frontiers on
Education Conference, pp. 1-4, 2014.
[25] Page, E.J., Allen, L.A., Gray, J.P., Bateman, S.M., “Development
and Description of an Interdisciplinary Course on the Science of
Terrorism”, IEEE 3rd Integrated STEM Education Conference, pp.
1-4, 2013.