User Guide
Why can I only view 3 results?
You can also view all results when you are connected from the network of member institutions only. For non-member institutions, we are opening a 1-month free trial version if institution officials apply.
So many results that aren't mine?
References in many bibliographies are sometimes referred to as "Surname, I", so the citations of academics whose Surname and initials are the same may occasionally interfere. This problem is often the case with citation indexes all over the world.
How can I see only citations to my article?
After searching the name of your article, you can see the references to the article you selected as soon as you click on the details section.
  Citation Number 1
 Views 81
 Downloands 20
Türkiye’nin Siber Güvenlik Politikalarının Analizi; Türkiye’nin Siber Güvenlik Modeli için Öneriler
2019
Journal:  
Journal of TESAM Akademy
Author:  
Abstract:

Siber uzay denilen alanın ortaya çıkışı Amerika Birleşik Devletleri (ABD) ve Rusya Federasyonu (RF) arasında Soğuk Savaş döneminde yaşanan askeri rekabet kapsamında geliştirilen ağ teknolojileri temelli yeniliklerin 1990’lar ile birlikte sivil kullanıma açılmasıyla başlamıştır. Soğuk Savaş’ın bitimi ile birlikte internetin sivilleşmesi ve ticarileşmesi, 2010 yılı sonrası dönemde akıllı telefonların ve sosyal medya uygulamalarının hayatın her alanına yayılması siber uzayın kara, deniz, hava ve uzaydan sonra insanlığın ulaştığı beşinci boyut olarak adlandırılmasına neden olmuştur. Türkiye de 1990’lı yıllar ile birlikte, güvenliğini sağlamak amacıyla siber güvenlik politikaları geliştirmeye başlamıştır. Bu süreçler ise dünyadaki gelişmelere bağlı olarak 2010 yılı sonrasında hızlandırılmıştır. Bu kapsamda çalışmada Türkiye’nin siber güvenlik politikaları, bu alandaki kurumsal yapılanmaların irdelenmesi temel alınmak suretiyle değerlendirilecektir. Böylelikle de Türkiye’nin en etkili siber savunma ve saldırı kapasitesine sahip olması amacı kapsamında, dünyadaki diğer devletlerin siber güvenlik temelli planlamaları analiz edilmek suretiyle ve reel politik güvenlik paradigmalarına uygun şekilde, devlet merkezli bir yaklaşımla öneriler ortaya konmaya çalışılacaktır.

Keywords:

Analysis of Turkey’s Cybersecurity Policy; Recommendations for Turkey’s Cybersecurity Model
2019
Author:  
Abstract:

The emergence of the area called cyber space began with the opening of network technology-based innovations under the military competition between the United States (US) and the Russian Federation (RF) during the Cold War, along with the 1990s, to civil use. With the end of the Cold War, the civilization and commercialization of the internet, the spread of smartphones and social media applications throughout the period after 2010 have led to the cyber space to be named the fifth dimension to which mankind reaches after land, sea, air and space. In the 1990s, Turkey began developing cybersecurity policies in order to ensure its security. These processes have been accelerated after 2010 due to the world’s developments. In this framework, the research will assess the cybersecurity policies of Turkey on the basis of the establishment of corporate structures in this area. Thus, in the context of Turkey’s most effective cyber defense and attack capacity, the other countries in the world will be trying to analyze the cyber security-based plans and make suggestions in accordance with the real political security paradigms, with a state-centered approach.

Keywords:

Analysis Of Turkey's Cyber Security Policies; The Potential Cyber Security Strategy Of Turkey
2019
Author:  
Abstract:

The emergence of the so-called cyberspace began in the 1990s with the introduction of civilian technologies in the context of military technologies developed during the Cold War period between the United States (US) and the Russian Federation (RF). The civilization and commercialization of the internet together with the end of the Cold War,  the spread of smart phones and social media applications to all areas of life after 2010, cyber space has been accepted as the fifth dimension reached by humanity after land, sea, air and space. Turkey has begun to develop cyber security strategies and policies to ensure its security.  These processes have been accelerated after 2010 due to the developments in the world. In this article, Turkish policies in the area of cyber security will be evaluated by particularly analysing organizational structures in this field. Thus, Turkey will also be demonstrated effective cyber defence and cyber-attacks in the world other states in order to have the capacity to analyse security-based planning and realpolitik security paradigms appropriate recommendations with a state-centred approach.

Keywords:

Citation Owners
Attention!
To view citations of publications, you must access Sobiad from a Member University Network. You can contact the Library and Documentation Department for our institution to become a member of Sobiad.
Off-Campus Access
If you are affiliated with a Sobiad Subscriber organization, you can use Login Panel for external access. You can easily sign up and log in with your corporate e-mail address.
Similar Articles






Journal of TESAM Akademy

Field :   Sosyal, Beşeri ve İdari Bilimler

Journal Type :   Uluslararası

Metrics
Article : 216
Cite : 597
2023 Impact : 0.149
Journal of TESAM Akademy