Research Article
BibTex RIS Cite

İşletmelerin Maruz Kaldığı Siber Suçların Boyutu

Year 2023, Volume: 12 Issue: 1, 69 - 96, 31.05.2023
https://doi.org/10.28956/gbd.1264593

Abstract

İnsanlar teknolojik gelişmeler ve internetin yaygınlaşmasıyla birlikte alışveriş yapma, arkadaşlarıyla görüşme, bankacılık işlemleri gibi alışkanlıklarını değiştirmeye başlamıştır. Bu değişim ve siber ortam vasıtasıyla suç kavramı da dönüşüme uğramış ve siber suç kavramı insan hayatına girmiştir. Teknolojiye uyum sağlamaya çalışan işletmeler ise siber ortamın tehlikeleriyle karşılaşmıştır. Genel amacı işletmeleri bir siber suçun hedefi haline getiren faktörleri araştırmak olan çalışmada Siber Güvenlik İhlalleri Anketi 2021’in veri setleri ikincil veri olarak kullanılmıştır. Türkiye’de işletmeler ve siber suç konularında yapılan az sayıdaki çalışma siber güvenlik ve siber risk üzerine yapılmıştır. Bu araştırmada ise işletmenin büyüklüğü, insan faktörü, dijital görünürlük, siber güvenlik önlemleri, siber farkındalık ve siber suçla mücadele eğitiminin siber suç mağduriyeti ile ilişkisi incelenmiştir. Araştırma sonucunda orta ve büyük işletmelerin daha fazla siber suça maruz kaldığı görülürken, işletmelerin en yaygın maruz kaldığı siber suç oltalama suçu olmuştur. İnsan faktörünün oltalama suçu riskini artıran etken olarak çıktığı çalışmada, işletmelerin siber ortamdaki görünürlüğünün siber suç mağduriyetini artırdığı görülmüştür. Araştırmanın sonuç kısmında ise analiz sonuçları yorumlanarak bireylere, işletmelere ve siber güvenlikle ilgili politika üreten kurumlara öneriler sunulmuştur.

References

  • Abduladheem, M. S. (2017). Farklı işletmelerin ortak siber güvenlik politikalarının karşılaştırmalı araştırması [Yayınlanmamış yüksek lisans tezi]. Atılım Üniversitesi, Ankara.
  • Accenture Security, & Ponemon Institute. (2019). The cost of cybercrime. Erişim tarihi: 21.08.2021, https://www.accenture.com/_acnmedia/pdf-96/accenture-2019-cost-of-cybercrime-study-final.pdf.
  • Ahmad, M. A. (2021). Worms. B. Warf. (Ed.). The sage encylopedia of the internet içinde (ss. 987-992). Sage Publications.
  • Akdemir, N., & Lawless, C. J. (2020). Exploring the human factor in cyber-enabled and cyber-dependent crime victimisation: A lifestyle routine activities approach. Internet Research, 30(6), 1665-1687. Erişim tarihi: 30.09.2021, https://doi.org/10.1108/INTR-10-2019-0400.
  • Anderson, R., Barton, C., Böhme, R., Clayton, R., Eeten, M., Levi, M., Moore, T., & Savage, S. (2012). Measuring the cost of cybercrime. Erişim tarihi: 18.09.2021, https://doi.10.1007/978-3-642-39498-0_12.
  • Avast. (2021). What is cyber security? Erişim tarihi: 18.10.2021, https://www.avast.com/c-b-what-is-cybersecurity.
  • Birleşmiş Milletler Ticaret ve Kalkınma Konferansı. (2021). Cybercrime legislation worldwide. Erişim tarihi: 23.08.2021, https://unctad.org/page/cybercrime-legislation-worldwide.
  • Bozgeyik, A. (2018). Gaziantep'te faaliyet gösteren orta ve büyük ölçekli işletmelerin siber güvenlik yönetim yaklaşımlarının analizi [Yayınlanmamış doktora tezi]. Hasan Kalyoncu Üniversitesi Sosyal Bilimler Enstitüsü, Gaziantep.
  • Büyükkılıç, M. (2018). Cybersecurity framework for small and medium size enterprises [Yayınlanmamış yüksek lisans tezi]. Bahçeşehir Üniversitesi, İstanbul.
  • Cohen, L., & Felson, M. (1979). Social change and crime rate trends: A routine activity approach. American Sociological Review. 44.
  • Felson, M., & Clarke, R. V. (1998). Opportunity makes the thief. Police research series, paper, 98 (1-36).
  • Gordon, S., & Ford, R. (2006). On the definition and classification of cybercrime. Journel in Computer Virology, 2(1). 13-20.
  • Grabosky, P. N. (2001). Virtual criminality: Old wine in new bottles? Social & Legal Studies, 10(2), 243-249.
  • IBM. (2014). IBM security services 2014 cyber security intelligence index. Erişim tarihi: 07.10.2021, https://i.crn.com/sites/default/files/ckfinderimages/userfiles/images/crn/custom/IBMSecurityServices2014.PDF.
  • IBM. (2015). IBM security services 2015 cyber security intelligence index. Erişim tarihi: 07.10.2021, https://securityintelligence.com/media/cyber-security-intelligence-index-2015/.
  • Jackson, L. A. (2018). Malware. B. Warf. (Ed.). The sage encylopedia of the internet içinde (ss. 619-624). Sage Publications.
  • Jakankhani H., Al-Nemrat, A., & Hosseinian-Far, A. (2014). Cybercrime classification and characteristics. Akhgar, B., Staniforth, A., & Bosco, F. (Ed.). Cyber crime and cyber terrorism investigator’s handbook içinde (ss. 149-164). Elseviar.
  • Johns, E. (2020). Cyber security breaches survey 2020: Main report. London: Department for Digital, Culture, Media & Sport. Erişim tarihi: 12.12.2021, https://www.gov.uk/government/statistics/cyber-security-breaches-survey-2020.
  • Johns, E. (2021a). Cyber security breaches survey 2021: Main report. London: Department for Digital, Culture, Media & Sport. Erişim tarihi: 13.12.2021, https://www.gov.uk/government/statistics/cyber-security-breaches-survey-2021.
  • Johns, E. (2021b). Cyber security breaches survey 2021: Technical annex. London: Department for Digital, Culture, Media and Sport. Erişim tarihi: 13.12.2021, https://www.gov.uk/government/statistics/cyber-security-breaches-survey-2021.
  • Kharraz, A. (2018). Ransomware. B. Warf. (Ed.). The sage encylopedia of the internet içinde (ss. 720-724). Sage Publications.
  • Klahr, R., Amili, S., Shah, J., Wang, V., & Button, M. (2016). Cyber security breaches survey 2016: Main report. Erişim tarihi: 16.12.2021, https://www.gov.uk/government/publications/cyber-security-breaches-survey-2016.
  • Kaspersky. (2021b). Siber güvenlik nedir? Erişim tarihi: 17.08.2021, https://www.kaspersky.com.tr/resource-center/definitions/what-is-cyber-security.
  • Kaspersky. (2021c). The human factor in IT security: How employees are making businesses vulnerable from within. Erişim tarihi: 18.09.2021, https://www.kaspersky.com/blog/the-human-factor-in-it-security/.
  • Klahr, R., Shah, J., Sheriffs, P., Tossington, T., Pestell, G., Button, M., & Wang, V. (2017). Cyber security breaches survey 2017: Main report. Erişim tarihi: 15.12.2021, https://www.gov.uk/government/statistics/cyber-security-breaches-survey-2017.
  • Küçük ve Orta Büyüklükteki İşletmelerin Tanımı, Nitelikleri ve Sınıflandırılması Hakkında Yönetmelik. (2005, 18 Kasım). Resmi Gazete (Sayı: 25997). Erişim tarihi: 15.10.2021, https://www.resmigazete.gov.tr/eskiler/2018/06/20180624-7.pdf.
  • Lewis, J. A. (2018). Economic impact of cybercrime. McAffee. Erişim tarihi: 11.11.2021, https://www.mcafee.com/enterprise/en-us/assets/reports/restricted/rp-economic-impact-cybercrime.pdf.
  • Lewis, J. A., Smith, Z. M., & Lostri, E. (2020). The hidden costs of cybercrime. McAffee. Erişim tarihi: 10.11.2021, https://www.mcafee.com/enterprise/en-us/assets/reports/rp-hidden-costs-of-cybercrime.pdf.
  • Marion, N. E., & Twede, J. (2020). Cybercrime: An encyclopedia of digital crime. ABC-CLIO.
  • Marsh, & Microsoft. (2019). 2019 global cyber risk perception survey. Erişim tarihi: 15.02.2022, https://www.microsoft.com/security/blog/wp-content/uploads/2019/09/Marsh-Microsoft-2019-Global-Cyber-Risk-Perception-Survey.pdf.
  • Marsh, & TÜSİAD. (2020). 2020 Türkiye siber risk algı araştırması. Erişim tarihi: 17.02.2022, https://tusiad.org/tr/yayinlar/raporlar/item/10602-2020-turkiye-siber-risk-algi-arastirmasi.
  • Mucuk, İ. (2011). Modern işletmecilik (17nci basım). Türkmen Kitabevi. (Orijinal çalışma basım tarihi 1983).
  • Ngo, F. T. (2018). Cybercrime. B. Warf. (Ed.). The sage encylopedia of the internet içinde (ss. 128-134). Sage Publications.
  • Norton. (2022). Bot and botnet. Erişim tarihi: 27.07.2022, https://www.nortonlifelockpartner.com/security-center/bots.html.
  • Pecora, D. (2009). Malware. Mcquade, S. C. (Ed.). Encyclopedia of cybercrime içinde (ss. 121-123). Greenwood Press.
  • Ponemon Institute. (2016). 2016 cost of cyber crime study & the risk of business innovation. Erişim tarihi: 07.02.2022, https://www.ponemon.org/local/upload/file/2016%20HPE%20CCC%20GLOBAL%20REPORT%20FINAL%203.pdf.
  • Prakende Ticarette Uygulanacak İlke ve Kurallar Hakkında Yönetmelik. (2016, 6 Ağustos). Resmi Gazete (Sayı: 29793). Erişim tarihi: 02.09.2021, https://www.resmigazete.gov.tr/eskiler/2016/08/20160806-4.html.
  • TDK. (2019). İşletme. Sozluk.gov.tr sözlüğü içinde. Erişim tarihi: 02.08.2021, https://sozluk.gov.tr/.
  • Tessian. (2020). Psychology of human error. Erişim tarihi: 29.10.2021, https://www.tessian.com/research/the-psychology-of-human-error/.
  • Thomas, D., & Loader, B. (2000). Cybercrime: Law enforcement, security and surveillance in the information age. D. Thomas, & B. Loader. (Ed.). Cybercrime: Law enforcement, security and surveillance in the information age içinde (ss. 1-13). Routledge.
  • Ürper, Y. (2018). İşletmeler ve özellikleri. Z. Erdoğan, & A. Hepkul (Ed.). Genel işletme içinde (ss. 2-33). Anadolu Üniversitesi Yayınevi.
  • Vaidya, R. (2019). Cyber security breaches survey 2019: Main report. Department for Digital, Culture, Media and Sport, 66. Erişim tarihi: 19.12.2021, https://www.gov.uk/government/statistics/cyber-security-breaches-survey-2019.
  • Veenstra, S., Zuurveen, R., & Stol, W. (2016). Cybercrime among companies: Research into cybercrime victimisation among small- and medium-sized enterprises and one-man businesses in the Netherlands. Eleven International Publishing.
  • Yıldız, A. (2019). İşletme alanında nicel araştırma yöntemleri ve yayın etiği. Gazi Kitabevi.
  • Wall, D. S. (2004). What are cybercrimes. The Centre for Crime and Justice Studies, 58(4). Erişim tarihi: 02.07.2021, https://www.crimeandjustice.org.uk/publications/cjm/article/what-are-cybercrimes.
  • Wall, D. S. (2007). Cybercrime: The transformation of crime in the information age. Polity.
  • Wang, V., Button, M., Finnerty, K., Motha, H., Shah, J. Y., & White, Y. F. (2018). Cyber security breaches survey 2018: Main report. Erişim tarihi: 18.12.2021, https://www.gov.uk/government/statistics/cyber-security-breaches-survey-2018.
  • Willis Towers Watson. (2017). 2017 siber risk anketi. Erişim tarihi: 14.10.2021, https://www.willistowerswatson.com/-/media/WTW/Insights/2017/06/WTW-Cyber-Risk-Survey-US-2017.pdf?modified=20170609193130.
  • Woelk, B. (2009b). Preventing cybercrime. Mcquade III, S.C. (Ed.). Encyclopedia of cybercrime içinde (ss. 144-150). Greenwood Press.
  • Yar, M. (2005). The novelty of cybercrime: An assessment in light of routine activity theory. European Journal of Criminology 2(4), 407–427.

THE SIZE OF CYBER CRIMES THAT BUSINESSES ARE EXPOSED

Year 2023, Volume: 12 Issue: 1, 69 - 96, 31.05.2023
https://doi.org/10.28956/gbd.1264593

Abstract

People have started to change their habits such as shopping, meeting with friends, banking transactions with the technological developments and the spread of the internet. Through this change and the cyber environment, the concept of crime has also been transformed and the concept of cyber crime has entered human life. Businesses trying to adapt to technology have faced the dangers of the cyber environment. The datasets of the Cybersecurity Breaches Survey 2021 were used as secondary data in the study, the general purpose of which is to investigate the factors that make businesses the target of a cybercrime. Few studies on businesses and cybercrime in Türkiye have been conducted on cyber security and cyber risk. In this research, the relationship between the size of the business, the human factor, digital visibility, cyber security measures, cyber awareness and cybercrime training with cyber crime victimization has been examined. As a result of the research, it was seen that medium and large enterprises were exposed to more cybercrime, while the most common cybercrime that businesses were exposed to was phishing. In the study, where the human factor was found to be the factor that increased the risk of phishing crime, it was seen that the visibility of businesses in the cyber environment increased the victimization of cybercrime. In the conclusion part of the research, the results of the analysis were interpreted and suggestions were presented to the individuals, enterprises and the institutions that produce policies related to cyber security.

References

  • Abduladheem, M. S. (2017). Farklı işletmelerin ortak siber güvenlik politikalarının karşılaştırmalı araştırması [Yayınlanmamış yüksek lisans tezi]. Atılım Üniversitesi, Ankara.
  • Accenture Security, & Ponemon Institute. (2019). The cost of cybercrime. Erişim tarihi: 21.08.2021, https://www.accenture.com/_acnmedia/pdf-96/accenture-2019-cost-of-cybercrime-study-final.pdf.
  • Ahmad, M. A. (2021). Worms. B. Warf. (Ed.). The sage encylopedia of the internet içinde (ss. 987-992). Sage Publications.
  • Akdemir, N., & Lawless, C. J. (2020). Exploring the human factor in cyber-enabled and cyber-dependent crime victimisation: A lifestyle routine activities approach. Internet Research, 30(6), 1665-1687. Erişim tarihi: 30.09.2021, https://doi.org/10.1108/INTR-10-2019-0400.
  • Anderson, R., Barton, C., Böhme, R., Clayton, R., Eeten, M., Levi, M., Moore, T., & Savage, S. (2012). Measuring the cost of cybercrime. Erişim tarihi: 18.09.2021, https://doi.10.1007/978-3-642-39498-0_12.
  • Avast. (2021). What is cyber security? Erişim tarihi: 18.10.2021, https://www.avast.com/c-b-what-is-cybersecurity.
  • Birleşmiş Milletler Ticaret ve Kalkınma Konferansı. (2021). Cybercrime legislation worldwide. Erişim tarihi: 23.08.2021, https://unctad.org/page/cybercrime-legislation-worldwide.
  • Bozgeyik, A. (2018). Gaziantep'te faaliyet gösteren orta ve büyük ölçekli işletmelerin siber güvenlik yönetim yaklaşımlarının analizi [Yayınlanmamış doktora tezi]. Hasan Kalyoncu Üniversitesi Sosyal Bilimler Enstitüsü, Gaziantep.
  • Büyükkılıç, M. (2018). Cybersecurity framework for small and medium size enterprises [Yayınlanmamış yüksek lisans tezi]. Bahçeşehir Üniversitesi, İstanbul.
  • Cohen, L., & Felson, M. (1979). Social change and crime rate trends: A routine activity approach. American Sociological Review. 44.
  • Felson, M., & Clarke, R. V. (1998). Opportunity makes the thief. Police research series, paper, 98 (1-36).
  • Gordon, S., & Ford, R. (2006). On the definition and classification of cybercrime. Journel in Computer Virology, 2(1). 13-20.
  • Grabosky, P. N. (2001). Virtual criminality: Old wine in new bottles? Social & Legal Studies, 10(2), 243-249.
  • IBM. (2014). IBM security services 2014 cyber security intelligence index. Erişim tarihi: 07.10.2021, https://i.crn.com/sites/default/files/ckfinderimages/userfiles/images/crn/custom/IBMSecurityServices2014.PDF.
  • IBM. (2015). IBM security services 2015 cyber security intelligence index. Erişim tarihi: 07.10.2021, https://securityintelligence.com/media/cyber-security-intelligence-index-2015/.
  • Jackson, L. A. (2018). Malware. B. Warf. (Ed.). The sage encylopedia of the internet içinde (ss. 619-624). Sage Publications.
  • Jakankhani H., Al-Nemrat, A., & Hosseinian-Far, A. (2014). Cybercrime classification and characteristics. Akhgar, B., Staniforth, A., & Bosco, F. (Ed.). Cyber crime and cyber terrorism investigator’s handbook içinde (ss. 149-164). Elseviar.
  • Johns, E. (2020). Cyber security breaches survey 2020: Main report. London: Department for Digital, Culture, Media & Sport. Erişim tarihi: 12.12.2021, https://www.gov.uk/government/statistics/cyber-security-breaches-survey-2020.
  • Johns, E. (2021a). Cyber security breaches survey 2021: Main report. London: Department for Digital, Culture, Media & Sport. Erişim tarihi: 13.12.2021, https://www.gov.uk/government/statistics/cyber-security-breaches-survey-2021.
  • Johns, E. (2021b). Cyber security breaches survey 2021: Technical annex. London: Department for Digital, Culture, Media and Sport. Erişim tarihi: 13.12.2021, https://www.gov.uk/government/statistics/cyber-security-breaches-survey-2021.
  • Kharraz, A. (2018). Ransomware. B. Warf. (Ed.). The sage encylopedia of the internet içinde (ss. 720-724). Sage Publications.
  • Klahr, R., Amili, S., Shah, J., Wang, V., & Button, M. (2016). Cyber security breaches survey 2016: Main report. Erişim tarihi: 16.12.2021, https://www.gov.uk/government/publications/cyber-security-breaches-survey-2016.
  • Kaspersky. (2021b). Siber güvenlik nedir? Erişim tarihi: 17.08.2021, https://www.kaspersky.com.tr/resource-center/definitions/what-is-cyber-security.
  • Kaspersky. (2021c). The human factor in IT security: How employees are making businesses vulnerable from within. Erişim tarihi: 18.09.2021, https://www.kaspersky.com/blog/the-human-factor-in-it-security/.
  • Klahr, R., Shah, J., Sheriffs, P., Tossington, T., Pestell, G., Button, M., & Wang, V. (2017). Cyber security breaches survey 2017: Main report. Erişim tarihi: 15.12.2021, https://www.gov.uk/government/statistics/cyber-security-breaches-survey-2017.
  • Küçük ve Orta Büyüklükteki İşletmelerin Tanımı, Nitelikleri ve Sınıflandırılması Hakkında Yönetmelik. (2005, 18 Kasım). Resmi Gazete (Sayı: 25997). Erişim tarihi: 15.10.2021, https://www.resmigazete.gov.tr/eskiler/2018/06/20180624-7.pdf.
  • Lewis, J. A. (2018). Economic impact of cybercrime. McAffee. Erişim tarihi: 11.11.2021, https://www.mcafee.com/enterprise/en-us/assets/reports/restricted/rp-economic-impact-cybercrime.pdf.
  • Lewis, J. A., Smith, Z. M., & Lostri, E. (2020). The hidden costs of cybercrime. McAffee. Erişim tarihi: 10.11.2021, https://www.mcafee.com/enterprise/en-us/assets/reports/rp-hidden-costs-of-cybercrime.pdf.
  • Marion, N. E., & Twede, J. (2020). Cybercrime: An encyclopedia of digital crime. ABC-CLIO.
  • Marsh, & Microsoft. (2019). 2019 global cyber risk perception survey. Erişim tarihi: 15.02.2022, https://www.microsoft.com/security/blog/wp-content/uploads/2019/09/Marsh-Microsoft-2019-Global-Cyber-Risk-Perception-Survey.pdf.
  • Marsh, & TÜSİAD. (2020). 2020 Türkiye siber risk algı araştırması. Erişim tarihi: 17.02.2022, https://tusiad.org/tr/yayinlar/raporlar/item/10602-2020-turkiye-siber-risk-algi-arastirmasi.
  • Mucuk, İ. (2011). Modern işletmecilik (17nci basım). Türkmen Kitabevi. (Orijinal çalışma basım tarihi 1983).
  • Ngo, F. T. (2018). Cybercrime. B. Warf. (Ed.). The sage encylopedia of the internet içinde (ss. 128-134). Sage Publications.
  • Norton. (2022). Bot and botnet. Erişim tarihi: 27.07.2022, https://www.nortonlifelockpartner.com/security-center/bots.html.
  • Pecora, D. (2009). Malware. Mcquade, S. C. (Ed.). Encyclopedia of cybercrime içinde (ss. 121-123). Greenwood Press.
  • Ponemon Institute. (2016). 2016 cost of cyber crime study & the risk of business innovation. Erişim tarihi: 07.02.2022, https://www.ponemon.org/local/upload/file/2016%20HPE%20CCC%20GLOBAL%20REPORT%20FINAL%203.pdf.
  • Prakende Ticarette Uygulanacak İlke ve Kurallar Hakkında Yönetmelik. (2016, 6 Ağustos). Resmi Gazete (Sayı: 29793). Erişim tarihi: 02.09.2021, https://www.resmigazete.gov.tr/eskiler/2016/08/20160806-4.html.
  • TDK. (2019). İşletme. Sozluk.gov.tr sözlüğü içinde. Erişim tarihi: 02.08.2021, https://sozluk.gov.tr/.
  • Tessian. (2020). Psychology of human error. Erişim tarihi: 29.10.2021, https://www.tessian.com/research/the-psychology-of-human-error/.
  • Thomas, D., & Loader, B. (2000). Cybercrime: Law enforcement, security and surveillance in the information age. D. Thomas, & B. Loader. (Ed.). Cybercrime: Law enforcement, security and surveillance in the information age içinde (ss. 1-13). Routledge.
  • Ürper, Y. (2018). İşletmeler ve özellikleri. Z. Erdoğan, & A. Hepkul (Ed.). Genel işletme içinde (ss. 2-33). Anadolu Üniversitesi Yayınevi.
  • Vaidya, R. (2019). Cyber security breaches survey 2019: Main report. Department for Digital, Culture, Media and Sport, 66. Erişim tarihi: 19.12.2021, https://www.gov.uk/government/statistics/cyber-security-breaches-survey-2019.
  • Veenstra, S., Zuurveen, R., & Stol, W. (2016). Cybercrime among companies: Research into cybercrime victimisation among small- and medium-sized enterprises and one-man businesses in the Netherlands. Eleven International Publishing.
  • Yıldız, A. (2019). İşletme alanında nicel araştırma yöntemleri ve yayın etiği. Gazi Kitabevi.
  • Wall, D. S. (2004). What are cybercrimes. The Centre for Crime and Justice Studies, 58(4). Erişim tarihi: 02.07.2021, https://www.crimeandjustice.org.uk/publications/cjm/article/what-are-cybercrimes.
  • Wall, D. S. (2007). Cybercrime: The transformation of crime in the information age. Polity.
  • Wang, V., Button, M., Finnerty, K., Motha, H., Shah, J. Y., & White, Y. F. (2018). Cyber security breaches survey 2018: Main report. Erişim tarihi: 18.12.2021, https://www.gov.uk/government/statistics/cyber-security-breaches-survey-2018.
  • Willis Towers Watson. (2017). 2017 siber risk anketi. Erişim tarihi: 14.10.2021, https://www.willistowerswatson.com/-/media/WTW/Insights/2017/06/WTW-Cyber-Risk-Survey-US-2017.pdf?modified=20170609193130.
  • Woelk, B. (2009b). Preventing cybercrime. Mcquade III, S.C. (Ed.). Encyclopedia of cybercrime içinde (ss. 144-150). Greenwood Press.
  • Yar, M. (2005). The novelty of cybercrime: An assessment in light of routine activity theory. European Journal of Criminology 2(4), 407–427.
There are 50 citations in total.

Details

Primary Language Turkish
Subjects Criminology
Journal Section Articles
Authors

Cem Eroğlu 0000-0001-8491-6398

Publication Date May 31, 2023
Submission Date March 13, 2023
Published in Issue Year 2023 Volume: 12 Issue: 1

Cite

APA Eroğlu, C. (2023). İşletmelerin Maruz Kaldığı Siber Suçların Boyutu. Güvenlik Bilimleri Dergisi, 12(1), 69-96. https://doi.org/10.28956/gbd.1264593

2434714728147311473929833


The open access articles in the journal are licensed under the terms of the Creative Commons Attribution-NonCommercial-NoDerivs 4.0 International (CC BY-NC-ND 4.0) license. 29846