Research Article
BibTex RIS Cite

E-GOVERNMENT AND CYBER TERRORISM: CONCEPTUAL FRAMEWORK, THEORETICAL DISCUSSIONS AND POSSIBLE SOLUTIONS

Year 2019, Volume: 6 Issue: 1, 213 - 247, 31.01.2019
https://doi.org/10.30626/tesamakademi.528011

Abstract

Technology generates a new kind of terrorism which is called as cyber terrorism. Cyber terrorism is not only a tool for propaganda of traditional terrorism, but also a logic embedded in the cyber space. Cyber terrorism needs more attention for the security of “e-government” in terms of not only at national level, but also at international level. So the main purpose of this article is to study the interaction between “e-government” and cyber terrorism in the context of Actor Network Theory which provides a model and general frame for participatory democracy. For this reason, it is firstly explained what “e-government actually is. Afterwards, cyber terrorism is defined by generating a new one. Methodologically speaking, descriptive analysis has been made in defining and understanding “e-government”, and a new definition for cyber terrorism has been generated by the method of induction. Finally, the interaction between “e-government” and cyber terrorism has been debated in the context of Actor Network Theory through the method of deduction in addition to the conclusions related to some prevention and advices. These measures and recommendations include the recruitment of qualified personnel, institutional capacity development, government support for brand antivirus software, cyber risk insurance, global cooperation and the creation of ethical codes.

References

  • Anti-Defamation League. (1998). Terrorist activities on the internet. Retrieved December 18, 2007, from http://www.adl.org/Terror/focus/16_focus_a.asp.
  • Bardini, T. (1997). Bridging the Gulfs: from hypertext to cyberspace. The Journal of Computer-Mediated Communication. Retrieved July 02, 2017, from http://onlinelibrary.wiley.com/doi/10.1111/j.1083-6101.1997.tb00069.x/full.
  • Başeren, S. (2006). Uluslararası şiddet ve terörizm ders notları (International violence and terrorism lesson notes). Ankara, Kara Harp Okulu, Savunma Bilimleri Enstitüsü.
  • BBC Türkçe Haber. (2014, 05 December).Yapay zeka insanlığın sonu olacak korkusu gerçekçimi? (Is it realistic that the fear of artificial intelligence will be the end of mankind?) Retrieved from (21 Ocak 2018): http://www.bbc.com/turkce/haberler/ 2014/12/141204_yapay_zeka_ insanligin_sonu.
  • Bertucci, G. (2003). E-government for development. Retrieved April 25, 2004, from http://usembassy.state.gov/Seoul/wwwh6033.html.
  • Blaikie, N. (1993). Approaches to social enquiry. Cambridge: Polity Press.
  • Brenner, S. (2007). At light speed: Attribution and response to cybercrime/terrorism/ warfare. Journal of Criminal Law and Criminology, 97(2):379-475. Retrieved July 02, 2017, from http://scholarlycommons.law.northwestern.edu/cgi/viewcontent.cgi?article= 7260&context=jclc.
  • Callon, M. (1983). Society in the making: The study of technology as a tool for social analysis. Retrieved July 19, 2017, from http://www.umsl.edu/~rkeel/280/class/callon.html.
  • Castells, M. (1998). The rise of the network society. Oxford: Blackwell Publishers Inc.
  • Centre of Excellence Defence Against Terrorism. (2006). Brochure on the countering cyber terrorism course. Ankara, Centre of Excelllence Defence Against Terrorism.
  • Ceylan, C. (2010). Siber savaşta yeni cephe: Iran-Buşehr nükleer santrali ve SCADA-PLC sistemler (New front in cyber war: Iran-Bushehr nuclear power plant and SCADA-PLC systems). Retrieved September 25, 2017, from http://www.bilgiguvenligi.gov.tr/siber-savunma/siber-savasta-yeni-cephe-iran-busehr-nukleer-santrali-ve-scada-plc-sistemler.html.
  • Coffman, J. L. (2006). Terrorism around us. Retrieved December 02, 2006, from http://www.usadojo.com/articles/terrorism-around-us.html.
  • Commission of the European Communities, (2002). eEurope 2005: An information society for all. Retrieved April 18 , 2004, from http://europa.eu.int/information_society/eeurope/2002/ news_library/documents/eeurope2005/eeurope2005_en.pdf.
  • Couldry, N. (2008). Actor network theory and media: Do they connect and on what terms? London School of Economics and Political Science. Retrieved August 01, 2017, fromhttp://eprints.lse.ac.uk/52481/1/__Libfile_repository_Content_Couldry%2C%20N_Couldry_Actor_network_theory_2008_Couldry_Actor_network_theory_2008.pdf.
  • Crenshaw, M. (1981). The causes of terrorism. Retrieved August 01, 2017, fromhttp://courses.kvasaheim.com/hist319a/docs/Crenshaw%201981.PDF.
  • Dura, C. and Atik, H. (2002). Bilgi toplumu, bilgi ekonomisi ve Türkiye (Information society, information economy and Turkey). İstanbul: Literatür Yayınları.
  • Elmusharaf, M. M. (2004). Cyber terrorism: The new kind of terrorism. Retrieved July 14, 2017, from http://www.crime-research.org/articles/Cyber_Terrorism_new_kind_Terrorism.
  • Frohmann, B. (1995). Taking information policy beyond information science: Applying the actor network theory. Retrieved July 15, 2017, from http://citeseerx.ist.psu.edu/ viewdoc/download?doi=10.1.1.517.5320&rep=rep1&type=pdf.
  • Garrety, K. (2014). Actor network theory. Retrieved August 02, 2017, from http://ro.uow.edu.au/cgi/viewcontent.cgi?article=1406&context=buspapers.
  • Goguen, J. (1998). Actor-network theory. Retrieved July 16, 2017, from http://www-cse.ucsd.edu/users/goguen/courses/268D/5.htm.
  • Graham, L. (2017). Cybercrime costs the global economy $450 billion: CEO. Retrieved September 25, 2017, from https://www.cnbc.com/2017/02/07/cybercrime-costs-the-global-economy-450-billion-ceo. html adresinden erişildi.
  • Hanseth, O. and Monteiro, E. (1998). Understanding information structure. Retrieved July 19, 2017, from http://heim.ifi.uio.no/~oleha/Publications/bok.pdf.
  • ITU. (2003a). Plan of action. Retrieved April 04, 2004, from http://www.itu.int/dms_pub/itu-s/md/03/wsis/doc/S03-WSIS-DOC-0005!!MSW-E.doc.
  • ITU. (2003b). Declaration of principles. Retrieved April 04, 2004, from http://www.itu.int/dms_pub/itu-s/md/03/wsis/doc/S03-WSIS-DOC-0004!!MSW-E.doc.
  • İnce, N. M. (2001). Elektronik devlet (Electronic government). Retrieved July 19, 2017, from http://www.bilgitoplumu.gov.tr/wp-content/uploads/2014/04/Murat_ Ince_E-Devlet.pdf.
  • Koyun, M. (2003). Etkinlik ve etkin devlet anlayışı çerçevesinde e-devlet (E-government in the framework of efficiency and effective government). Unpublished master’s thesis, Selçuk Üniversitesi. Ankara: YÖK Tez Merkezi.
  • Lemke, J. (2001). Activity theory and actant-network theory. Retrieved July 20, 2017, from http://academic.brooklyn.cuny.edu/education/jlemke/theories.htm#AT.
  • Miettinen, R. (1997). The concept of activity in the analysis of hetereogenuous networks in innovation process. Retrieved June 14, 2017, from http://communication.ucsd.edu/ MCA/Paper/Reijo/Reijo.html#Introduction.
  • OECD. (2003). The e-government imperative. Retrieved July 16, 2017, from http://www.oecd-ilibrary.org/governance/the-e-government- imperative_9789264101197-en.
  • Özcivelek, R. (2003). Dünyada ve Türkiye’de elektronik devlet tartışmaları: Kavram üzerine bir sorgulama (Electronic government debates in the world and Turkey: a question on concept). Retrieved July 20, 2017, from https://documents.tips/download/link/duenyada-ve-tuerkiyede-e-devlet.
  • Posta Gazetesi. (2018, 13 October). Mor Beyin nedir? Nasıl Bylock tuzağına düştüler? (What is the Purple Brain? How did they fall to the Bylock trap?). Retrieved February 20, 2018, from http://www.posta.com.tr/mor-beyin-nedir-nasil-bylock-tuzagina-dustuler-haberi-1366539.
  • Rhodes, R. A. W. (2000). Governance and public administration. In: Edited by Jon, P. (ed.) Debating Governance: Authority, Steering, and Democracy. Oxford: University of Oxford Press.
  • Risan, C. L. (1997). Artificial life: A technoscience leaving modernity? Retrieved July 25, 2017, from http://www.anthrobase.com/Txt/R/Risan_L_05.htm.
  • Rousseau, J. J. (1762/1989) Toplum anlaşması (The social contract). Trans. Vedat G. İstanbul: Milli Eğitim Basımevi.
  • Scheideler, C. (2004). Network theory. Retrieved July 23, 2017, from http://www.cs.jhu.edu/ ~scheideler/courses/600.348_F04/lecture_2.pdf.
  • Şenel, H. (2003). İnternetin altyapısı (Infrastructure of internet). In: Cengiz H A, Yaşar H, Ali E Ö (eds) Temel Bilgi Teknolojileri (Basic Information Technologies). Eskişehir: Anadolu Üniversitesi, p. 241-261.
  • Tatnall, A. (2005). Actor-network theory and information system Research. Retrieved June 24, 2017, from http://www.irma-international.org/viewtitle/14208/.
  • Terzi, M. (2018). Bilgi ve iletişim teknolojilerine dayalı oluşumlar ile bu oluşumların uluslararası ilişkilere güvenlik bağlamındaki etkisi: Siber terörizm 2016-2019 ulusal siber güvenlik strateji belgesi kapsamında Türkiye incelemesi (The formations based on information and communication technologies and the effects of these formations on the international relations in the context of security: Cyber terrorism the case of turkey in the scope of 2016-2019 national strategy document for cyber security). Kara Harp Okulu Bilim Dergisi, 28(1):73-108.
  • Terzi, M. (2006). Information-based economy and e-government: Transformation in the public administration (Unpublished master thesis). METU, Ankara.
  • Trend Micro House Call (2014) Glossary. Retrieved October 04, 2017, from http://about-threats.trendmicro.com/us/glossary/all.
  • Türkiye Bilişim Şurası. (2002). e- devlet raporu (e-government report) (2002). Ankara: Türkiye Bilişim Vakfı.
  • United Nations. (2000). United Nations millennium declaration. Retrieved October 02, 2017, from http://www.un.org/millennium/declaration/ares552e.htm.
  • United Nations (2002) Report of the international conference on financing for development. Retrieved October 02, 2017, http://www.ipu.org/splz-e/ffd08/monterrey.pdf.
  • University of Colorado. (2003). What is actor-network theory? Retrieved March 02, 2005, from http://carbon.cudenver.edu/~mryder/itc_data/ant_dff.html.
  • Uysal, A. (2016). Ulusal yargı ağı projesi-1. Eskişehir: Anadolu Üniversitesi.
  • Üstüner, Y. (2003). Siyasa oluşturma sürecinde ağ yönetişim kuramı (Network governance theory in the policy making process). Ankara: TODAİE.
  • Van House, N, (2001), Actor-network theory, knowledge work, and digital Libraries. Retrieved September, 24, 2017, from http://www.sims.berkeley.edu/~vanhouse/bridge.html.
  • Vera-Zavala, A. (2006). Deltagande demokrati. Trans. Naile A. Ankara: Dipnot Yayınları.
  • Weber, M. (1973). Bureaucracy. In the Lesson Notes of Public Administration Theories. 2005. Ankara: METU.
  • Wikipedia Free Encyclopedia. (2009a). Japanese embassy hostage crisis. Retrieved July 03, 2009, fromhttps://en.wikipedia.org/wiki/Japanese_embassy_hostage_crisis.
  • Wikipedia Free Encyclopedia (2009b) Zapatista army of national liberation. Retrieved July 03, 2009, from https://en.wikipedia.org/wiki/Zapatista_Army_of_National_Liberation.
  • Wilson, C. (2007). Botnets, cybercrime, and cyberterrorism: Vulnerabilities and policy issues for congress. Retrieved September 14, 2017, from http://www.fas.org/sgp/crs/terror/ RL32114.pdf.
  • Yücetürk, E. E. (2004). Türk kamu yönetiminde e-devlet uygulamaları ve tabana yayılabilme yeteneği bakımından bir değerlendirme: Bolu örneği (An evaluation in terms of e-government applications and the ability to spread in the Turkish public administration: The case of Bolu). Retrieved April 08, 2004, from http://www.bilgiyonetimi.org/cm/pages/mk1gos.php?nt=225.

E-Devlet ve Siber Terörizm: Kavramsal Çerçeve, Teorik Tartışmalar ve Olası Çözümler

Year 2019, Volume: 6 Issue: 1, 213 - 247, 31.01.2019
https://doi.org/10.30626/tesamakademi.528011

Abstract

Teknoloji, siber terörizm olarak nitelenen yeni bir tür terörizm ortaya çıkarıyor. Geleneksel manada terörizm için sadece bir propaganda aracı değil, ama aynı zamanda siber alana gömülü bir mantığı ifade eden siber terörizm, hem ulusal hem de uluslararası düzeyde, e-devletin güvenliği için daha fazla dikkat gerektiriyor. Bu nedenle, bu çalışmanın amacı, katılımcı demokrasi için bir model ve genel çerçeve sunan Aktör Ağ kuramı çerçevesinde, e-devlet ve siber terörizm arasındaki ilişkiyi incelemektir. Bu amaçla öncelikle e-devletin ne olduğu açıklanmış, ardından yeni bir tanım üretilerek siber terörizm tanımlanmıştır. Metodolojik açıdan konuşmak gerekirse, e-devleti tanımlamada ve anlamada betimsel bir analiz yapılmış olup, siber terörizm açısından da ilgili değişkenler dikkate alındığında tümevarım yöntemiyle yeni bir siber terörizm tanımı üretilmiştir. Son olarak Aktör Ağ Kuramı bağlamında, e-devlet ve siber terörizm arasındaki etkileşim, tümdengelim aracılığıyla tartışılmış ve nihayet bazı tespit, önlem ve tavsiyelere ilişkin düşüncelere yer verilmiştir. Bu önlem ve tavsiyeler; uzman personel istihdamı, kurumsal kapasitenin geliştirilmesi, marka antivirüs yazılımları için devlet desteği, siber risk sigortası, küresel işbirliği ve etik kodların oluşturulmasını içermektedir.

References

  • Anti-Defamation League. (1998). Terrorist activities on the internet. Retrieved December 18, 2007, from http://www.adl.org/Terror/focus/16_focus_a.asp.
  • Bardini, T. (1997). Bridging the Gulfs: from hypertext to cyberspace. The Journal of Computer-Mediated Communication. Retrieved July 02, 2017, from http://onlinelibrary.wiley.com/doi/10.1111/j.1083-6101.1997.tb00069.x/full.
  • Başeren, S. (2006). Uluslararası şiddet ve terörizm ders notları (International violence and terrorism lesson notes). Ankara, Kara Harp Okulu, Savunma Bilimleri Enstitüsü.
  • BBC Türkçe Haber. (2014, 05 December).Yapay zeka insanlığın sonu olacak korkusu gerçekçimi? (Is it realistic that the fear of artificial intelligence will be the end of mankind?) Retrieved from (21 Ocak 2018): http://www.bbc.com/turkce/haberler/ 2014/12/141204_yapay_zeka_ insanligin_sonu.
  • Bertucci, G. (2003). E-government for development. Retrieved April 25, 2004, from http://usembassy.state.gov/Seoul/wwwh6033.html.
  • Blaikie, N. (1993). Approaches to social enquiry. Cambridge: Polity Press.
  • Brenner, S. (2007). At light speed: Attribution and response to cybercrime/terrorism/ warfare. Journal of Criminal Law and Criminology, 97(2):379-475. Retrieved July 02, 2017, from http://scholarlycommons.law.northwestern.edu/cgi/viewcontent.cgi?article= 7260&context=jclc.
  • Callon, M. (1983). Society in the making: The study of technology as a tool for social analysis. Retrieved July 19, 2017, from http://www.umsl.edu/~rkeel/280/class/callon.html.
  • Castells, M. (1998). The rise of the network society. Oxford: Blackwell Publishers Inc.
  • Centre of Excellence Defence Against Terrorism. (2006). Brochure on the countering cyber terrorism course. Ankara, Centre of Excelllence Defence Against Terrorism.
  • Ceylan, C. (2010). Siber savaşta yeni cephe: Iran-Buşehr nükleer santrali ve SCADA-PLC sistemler (New front in cyber war: Iran-Bushehr nuclear power plant and SCADA-PLC systems). Retrieved September 25, 2017, from http://www.bilgiguvenligi.gov.tr/siber-savunma/siber-savasta-yeni-cephe-iran-busehr-nukleer-santrali-ve-scada-plc-sistemler.html.
  • Coffman, J. L. (2006). Terrorism around us. Retrieved December 02, 2006, from http://www.usadojo.com/articles/terrorism-around-us.html.
  • Commission of the European Communities, (2002). eEurope 2005: An information society for all. Retrieved April 18 , 2004, from http://europa.eu.int/information_society/eeurope/2002/ news_library/documents/eeurope2005/eeurope2005_en.pdf.
  • Couldry, N. (2008). Actor network theory and media: Do they connect and on what terms? London School of Economics and Political Science. Retrieved August 01, 2017, fromhttp://eprints.lse.ac.uk/52481/1/__Libfile_repository_Content_Couldry%2C%20N_Couldry_Actor_network_theory_2008_Couldry_Actor_network_theory_2008.pdf.
  • Crenshaw, M. (1981). The causes of terrorism. Retrieved August 01, 2017, fromhttp://courses.kvasaheim.com/hist319a/docs/Crenshaw%201981.PDF.
  • Dura, C. and Atik, H. (2002). Bilgi toplumu, bilgi ekonomisi ve Türkiye (Information society, information economy and Turkey). İstanbul: Literatür Yayınları.
  • Elmusharaf, M. M. (2004). Cyber terrorism: The new kind of terrorism. Retrieved July 14, 2017, from http://www.crime-research.org/articles/Cyber_Terrorism_new_kind_Terrorism.
  • Frohmann, B. (1995). Taking information policy beyond information science: Applying the actor network theory. Retrieved July 15, 2017, from http://citeseerx.ist.psu.edu/ viewdoc/download?doi=10.1.1.517.5320&rep=rep1&type=pdf.
  • Garrety, K. (2014). Actor network theory. Retrieved August 02, 2017, from http://ro.uow.edu.au/cgi/viewcontent.cgi?article=1406&context=buspapers.
  • Goguen, J. (1998). Actor-network theory. Retrieved July 16, 2017, from http://www-cse.ucsd.edu/users/goguen/courses/268D/5.htm.
  • Graham, L. (2017). Cybercrime costs the global economy $450 billion: CEO. Retrieved September 25, 2017, from https://www.cnbc.com/2017/02/07/cybercrime-costs-the-global-economy-450-billion-ceo. html adresinden erişildi.
  • Hanseth, O. and Monteiro, E. (1998). Understanding information structure. Retrieved July 19, 2017, from http://heim.ifi.uio.no/~oleha/Publications/bok.pdf.
  • ITU. (2003a). Plan of action. Retrieved April 04, 2004, from http://www.itu.int/dms_pub/itu-s/md/03/wsis/doc/S03-WSIS-DOC-0005!!MSW-E.doc.
  • ITU. (2003b). Declaration of principles. Retrieved April 04, 2004, from http://www.itu.int/dms_pub/itu-s/md/03/wsis/doc/S03-WSIS-DOC-0004!!MSW-E.doc.
  • İnce, N. M. (2001). Elektronik devlet (Electronic government). Retrieved July 19, 2017, from http://www.bilgitoplumu.gov.tr/wp-content/uploads/2014/04/Murat_ Ince_E-Devlet.pdf.
  • Koyun, M. (2003). Etkinlik ve etkin devlet anlayışı çerçevesinde e-devlet (E-government in the framework of efficiency and effective government). Unpublished master’s thesis, Selçuk Üniversitesi. Ankara: YÖK Tez Merkezi.
  • Lemke, J. (2001). Activity theory and actant-network theory. Retrieved July 20, 2017, from http://academic.brooklyn.cuny.edu/education/jlemke/theories.htm#AT.
  • Miettinen, R. (1997). The concept of activity in the analysis of hetereogenuous networks in innovation process. Retrieved June 14, 2017, from http://communication.ucsd.edu/ MCA/Paper/Reijo/Reijo.html#Introduction.
  • OECD. (2003). The e-government imperative. Retrieved July 16, 2017, from http://www.oecd-ilibrary.org/governance/the-e-government- imperative_9789264101197-en.
  • Özcivelek, R. (2003). Dünyada ve Türkiye’de elektronik devlet tartışmaları: Kavram üzerine bir sorgulama (Electronic government debates in the world and Turkey: a question on concept). Retrieved July 20, 2017, from https://documents.tips/download/link/duenyada-ve-tuerkiyede-e-devlet.
  • Posta Gazetesi. (2018, 13 October). Mor Beyin nedir? Nasıl Bylock tuzağına düştüler? (What is the Purple Brain? How did they fall to the Bylock trap?). Retrieved February 20, 2018, from http://www.posta.com.tr/mor-beyin-nedir-nasil-bylock-tuzagina-dustuler-haberi-1366539.
  • Rhodes, R. A. W. (2000). Governance and public administration. In: Edited by Jon, P. (ed.) Debating Governance: Authority, Steering, and Democracy. Oxford: University of Oxford Press.
  • Risan, C. L. (1997). Artificial life: A technoscience leaving modernity? Retrieved July 25, 2017, from http://www.anthrobase.com/Txt/R/Risan_L_05.htm.
  • Rousseau, J. J. (1762/1989) Toplum anlaşması (The social contract). Trans. Vedat G. İstanbul: Milli Eğitim Basımevi.
  • Scheideler, C. (2004). Network theory. Retrieved July 23, 2017, from http://www.cs.jhu.edu/ ~scheideler/courses/600.348_F04/lecture_2.pdf.
  • Şenel, H. (2003). İnternetin altyapısı (Infrastructure of internet). In: Cengiz H A, Yaşar H, Ali E Ö (eds) Temel Bilgi Teknolojileri (Basic Information Technologies). Eskişehir: Anadolu Üniversitesi, p. 241-261.
  • Tatnall, A. (2005). Actor-network theory and information system Research. Retrieved June 24, 2017, from http://www.irma-international.org/viewtitle/14208/.
  • Terzi, M. (2018). Bilgi ve iletişim teknolojilerine dayalı oluşumlar ile bu oluşumların uluslararası ilişkilere güvenlik bağlamındaki etkisi: Siber terörizm 2016-2019 ulusal siber güvenlik strateji belgesi kapsamında Türkiye incelemesi (The formations based on information and communication technologies and the effects of these formations on the international relations in the context of security: Cyber terrorism the case of turkey in the scope of 2016-2019 national strategy document for cyber security). Kara Harp Okulu Bilim Dergisi, 28(1):73-108.
  • Terzi, M. (2006). Information-based economy and e-government: Transformation in the public administration (Unpublished master thesis). METU, Ankara.
  • Trend Micro House Call (2014) Glossary. Retrieved October 04, 2017, from http://about-threats.trendmicro.com/us/glossary/all.
  • Türkiye Bilişim Şurası. (2002). e- devlet raporu (e-government report) (2002). Ankara: Türkiye Bilişim Vakfı.
  • United Nations. (2000). United Nations millennium declaration. Retrieved October 02, 2017, from http://www.un.org/millennium/declaration/ares552e.htm.
  • United Nations (2002) Report of the international conference on financing for development. Retrieved October 02, 2017, http://www.ipu.org/splz-e/ffd08/monterrey.pdf.
  • University of Colorado. (2003). What is actor-network theory? Retrieved March 02, 2005, from http://carbon.cudenver.edu/~mryder/itc_data/ant_dff.html.
  • Uysal, A. (2016). Ulusal yargı ağı projesi-1. Eskişehir: Anadolu Üniversitesi.
  • Üstüner, Y. (2003). Siyasa oluşturma sürecinde ağ yönetişim kuramı (Network governance theory in the policy making process). Ankara: TODAİE.
  • Van House, N, (2001), Actor-network theory, knowledge work, and digital Libraries. Retrieved September, 24, 2017, from http://www.sims.berkeley.edu/~vanhouse/bridge.html.
  • Vera-Zavala, A. (2006). Deltagande demokrati. Trans. Naile A. Ankara: Dipnot Yayınları.
  • Weber, M. (1973). Bureaucracy. In the Lesson Notes of Public Administration Theories. 2005. Ankara: METU.
  • Wikipedia Free Encyclopedia. (2009a). Japanese embassy hostage crisis. Retrieved July 03, 2009, fromhttps://en.wikipedia.org/wiki/Japanese_embassy_hostage_crisis.
  • Wikipedia Free Encyclopedia (2009b) Zapatista army of national liberation. Retrieved July 03, 2009, from https://en.wikipedia.org/wiki/Zapatista_Army_of_National_Liberation.
  • Wilson, C. (2007). Botnets, cybercrime, and cyberterrorism: Vulnerabilities and policy issues for congress. Retrieved September 14, 2017, from http://www.fas.org/sgp/crs/terror/ RL32114.pdf.
  • Yücetürk, E. E. (2004). Türk kamu yönetiminde e-devlet uygulamaları ve tabana yayılabilme yeteneği bakımından bir değerlendirme: Bolu örneği (An evaluation in terms of e-government applications and the ability to spread in the Turkish public administration: The case of Bolu). Retrieved April 08, 2004, from http://www.bilgiyonetimi.org/cm/pages/mk1gos.php?nt=225.
There are 53 citations in total.

Details

Primary Language English
Journal Section Articles
Authors

Mahir Terzi

Publication Date January 31, 2019
Published in Issue Year 2019 Volume: 6 Issue: 1

Cite

APA Terzi, M. (2019). E-GOVERNMENT AND CYBER TERRORISM: CONCEPTUAL FRAMEWORK, THEORETICAL DISCUSSIONS AND POSSIBLE SOLUTIONS. TESAM Akademi Dergisi, 6(1), 213-247. https://doi.org/10.30626/tesamakademi.528011
AMA Terzi M. E-GOVERNMENT AND CYBER TERRORISM: CONCEPTUAL FRAMEWORK, THEORETICAL DISCUSSIONS AND POSSIBLE SOLUTIONS. TESAM Akademi Dergisi. January 2019;6(1):213-247. doi:10.30626/tesamakademi.528011
Chicago Terzi, Mahir. “E-GOVERNMENT AND CYBER TERRORISM: CONCEPTUAL FRAMEWORK, THEORETICAL DISCUSSIONS AND POSSIBLE SOLUTIONS”. TESAM Akademi Dergisi 6, no. 1 (January 2019): 213-47. https://doi.org/10.30626/tesamakademi.528011.
EndNote Terzi M (January 1, 2019) E-GOVERNMENT AND CYBER TERRORISM: CONCEPTUAL FRAMEWORK, THEORETICAL DISCUSSIONS AND POSSIBLE SOLUTIONS. TESAM Akademi Dergisi 6 1 213–247.
IEEE M. Terzi, “E-GOVERNMENT AND CYBER TERRORISM: CONCEPTUAL FRAMEWORK, THEORETICAL DISCUSSIONS AND POSSIBLE SOLUTIONS”, TESAM Akademi Dergisi, vol. 6, no. 1, pp. 213–247, 2019, doi: 10.30626/tesamakademi.528011.
ISNAD Terzi, Mahir. “E-GOVERNMENT AND CYBER TERRORISM: CONCEPTUAL FRAMEWORK, THEORETICAL DISCUSSIONS AND POSSIBLE SOLUTIONS”. TESAM Akademi Dergisi 6/1 (January 2019), 213-247. https://doi.org/10.30626/tesamakademi.528011.
JAMA Terzi M. E-GOVERNMENT AND CYBER TERRORISM: CONCEPTUAL FRAMEWORK, THEORETICAL DISCUSSIONS AND POSSIBLE SOLUTIONS. TESAM Akademi Dergisi. 2019;6:213–247.
MLA Terzi, Mahir. “E-GOVERNMENT AND CYBER TERRORISM: CONCEPTUAL FRAMEWORK, THEORETICAL DISCUSSIONS AND POSSIBLE SOLUTIONS”. TESAM Akademi Dergisi, vol. 6, no. 1, 2019, pp. 213-47, doi:10.30626/tesamakademi.528011.
Vancouver Terzi M. E-GOVERNMENT AND CYBER TERRORISM: CONCEPTUAL FRAMEWORK, THEORETICAL DISCUSSIONS AND POSSIBLE SOLUTIONS. TESAM Akademi Dergisi. 2019;6(1):213-47.