Araştırma Makalesi
BibTex RIS Kaynak Göster

Yıl 2025, Cilt: 13 Sayı: 3, 1988 - 2023, 30.12.2025
https://doi.org/10.18506/anemon.1776172

Öz

Kaynakça

  • Acarer, T. (2020). Macro cybersecurity measures that can be taken for our national security. UBGMD, 6(2), 61–71. https://doi.org/10.18640/ubgmd.796168
  • Ağdeniz, Ş. (2021). A study on the role and competencies of public internal auditors in information and communication security auditing. Alanya Academik Review, 5(2), 525-545. https://doi.org/10.29023/alanyaakademik.869215
  • Akçakanat, Ö., Özdemir, O., & Mazak, M. (2021). Cybersecurity risks and information technology auditing in businesses: an examination of banks' cybersecurity practices. Mehmet Akif Ersoy University Journal of Applied Sciences, 5(2), 246-270. https://doi.org/10.31200/makuubd.978263
  • Altınbaşak, İ., & Karaca, E. S. (2009). İnternet advertising and an application on the assessment of internet advertising. Ege Academic Review, 9(2), 463-487.
  • Aydın, M. D. (2005). eEurope+ and Turkey: compliance with European Union criteria in the field of information technology. Hacettepe University Journal of Economics and Administrative Sciences, 23(1), 287-311.
  • Baylis, J., & Smith, S. (2017). The globalization of world politics: An introduction to international relations (7th ed.). Oxford University Press.
  • Bıçakçı, S. (2014). NATO’s emerging threat perception: cyber security in the 21st century. International Relations, 10(40), 100-130.
  • Bıçakçı, S., Ergun, F. D. & Çelikpala, M. (2015). The cyber security scene in Turkey. The Centre for Economics and Foreign Policy Studies. https://edam.org.tr/wp-content/uploads/2016/03/edam_cyber_security_report.pdf
  • Biçkin, R. (2024). An examination of the concept of security in Turkey's five-year development plans [Master's thesis, Topkapı University Graduate School of Education].
  • Bilir, F. (2023). The emergence of applications and legal regulations for the protection of personal data. Justice Journal (71), 631-651. https://doi.org/10.57083/adaletdergisi.1391733
  • Booth, K. (2007). Theory of world security. Cambridge University Press. Bowen, G. A. (2009). Document analysis as a qualitative research method. Qualitative Research Journal, 9(2), 27–40. https://doi.org/10.3316/QRJ0902027
  • Buzan, B., Wæver, O., & de Wilde, J. (1998). Security: A new framework for analysis. Lynne Rienner Publishers. Cole, E. (2018). Cybersecurity for beginners: Ethical hacking and defense strategies. CyberTech Press.
  • Çakır, H., & Taşer, M. (2023). Evaluation of cybersecurity activities and training programs in Turkey. Gazi University Journal of Science Part C: Design and Technology, 11(2), 347-366. https://doi.org/10.29109/gujsc.1165131
  • Çeliktaş, B. (2016). The development of the concept of cybersecurity and an assessment specific to Turkey [Master's thesis, Karadeniz Technical University].
  • Çetinkaya, N. (2017). The effects of e-government services on education and social life in Turkey. International Journal of Social Sciences Academic Research, 1(1), 12-21.
  • Darıcılı, A. B. (2019). Analysis of Turkey's cybersecurity policies; recommendations for Turkey's cybersecurity model. TESAM Academy Journal, 6(2), 11-33. https://doi.org/10.30626/tesamakademi.613517
  • Gündoğdu, S. (2023). Cyber security as an influence tool in international politics and the implementation of Turkey's cyber security policy: National Cyber İncident Response Center (USOM). Firat University Journal of Social Sciences, 33(3), 1325-1337. https://doi.org/10.18069/firatsbed.1261707
  • Güneş, A. (2019). Global powers' national cybersecurity strategies: The case of the United States. Cyberpolitik Journal, 4(8), 242–258.
  • Güntay, V. (2018). The transformation of cybersecurity into an instrument of influence in international politics and international actors. Journal of Security Strategies, 14(27), 79-111. https://doi.org/10.17752/guvenlikstrtj.432151.
  • Karasoy, H. A., & Babaoğlu, P. (2021). Cyber security in Turkey: legal and institutional infrastructure. Legislative Journal (44), 123-155.
  • Karasoy, H., & Gezici, H. S. (2023). From bombs to bytes: the role of cybersecurity in national security and the importance of artificial intelligence in cybersecurity. International Journal of Management Academy, 6(1), 173-188. https://doi.org/10.33712/mana.1254015
  • Kestane, A., & Kurt, G. (2024). Cloud security audit: Internal audit in cloud cybersecurity applications. Journal of the Faculty of Economics and Administrative Sciences, Ömer Halisdemir University, 17(3), 667-690. https://doi.org/10.25287/ohuiibf.1482734
  • Kestane, Ö. (2025). Cyber attacks and the need for cybersecurity audits. İzmir SMMM Solidarity Journal, 8(1), 41–49.
  • Kılınç, D. (2016). Protection of privacy under article 9/a of law no. 5651 on the regulation of publications made on the internet and the fight against crimes committed through these publications. Ankara Hacı Bayram Veli University Law Faculty Journal, 20(2), 577-624.
  • Kshetri, N. (2016). Cybersecurity and cybercrime in the global context. Routledge.
  • Kurnaz, S., & Karatepe, S. (2019). Cyber security of airports in Turkey within the scope of critical infrastructure security. ASAM International Public Administration Symposium Proceedings, 1–12.
  • Kutlu, Ö., Sevinç, Y., & Kahraman, S. (2018). Analysis of security risks in e-government applications in Turkey. Turkish Studies, 13(21), 129–156.
  • Naralan, A. (2010). e-preparation and e-government in Turkey. Atatürk University Journal of Economics and Administrative Sciences, 23(1), 1-17.
  • Ottis, R. (2008). Analysis of the 2007 cyber attacks against Estonia from the information warfare perspective. Cooperative Cyber Defence Centre of Excellence Report, 1–30. https://ccdcoe.org/uploads/2018/10/Ottis2008_AnalysisOf2007FromTheInformationWarfarePerspective.pdf
  • Önal, M. A. (2021). Dimensions of cybersecurity in the context of cyberspace and security relations. Hitit Journal of Economics and Politics, 1(2), 114–123.
  • Özdemirci, F., & Torunlar, M. (2018). Information-Exchange-Cybersecurity-Independence. Information Management, 1(1), 78-83.
  • Öztürk, K. B. (2009). The legal nature of authorization in electronic communications services. Ankara Bar Association Journal (1), 26-42.
  • Reagan, J. (2001). The Love Bug virus and global email vulnerabilities. Cybersecurity Review, 4(1), 38–45.
  • Sağıroğlu, Ş., & Alkan, M. (2018). Cybersecurity and defense: awareness and deterrence. Grafiker Publishing.
  • Sancakdar, A. (2021). Floridi's philosophy of information and big data [Master's thesis, Istanbul University].
  • Shakarian, P. (2011). Georgia’s cyber security vulnerabilities. Military Cyber Affairs, 2(1), 1–15. Solmaz, S. B. (2011). Milestones in cybersecurity history: The evolution of threats and defense strategies. Middle East and Asia-Caucasus Research Journal, 3(1), 1–9.
  • Tanrıverdi, E., Kurada, B., Şen, M. F., Demirkol Kılıç, E. (2023). The concept of critical ınfrastructure in the context of disaster management in Turkey. Ankara University Journal of Environmental Sciences, 10(1), 1-8.
  • Tunca, S. (2019). The concept of cyber security in the modern age. Dumlupınar University Journal of Economics and Administrative Sciences (3-4), 1-7.
  • Uluç, C., & Eyüpoğlu, C. (2024). The capture the flag competition approach for training qualified workforce in the field of cyber security. Istanbul Commerce University Journal of Science, 23(46), 292-318. https://doi.org/10.55071/ticaretfbd.1529412
  • Ünsal, H. (Ed.). (2002). Turkey Information Technology Council e-government working group. Turkey Information Technology Council. https://eski.tbd.org.tr/usr_img/cd/kamubib12/diger/digercalismalar.htm
  • Ünver, M., Canbay, C., & Mirzaoğlu, A. G. (2011). Cybersecurity activities of international organizations. Information Technologies and Communications Authority Publishing. https://bgys.iku.edu.tr/sites/bgys/files/inline-files/Uluslararası%20Kuruluşların%20Siber%20Güvenlik%20Faaliyetleri.pdf
  • Ünver, N. G. (2023). A comparative analysis of cybersecurity policies: the case of Turkey and the United Kingdom. Livre De Lyon Publications.
  • Walt, S. M. (1991). The renaissance of security studies. International Studies Quarterly, 35(2), 211–239.
  • Wiggins, R. (2010). Al Gore and the creation of the internet. Journal of Peer Reviewed Journal on the Internet, 1(1), 1–17.
  • Yıldırım, A. (2024). Analysis of Turkey's cybersecurity policy through its action plans. Journal of Organization and Management Sciences, 16(1), 23–47.
  • Yıldırım, E. (2024). Cyber security strategies and critical infrastructures in Turkey. Journal of Security and Strategy, 9(1), 25–42.
  • Yılmaz, Ö. (2021). The history of Web 1.0, 2.0, 3.0, and 4.0. Maltepe University Faculty of Communication Journal, 8(2), 344–350.
  • Zetter, K. (2014). Countdown to zero day: Stuxnet and the launch of the world’s first digital weapon. Crown Publishing.

Uluslararası Güvenlik Çalışmaları Bağlamında Siber Güvenliğin Tarihsel Gelişimi Üzerine Bir İnceleme: Türkiye Örneği

Yıl 2025, Cilt: 13 Sayı: 3, 1988 - 2023, 30.12.2025
https://doi.org/10.18506/anemon.1776172

Öz

Günümüz dünyasında teknolojik gelişmeler her geçen gün daha büyük boyutlara ulaşmakta ve bu gelişim hayatı kolaylaştırma anlamında birçok avantajı beraberinde getirdiği gibi yeni yeni sorunlara da sebebiyet vermektedir. Özellikle bilişim teknolojilerinde kat edilen ilerleme, başta bilgi ve belgelerin korunması olmak üzere yaşamın her alanını etkilemektedir. Bu süreçte dijital alanda çok ciddi güvenlik sorunları ortaya çıkmakta ve bunlara karşı gerekli önlemlerin alınmasını zorunlu kılmaktadır. Bunlara karşı alınan önlemler içerisinde siber güvenlik en başta gelmektedir. Zira bu süreç sadece belirli bir bölgeyi değil bütün dünyanın güvenliğini tehlikeye atmaktadır. Tüm bu sebepler göz önünde bulundurulduğunda siber güvenlik, gelişmiş ve gelişmekte olan ülkelerin genelinin gündeminde yer almakta olup dijital dünyanın güvenliğini sağlamada vazgeçilmez bir hal almıştır. Siber Güvenlik kavramının bu denli önem arz etmesi alana yönelik birçok akademik çalışmanın da yapılmasının önünü açmıştır. “Uluslararası Güvenlik Çalışmaları Bağlamında Siber Güvenliğin Tarihsel Gelişimi Üzerine Bir İnceleme: Türkiye Örneği” adlı makale de yazına katkı sağlamak maksadıyla hazırlanmıştır. Bu çalışmanın hazırlanmasındaki amaç 1990’lı yıllardan beri insanların hayatında ciddi bir biçimde yer tutan siber güvenliğin nasıl bir gelişme göstermiş olduğunu ortaya çıkarmaktır. Bu amaç doğrultusunda siber güvenliğin hem dünya genelinde hem de Türkiye’de hangi aşamalardan geçerek bugüne geldiğinin ortaya çıkarılması hedeflenmektedir. Literatür taraması yapılarak çok sayıda bilimsel eserden istifade edilerek hazırlanan bu makalede doküman analiz tekniği ile karşılaştırmalı analiz yöntemi kullanılmıştır.

Kaynakça

  • Acarer, T. (2020). Macro cybersecurity measures that can be taken for our national security. UBGMD, 6(2), 61–71. https://doi.org/10.18640/ubgmd.796168
  • Ağdeniz, Ş. (2021). A study on the role and competencies of public internal auditors in information and communication security auditing. Alanya Academik Review, 5(2), 525-545. https://doi.org/10.29023/alanyaakademik.869215
  • Akçakanat, Ö., Özdemir, O., & Mazak, M. (2021). Cybersecurity risks and information technology auditing in businesses: an examination of banks' cybersecurity practices. Mehmet Akif Ersoy University Journal of Applied Sciences, 5(2), 246-270. https://doi.org/10.31200/makuubd.978263
  • Altınbaşak, İ., & Karaca, E. S. (2009). İnternet advertising and an application on the assessment of internet advertising. Ege Academic Review, 9(2), 463-487.
  • Aydın, M. D. (2005). eEurope+ and Turkey: compliance with European Union criteria in the field of information technology. Hacettepe University Journal of Economics and Administrative Sciences, 23(1), 287-311.
  • Baylis, J., & Smith, S. (2017). The globalization of world politics: An introduction to international relations (7th ed.). Oxford University Press.
  • Bıçakçı, S. (2014). NATO’s emerging threat perception: cyber security in the 21st century. International Relations, 10(40), 100-130.
  • Bıçakçı, S., Ergun, F. D. & Çelikpala, M. (2015). The cyber security scene in Turkey. The Centre for Economics and Foreign Policy Studies. https://edam.org.tr/wp-content/uploads/2016/03/edam_cyber_security_report.pdf
  • Biçkin, R. (2024). An examination of the concept of security in Turkey's five-year development plans [Master's thesis, Topkapı University Graduate School of Education].
  • Bilir, F. (2023). The emergence of applications and legal regulations for the protection of personal data. Justice Journal (71), 631-651. https://doi.org/10.57083/adaletdergisi.1391733
  • Booth, K. (2007). Theory of world security. Cambridge University Press. Bowen, G. A. (2009). Document analysis as a qualitative research method. Qualitative Research Journal, 9(2), 27–40. https://doi.org/10.3316/QRJ0902027
  • Buzan, B., Wæver, O., & de Wilde, J. (1998). Security: A new framework for analysis. Lynne Rienner Publishers. Cole, E. (2018). Cybersecurity for beginners: Ethical hacking and defense strategies. CyberTech Press.
  • Çakır, H., & Taşer, M. (2023). Evaluation of cybersecurity activities and training programs in Turkey. Gazi University Journal of Science Part C: Design and Technology, 11(2), 347-366. https://doi.org/10.29109/gujsc.1165131
  • Çeliktaş, B. (2016). The development of the concept of cybersecurity and an assessment specific to Turkey [Master's thesis, Karadeniz Technical University].
  • Çetinkaya, N. (2017). The effects of e-government services on education and social life in Turkey. International Journal of Social Sciences Academic Research, 1(1), 12-21.
  • Darıcılı, A. B. (2019). Analysis of Turkey's cybersecurity policies; recommendations for Turkey's cybersecurity model. TESAM Academy Journal, 6(2), 11-33. https://doi.org/10.30626/tesamakademi.613517
  • Gündoğdu, S. (2023). Cyber security as an influence tool in international politics and the implementation of Turkey's cyber security policy: National Cyber İncident Response Center (USOM). Firat University Journal of Social Sciences, 33(3), 1325-1337. https://doi.org/10.18069/firatsbed.1261707
  • Güneş, A. (2019). Global powers' national cybersecurity strategies: The case of the United States. Cyberpolitik Journal, 4(8), 242–258.
  • Güntay, V. (2018). The transformation of cybersecurity into an instrument of influence in international politics and international actors. Journal of Security Strategies, 14(27), 79-111. https://doi.org/10.17752/guvenlikstrtj.432151.
  • Karasoy, H. A., & Babaoğlu, P. (2021). Cyber security in Turkey: legal and institutional infrastructure. Legislative Journal (44), 123-155.
  • Karasoy, H., & Gezici, H. S. (2023). From bombs to bytes: the role of cybersecurity in national security and the importance of artificial intelligence in cybersecurity. International Journal of Management Academy, 6(1), 173-188. https://doi.org/10.33712/mana.1254015
  • Kestane, A., & Kurt, G. (2024). Cloud security audit: Internal audit in cloud cybersecurity applications. Journal of the Faculty of Economics and Administrative Sciences, Ömer Halisdemir University, 17(3), 667-690. https://doi.org/10.25287/ohuiibf.1482734
  • Kestane, Ö. (2025). Cyber attacks and the need for cybersecurity audits. İzmir SMMM Solidarity Journal, 8(1), 41–49.
  • Kılınç, D. (2016). Protection of privacy under article 9/a of law no. 5651 on the regulation of publications made on the internet and the fight against crimes committed through these publications. Ankara Hacı Bayram Veli University Law Faculty Journal, 20(2), 577-624.
  • Kshetri, N. (2016). Cybersecurity and cybercrime in the global context. Routledge.
  • Kurnaz, S., & Karatepe, S. (2019). Cyber security of airports in Turkey within the scope of critical infrastructure security. ASAM International Public Administration Symposium Proceedings, 1–12.
  • Kutlu, Ö., Sevinç, Y., & Kahraman, S. (2018). Analysis of security risks in e-government applications in Turkey. Turkish Studies, 13(21), 129–156.
  • Naralan, A. (2010). e-preparation and e-government in Turkey. Atatürk University Journal of Economics and Administrative Sciences, 23(1), 1-17.
  • Ottis, R. (2008). Analysis of the 2007 cyber attacks against Estonia from the information warfare perspective. Cooperative Cyber Defence Centre of Excellence Report, 1–30. https://ccdcoe.org/uploads/2018/10/Ottis2008_AnalysisOf2007FromTheInformationWarfarePerspective.pdf
  • Önal, M. A. (2021). Dimensions of cybersecurity in the context of cyberspace and security relations. Hitit Journal of Economics and Politics, 1(2), 114–123.
  • Özdemirci, F., & Torunlar, M. (2018). Information-Exchange-Cybersecurity-Independence. Information Management, 1(1), 78-83.
  • Öztürk, K. B. (2009). The legal nature of authorization in electronic communications services. Ankara Bar Association Journal (1), 26-42.
  • Reagan, J. (2001). The Love Bug virus and global email vulnerabilities. Cybersecurity Review, 4(1), 38–45.
  • Sağıroğlu, Ş., & Alkan, M. (2018). Cybersecurity and defense: awareness and deterrence. Grafiker Publishing.
  • Sancakdar, A. (2021). Floridi's philosophy of information and big data [Master's thesis, Istanbul University].
  • Shakarian, P. (2011). Georgia’s cyber security vulnerabilities. Military Cyber Affairs, 2(1), 1–15. Solmaz, S. B. (2011). Milestones in cybersecurity history: The evolution of threats and defense strategies. Middle East and Asia-Caucasus Research Journal, 3(1), 1–9.
  • Tanrıverdi, E., Kurada, B., Şen, M. F., Demirkol Kılıç, E. (2023). The concept of critical ınfrastructure in the context of disaster management in Turkey. Ankara University Journal of Environmental Sciences, 10(1), 1-8.
  • Tunca, S. (2019). The concept of cyber security in the modern age. Dumlupınar University Journal of Economics and Administrative Sciences (3-4), 1-7.
  • Uluç, C., & Eyüpoğlu, C. (2024). The capture the flag competition approach for training qualified workforce in the field of cyber security. Istanbul Commerce University Journal of Science, 23(46), 292-318. https://doi.org/10.55071/ticaretfbd.1529412
  • Ünsal, H. (Ed.). (2002). Turkey Information Technology Council e-government working group. Turkey Information Technology Council. https://eski.tbd.org.tr/usr_img/cd/kamubib12/diger/digercalismalar.htm
  • Ünver, M., Canbay, C., & Mirzaoğlu, A. G. (2011). Cybersecurity activities of international organizations. Information Technologies and Communications Authority Publishing. https://bgys.iku.edu.tr/sites/bgys/files/inline-files/Uluslararası%20Kuruluşların%20Siber%20Güvenlik%20Faaliyetleri.pdf
  • Ünver, N. G. (2023). A comparative analysis of cybersecurity policies: the case of Turkey and the United Kingdom. Livre De Lyon Publications.
  • Walt, S. M. (1991). The renaissance of security studies. International Studies Quarterly, 35(2), 211–239.
  • Wiggins, R. (2010). Al Gore and the creation of the internet. Journal of Peer Reviewed Journal on the Internet, 1(1), 1–17.
  • Yıldırım, A. (2024). Analysis of Turkey's cybersecurity policy through its action plans. Journal of Organization and Management Sciences, 16(1), 23–47.
  • Yıldırım, E. (2024). Cyber security strategies and critical infrastructures in Turkey. Journal of Security and Strategy, 9(1), 25–42.
  • Yılmaz, Ö. (2021). The history of Web 1.0, 2.0, 3.0, and 4.0. Maltepe University Faculty of Communication Journal, 8(2), 344–350.
  • Zetter, K. (2014). Countdown to zero day: Stuxnet and the launch of the world’s first digital weapon. Crown Publishing.

An Examination of the Historical Development of Cybersecurity in the Context of International Security Studies: The Case of Turkey

Yıl 2025, Cilt: 13 Sayı: 3, 1988 - 2023, 30.12.2025
https://doi.org/10.18506/anemon.1776172

Öz

In today's world, technological developments are reaching ever greater proportions, and while this progress brings many advantages in terms of making life easier, it also causes new problems. Advances in information technology, in particular, affect every area of life, especially the protection of information and documents. This process gives rise to very serious security issues in the digital realm and necessitates the adoption of appropriate countermeasures. Among these countermeasures, cybersecurity is paramount. This is because this process jeopardizes the security of the entire world, not just a specific region. Considering all these reasons, cybersecurity is on the agenda of most developed and developing countries and has become indispensable in ensuring the security of the digital world. The importance of the concept of cybersecurity has paved the way for many academic studies in this field. The article titled "An Examination of the Historical Development of Cybersecurity in the Context of International Security Studies: The Case of Turkey" was prepared with the aim of contributing to the literature. The purpose of this study is to reveal how cybersecurity, which has played a significant role in people's lives since the 1990s, has developed. In line with this objective, the study aims to reveal the stages through which cybersecurity has passed, both globally and in Turkey, to reach its current state. Prepared by conducting a literature review and drawing on numerous scientific works, this article employs document analysis and comparative analysis methods.

Kaynakça

  • Acarer, T. (2020). Macro cybersecurity measures that can be taken for our national security. UBGMD, 6(2), 61–71. https://doi.org/10.18640/ubgmd.796168
  • Ağdeniz, Ş. (2021). A study on the role and competencies of public internal auditors in information and communication security auditing. Alanya Academik Review, 5(2), 525-545. https://doi.org/10.29023/alanyaakademik.869215
  • Akçakanat, Ö., Özdemir, O., & Mazak, M. (2021). Cybersecurity risks and information technology auditing in businesses: an examination of banks' cybersecurity practices. Mehmet Akif Ersoy University Journal of Applied Sciences, 5(2), 246-270. https://doi.org/10.31200/makuubd.978263
  • Altınbaşak, İ., & Karaca, E. S. (2009). İnternet advertising and an application on the assessment of internet advertising. Ege Academic Review, 9(2), 463-487.
  • Aydın, M. D. (2005). eEurope+ and Turkey: compliance with European Union criteria in the field of information technology. Hacettepe University Journal of Economics and Administrative Sciences, 23(1), 287-311.
  • Baylis, J., & Smith, S. (2017). The globalization of world politics: An introduction to international relations (7th ed.). Oxford University Press.
  • Bıçakçı, S. (2014). NATO’s emerging threat perception: cyber security in the 21st century. International Relations, 10(40), 100-130.
  • Bıçakçı, S., Ergun, F. D. & Çelikpala, M. (2015). The cyber security scene in Turkey. The Centre for Economics and Foreign Policy Studies. https://edam.org.tr/wp-content/uploads/2016/03/edam_cyber_security_report.pdf
  • Biçkin, R. (2024). An examination of the concept of security in Turkey's five-year development plans [Master's thesis, Topkapı University Graduate School of Education].
  • Bilir, F. (2023). The emergence of applications and legal regulations for the protection of personal data. Justice Journal (71), 631-651. https://doi.org/10.57083/adaletdergisi.1391733
  • Booth, K. (2007). Theory of world security. Cambridge University Press. Bowen, G. A. (2009). Document analysis as a qualitative research method. Qualitative Research Journal, 9(2), 27–40. https://doi.org/10.3316/QRJ0902027
  • Buzan, B., Wæver, O., & de Wilde, J. (1998). Security: A new framework for analysis. Lynne Rienner Publishers. Cole, E. (2018). Cybersecurity for beginners: Ethical hacking and defense strategies. CyberTech Press.
  • Çakır, H., & Taşer, M. (2023). Evaluation of cybersecurity activities and training programs in Turkey. Gazi University Journal of Science Part C: Design and Technology, 11(2), 347-366. https://doi.org/10.29109/gujsc.1165131
  • Çeliktaş, B. (2016). The development of the concept of cybersecurity and an assessment specific to Turkey [Master's thesis, Karadeniz Technical University].
  • Çetinkaya, N. (2017). The effects of e-government services on education and social life in Turkey. International Journal of Social Sciences Academic Research, 1(1), 12-21.
  • Darıcılı, A. B. (2019). Analysis of Turkey's cybersecurity policies; recommendations for Turkey's cybersecurity model. TESAM Academy Journal, 6(2), 11-33. https://doi.org/10.30626/tesamakademi.613517
  • Gündoğdu, S. (2023). Cyber security as an influence tool in international politics and the implementation of Turkey's cyber security policy: National Cyber İncident Response Center (USOM). Firat University Journal of Social Sciences, 33(3), 1325-1337. https://doi.org/10.18069/firatsbed.1261707
  • Güneş, A. (2019). Global powers' national cybersecurity strategies: The case of the United States. Cyberpolitik Journal, 4(8), 242–258.
  • Güntay, V. (2018). The transformation of cybersecurity into an instrument of influence in international politics and international actors. Journal of Security Strategies, 14(27), 79-111. https://doi.org/10.17752/guvenlikstrtj.432151.
  • Karasoy, H. A., & Babaoğlu, P. (2021). Cyber security in Turkey: legal and institutional infrastructure. Legislative Journal (44), 123-155.
  • Karasoy, H., & Gezici, H. S. (2023). From bombs to bytes: the role of cybersecurity in national security and the importance of artificial intelligence in cybersecurity. International Journal of Management Academy, 6(1), 173-188. https://doi.org/10.33712/mana.1254015
  • Kestane, A., & Kurt, G. (2024). Cloud security audit: Internal audit in cloud cybersecurity applications. Journal of the Faculty of Economics and Administrative Sciences, Ömer Halisdemir University, 17(3), 667-690. https://doi.org/10.25287/ohuiibf.1482734
  • Kestane, Ö. (2025). Cyber attacks and the need for cybersecurity audits. İzmir SMMM Solidarity Journal, 8(1), 41–49.
  • Kılınç, D. (2016). Protection of privacy under article 9/a of law no. 5651 on the regulation of publications made on the internet and the fight against crimes committed through these publications. Ankara Hacı Bayram Veli University Law Faculty Journal, 20(2), 577-624.
  • Kshetri, N. (2016). Cybersecurity and cybercrime in the global context. Routledge.
  • Kurnaz, S., & Karatepe, S. (2019). Cyber security of airports in Turkey within the scope of critical infrastructure security. ASAM International Public Administration Symposium Proceedings, 1–12.
  • Kutlu, Ö., Sevinç, Y., & Kahraman, S. (2018). Analysis of security risks in e-government applications in Turkey. Turkish Studies, 13(21), 129–156.
  • Naralan, A. (2010). e-preparation and e-government in Turkey. Atatürk University Journal of Economics and Administrative Sciences, 23(1), 1-17.
  • Ottis, R. (2008). Analysis of the 2007 cyber attacks against Estonia from the information warfare perspective. Cooperative Cyber Defence Centre of Excellence Report, 1–30. https://ccdcoe.org/uploads/2018/10/Ottis2008_AnalysisOf2007FromTheInformationWarfarePerspective.pdf
  • Önal, M. A. (2021). Dimensions of cybersecurity in the context of cyberspace and security relations. Hitit Journal of Economics and Politics, 1(2), 114–123.
  • Özdemirci, F., & Torunlar, M. (2018). Information-Exchange-Cybersecurity-Independence. Information Management, 1(1), 78-83.
  • Öztürk, K. B. (2009). The legal nature of authorization in electronic communications services. Ankara Bar Association Journal (1), 26-42.
  • Reagan, J. (2001). The Love Bug virus and global email vulnerabilities. Cybersecurity Review, 4(1), 38–45.
  • Sağıroğlu, Ş., & Alkan, M. (2018). Cybersecurity and defense: awareness and deterrence. Grafiker Publishing.
  • Sancakdar, A. (2021). Floridi's philosophy of information and big data [Master's thesis, Istanbul University].
  • Shakarian, P. (2011). Georgia’s cyber security vulnerabilities. Military Cyber Affairs, 2(1), 1–15. Solmaz, S. B. (2011). Milestones in cybersecurity history: The evolution of threats and defense strategies. Middle East and Asia-Caucasus Research Journal, 3(1), 1–9.
  • Tanrıverdi, E., Kurada, B., Şen, M. F., Demirkol Kılıç, E. (2023). The concept of critical ınfrastructure in the context of disaster management in Turkey. Ankara University Journal of Environmental Sciences, 10(1), 1-8.
  • Tunca, S. (2019). The concept of cyber security in the modern age. Dumlupınar University Journal of Economics and Administrative Sciences (3-4), 1-7.
  • Uluç, C., & Eyüpoğlu, C. (2024). The capture the flag competition approach for training qualified workforce in the field of cyber security. Istanbul Commerce University Journal of Science, 23(46), 292-318. https://doi.org/10.55071/ticaretfbd.1529412
  • Ünsal, H. (Ed.). (2002). Turkey Information Technology Council e-government working group. Turkey Information Technology Council. https://eski.tbd.org.tr/usr_img/cd/kamubib12/diger/digercalismalar.htm
  • Ünver, M., Canbay, C., & Mirzaoğlu, A. G. (2011). Cybersecurity activities of international organizations. Information Technologies and Communications Authority Publishing. https://bgys.iku.edu.tr/sites/bgys/files/inline-files/Uluslararası%20Kuruluşların%20Siber%20Güvenlik%20Faaliyetleri.pdf
  • Ünver, N. G. (2023). A comparative analysis of cybersecurity policies: the case of Turkey and the United Kingdom. Livre De Lyon Publications.
  • Walt, S. M. (1991). The renaissance of security studies. International Studies Quarterly, 35(2), 211–239.
  • Wiggins, R. (2010). Al Gore and the creation of the internet. Journal of Peer Reviewed Journal on the Internet, 1(1), 1–17.
  • Yıldırım, A. (2024). Analysis of Turkey's cybersecurity policy through its action plans. Journal of Organization and Management Sciences, 16(1), 23–47.
  • Yıldırım, E. (2024). Cyber security strategies and critical infrastructures in Turkey. Journal of Security and Strategy, 9(1), 25–42.
  • Yılmaz, Ö. (2021). The history of Web 1.0, 2.0, 3.0, and 4.0. Maltepe University Faculty of Communication Journal, 8(2), 344–350.
  • Zetter, K. (2014). Countdown to zero day: Stuxnet and the launch of the world’s first digital weapon. Crown Publishing.
Toplam 48 adet kaynakça vardır.

Ayrıntılar

Birincil Dil İngilizce
Konular İnsan Merkezli Bilgi İşleme (Diğer)
Bölüm Araştırma Makalesi
Yazarlar

Gürkan Gündüz 0000-0002-3067-6576

Gönderilme Tarihi 2 Eylül 2025
Kabul Tarihi 4 Aralık 2025
Yayımlanma Tarihi 30 Aralık 2025
Yayımlandığı Sayı Yıl 2025 Cilt: 13 Sayı: 3

Kaynak Göster

APA Gündüz, G. (2025). An Examination of the Historical Development of Cybersecurity in the Context of International Security Studies: The Case of Turkey. Anemon Muş Alparslan Üniversitesi Sosyal Bilimler Dergisi, 13(3), 1988-2023. https://doi.org/10.18506/anemon.1776172

Anemon Muş Alparslan Üniversitesi Sosyal Bilimler Dergisi Creative Commons Atıf-GayriTicari 4.0 Uluslararası Lisansı (CC BY NC) ile lisanslanmıştır.