Araştırma Makalesi
BibTex RIS Kaynak Göster

Terör Örgütlerinin Çevrimiçi Eylemleriyle Mücadelede Bir Önleme Stratejisi: Siber Caydırıcılık

Yıl 2025, Cilt: 14 Sayı: 2, 838 - 850, 15.04.2025
https://doi.org/10.33206/mjss.1549263

Öz

Bu çalışmada çevrimiçi ortamı siber saldırlar dâhil pek çok amaçla kullanan terör örgütleri üzerinde caydırıcılığın etkililiği farklı yönlerden tartışılmaktadır. Terör örgütlerinin silahlı kanadıyla, finans kaynaklarıyla, dış yardım ve destekleriyle, eleman temin etme yollarıyla ve algı yönetim faaliyetleriyle mücadele edilmesi bütüncül bir yaklaşımı gerektirmektedir. Günümüzde bunların yanı sıra siber alandaki hareketliliklerinin takip edilmesi ve engellenmesi mücadelenin tamamlayıcı etkisini oluşturmaktadır. Bu nedenle terör örgütlerini siber alandan uzak tutmak, buradaki faaliyetlerini durdurmak ve saldırılarını engellemek oldukça hassas bir yaklaşım gerektirmektedir. Çalışmada devletlerin sahip oldukları siber güç ve savunma kabiliyetinin terör örgütleri üzerindeki etkisi ele alınacaktır. Siber caydırıcılığın geleneksel caydırıcılıktan farklılaşan yönleri hâlihazırda devletler için bir meydan okuma oluştururken, bir devlet dışı aktör olarak terör gruplarının nasıl caydırılabileceği incelenmesi fayda sağlayacak konulardandır. Çalışmada caydırıcılık teorisi, bir devlet-dışı aktör üzerinde ve geleneksel mücadele sahasının dışında yeniden değerlendirmeye açılacaktır. Çalışmanın birinci bölümünde siber caydırıcılığın kavramsal çerçevesi çizilecektir. İkinci bölümde ise terör örgütlerinin siber tehdit potansiyeline yer verildikten sonra siber caydırıcılık üzerinden bir analiz yapılacaktır. Burada denial ve punishment kapsamında bir değerlendirme yapılacaktır. Sonuç bölümünde ise kapsamlı ulusal siber caydırıcılık stratejisi hakkında bir tartışma yer alacaktır. Çalışmanın terör örgütlerinin çevrimiçi faaliyetleriyle mücadele stratejilerine mütevazı bir katkı sunması planlanmaktadır.

Kaynakça

  • Arquilla, J. & Ronfeldt, D. (1993). Cyberwar is coming! Comparative Strategy, 12(2), 141-165.
  • Arquilla, J. & Ronfeldt, D. (1999). The advent of netwar: Analytic background. Studies in Conflict&Terrorism, 22(3), 193-206.
  • Azani, E. & Liv, N. (2018). A comprehensive doctrine for an evolving threat: Countering terrorist use of social networks. Studies in Conflict&Terrorism, 43(8), 1-25.
  • Beeson, A. (1996). Top ten threats to civil liberties in cyberspace. Human Rights, 23(2), 10-13.
  • Betts, R. (2013). The lost logic of deterrence: What the strategy that won the Cold War can-and can’t-do now. Foreign Affairs, 92(2), 87-99.
  • Betz, D. (2012). Cyberpower in strategic affairs: Neither unthinkable nor blessed. Journal of Strategic Studies, 35(5), 689-711.
  • Bieda, D. & Halawi, L. (2015). Cyberspace: A venue for terrorism. Issues in International Systems, 16(3), 33-42.
  • Borghard, E. D. & Lonergan, S. W. (2017). The logic of coercion in cyberspace. Security Studies, 26(3), 452-481.
  • Bowen, W. Q. (2004). Deterrence and asymmetry: Non-state actors and mass casualty terrorism. Contemporary Security Policy, 25(1), 54-70.
  • Cerf, V. G. (2011). Safety in cyberspace. Daedalus, 140(4), 59-69.
  • Chen, J. (2017). Cyber deterrence by engagement and surprise. Prism, 7(2), 100-107.
  • Clarke, R. A. & Knake, R. K. (2011). Cyber war: The next threat to national security and what to do about it. New York: Ecco.
  • Conway, M. (2006). Terrorists use of the internet and fighting back. Information and Security, 19, 9-30.
  • Danky, Y., Maliarchuk, T. & Briggs, C. (2017). Hybrid war: High-tech, information and cyber conflicts. Connections, 16(2), 5-24.
  • Denning, D. E. (2015). Rethinking the cyber domain and deterrence. Joint Forces Quarterly, 77, 8-15.
  • Der Derian, J. (1994). Cyber-deterrence. Wired, 2.09, https://www.wired.com/1994/09/cyber-deter/
  • Elliott, David. (2011). Deterring strategic cyberattack. IEEE Security&Pivacy, 9(5), 36-40.
  • Fischerkeller, M. P. & Harknett, R. J. (2017). Deterrence is not a credible strategy for cyberspace. Orbis, 61(3), 381-393.
  • Fisher, M. (2019). The concept of deterrence and its applicability in the cyber domain. Connections, 18(1-2), 69-92.
  • Furnell, S. M. & Warren, M. J. (1999). Computer hacking and cyber terrorism: The real threats in the new milenium? Computer&Security, 18(1), 28-34.
  • Gartzke, E. & Lindsay, J.R. (2015). Weaving tangled webs: Offense, defense, and deception in cyberspace. Security Studies, 24(2), 316-348.
  • Gartzke, E. (2013). The myth of cyberwar: Bringing war in cyberspace back down to Earth. International Security, 38(2), 41-73.
  • Gaycken, S. & Martellini, M. (2013). Cyber as deterrent. M. Martellini (Ed.), Cyber security: Deterrence and IT protection for critical infrastructures (pp.1-10). Springer.
  • Geist, E. (2015). Deterrence stability in the cyber age. Strategic Studies Quarterly, 9(4), 44-61.
  • Gill, P. et al. (2017). Terrorists use of the internet by numbers: Quantifying behaviors, patterns, and process. Criminology&Public Policy, 16(1), 99-117.
  • Goodman, W. (2010). Cyber deterrence: Tougher in theory than in practice. Strategic Studies Quarterly, 4(3), 102-135.
  • Harknett, R. J. (1996). Information warfare and deterrence. Parameters, 26(3), 93-107.
  • Heckmen, K. et al. (2013). Active cyber defense with denial and deception: A cyber-wargame experiment. Computers&Security, 35, 72-77.
  • Hua, J., Chen, Y. & Luo, X. (2018). Are we ready for cyberterrorist attacks? Examining the role of individual resilience. Information&Management, 55(7), 928-938.
  • Huey, L. (2015). This is not your mother’s terrorism: Social media, online radicalization and practice of political jamming. Journal of Terrorism Research, 6(2), 1-16.
  • Iasiello, E. (2014). Is cyber deterrence an illusory course of action? Journal of Strategic Security, 7(1), 54-67.
  • Jabbour, K. & Ratazzi, P. (2012). Does the United States need a new model for cyber deterrence? A. B. Lowther (Ed.), Deterrence: Rising powers, roque regimes, and terrorism in the twenty-first century (pp. 33-48). Palgrave Macmillian.
  • Jasper, S. (2015). Deterring malicious behavior in cyberspace. Strategic Studies Quarterly, 9(1), 60-85.
  • Jervis, R. (2016). Some thoughts on deterrence in the cyber era. Journal of Information Warfare, 15(2), 66-73.
  • Kolton, M. (2017). Interpreting China’s pursuit of cyber sovereignty and its views on cyber deterrence. The Cyber Defense Review, 2(1), 119-157.
  • Klein, J.J. (2015). Deterring and dissuading cyberterrorism. Journal of Strategic Security, 8(4), 23-38.
  • Kuehl, D. T. (2009). From cyberspace to cyberpower: Defining the problem. F. D. Kramer, S. H. Starr & L. K. Wentz (Eds.), Cyberpower and national security (pp.24-42). Potomac Books.
  • Kugler, R. L. (2009). Deterrence of cyber attacks. F. D. Kramer, S. H. Starr & L. K. Wentz (Eds.), Cyberpower and national security (pp.309-342). Potomac Books.
  • Lachow, I. (2009). Cyber terrorism: Menace or myth? F. D. Kramer, S. H. Starr & L. K. Wentz (Eds.), Cyberpower and national security (pp.437-464). Potomac Books.
  • Langner, R. (2016). Cyber power: An emerging factor in national and international security. Horizons: Journal of International Relations and Sustainable Development, 8, 206-2018.
  • Libicki, M. C. (2007). Conquest in cyberspace: National security and information warfare. Cambridge University Press.
  • Libicki, M. C. (2009). Cyberdeterrence and cyberwar. RAND.
  • Libicki, M. C. (2018). Expectation of cyber deterrence. Strategic Studies Quarterly, 12(4), 44-57.
  • Lindsay, J. R. (2015). Tipping the scale: The attribution problem and the feasibility of deterrence against cyberattack. Journal of Cybersecurity, 1(1), 53-67.
  • Lowther, A. B. (2012). Introduction: How has deterrence evolved? A. B. Lowther (Ed.), Deterrence: Rising powers, roque regimes, and terrorism in the twenty-first century (pp.1-16). Palgrave Macmillian.
  • Macdonald, S., Jarvis, L. & Lavis, S. M. (2019). Cyberterrorism today? Findings from a follow-on survey of researchers. Studies in Conflict&Terrorism, 45(8), 1-26.
  • Marsili, M. (2018). The war on cyberterrorism. Democracy and Security, 15(2), 172-199.
  • Mazaar, M. J. (2018). Understanding deterrence. Perspective, RAND Corporation.
  • McKenzie, T. M. (2017). Is cyber deterrence possible? Perspectives on Cyber Power. Air University Press.
  • Nye Jr., J. S. (2017). Deterrence and dissuasion cyberspace. International Security, 41(3), 44-71.
  • Quackenbush, S. L. (2011). Understanding general deterrence: Theory and application. Palgrave Macmillian.
  • Quinlan, M. (2004). Deterrence and deterrability. Contemporary Security Policy, 25(1), 11-17.
  • Soesanto, S. & Smeets, M. (2021). Cyber deterrence: The past, present, and the future. F. Osinga & T. Sweijs (Eds.), NL Arms Netherlands annual review of military studies 2020: Deterrence in the 21st century- Insights from theory and practice. Asser Press&Springer.
  • Stein, J. G. (2009). Rational deterrence against ‘irrational’ adverseries? No common knowledge. T. V. Paul, P. M. Morgan & J. J. Wirtz (Eds.), Complex deterrence: Strategy in the global age (pp. 58-84). The University of Chicago Press.
  • Sterner, E. (2011). Retaliatory deterrence in cyberspace. Strategic Studies Quarterly, 5(1), 62-80.
  • Stevens, T. (2012). A cyber war of ideas? Deterrence and norms in cyberspace. Contemporary Security Policy, 33(1), 148-170.
  • Valari, L. & Knights, M. (2000). Affecting trust: Terrorism, internet and offensive information warfare. Terrorism and Political Violence, 12(1), 15-36.
  • Valeriano, B. & Maness, R. C. (2015). Cyber war versus cyber realities: Cyber conflict in the international system. Oxford University Press.
  • van Creveld, M. (1991). Technology and war: From 2000 B.C. to the present. The Free Press.
  • Weimann, G. (2005). Cyberterrorism: The sum of all fears? Studies in Conflict&Terrorism, 28(2), 129-149.
  • Wheatley, G. F. & Hayes, E. E. (1996). Information warfare and deterrence. NDU Press Book.
  • Wilner, A. (2015). Contemporary deterrence theory and counterterrorism: A bridge too far? International Law and Politics, 47, 439-462.
  • Wilner, A. (2017). Cyber deterrence and critical-infrastructure protection: Expectation, application, and limitation. Comparative Strategy, 36(4), 309-318.
  • Wilner, A. S. (2011). Deterring the undeterrable: Coercion, denial and delegitimization in counterterrorism. The Journal of Strategic Studies, 34(1), 3-37.

A Prevention Strategy in Combatting the Online Actions of Terrorist Organizations: Cyber Deterrence

Yıl 2025, Cilt: 14 Sayı: 2, 838 - 850, 15.04.2025
https://doi.org/10.33206/mjss.1549263

Öz

This study explores the effectiveness of deterrence against terrorist organizations that use online environments, including cyberattacks, from various perspectives. Addressing the armed wings, financial resources, external aid and support, recruitment methods, and perception management activities of terrorist organizations requires a comprehensive approach. In addition to these aspects, monitoring and countering their activities in cyberspace constitute a complementary side of the struggle. Therefore, keeping terrorist organizations away from the cyber domain, halting their activities, and preventing attacks require a highly nuanced approach. This study will examine the impact of states' cyber power and defense capabilities on terrorist organizations. As the distinctive aspects of cyber deterrence pose a challenge for states, understanding how to deter non-state actors like terrorist groups is a valuable area of investigation. The study will reevaluate deterrence theory in the context of non-state actors and beyond traditional battlefields. The first section of the study will outline the conceptual framework of cyber deterrence. The second section will analyze the cyber threat potential of terrorist organizations and evaluate cyber deterrence through the lenses of denial and punishment. The conclusion will discuss a comprehensive national cyber deterrence strategy. The study aims to make a modest contribution to strategies for combating the online activities of terrorist organizations.

Etik Beyan

During the writing process of the study “A Prevention Strategy Combating in Combating the Online Actions of Terrorist Organizations: Cyber Deterrence” scientific rules, ethical and citation rules were followed. No falsification was made on the collected data and this study was not sent to any other academic publication medium for evaluation.

Kaynakça

  • Arquilla, J. & Ronfeldt, D. (1993). Cyberwar is coming! Comparative Strategy, 12(2), 141-165.
  • Arquilla, J. & Ronfeldt, D. (1999). The advent of netwar: Analytic background. Studies in Conflict&Terrorism, 22(3), 193-206.
  • Azani, E. & Liv, N. (2018). A comprehensive doctrine for an evolving threat: Countering terrorist use of social networks. Studies in Conflict&Terrorism, 43(8), 1-25.
  • Beeson, A. (1996). Top ten threats to civil liberties in cyberspace. Human Rights, 23(2), 10-13.
  • Betts, R. (2013). The lost logic of deterrence: What the strategy that won the Cold War can-and can’t-do now. Foreign Affairs, 92(2), 87-99.
  • Betz, D. (2012). Cyberpower in strategic affairs: Neither unthinkable nor blessed. Journal of Strategic Studies, 35(5), 689-711.
  • Bieda, D. & Halawi, L. (2015). Cyberspace: A venue for terrorism. Issues in International Systems, 16(3), 33-42.
  • Borghard, E. D. & Lonergan, S. W. (2017). The logic of coercion in cyberspace. Security Studies, 26(3), 452-481.
  • Bowen, W. Q. (2004). Deterrence and asymmetry: Non-state actors and mass casualty terrorism. Contemporary Security Policy, 25(1), 54-70.
  • Cerf, V. G. (2011). Safety in cyberspace. Daedalus, 140(4), 59-69.
  • Chen, J. (2017). Cyber deterrence by engagement and surprise. Prism, 7(2), 100-107.
  • Clarke, R. A. & Knake, R. K. (2011). Cyber war: The next threat to national security and what to do about it. New York: Ecco.
  • Conway, M. (2006). Terrorists use of the internet and fighting back. Information and Security, 19, 9-30.
  • Danky, Y., Maliarchuk, T. & Briggs, C. (2017). Hybrid war: High-tech, information and cyber conflicts. Connections, 16(2), 5-24.
  • Denning, D. E. (2015). Rethinking the cyber domain and deterrence. Joint Forces Quarterly, 77, 8-15.
  • Der Derian, J. (1994). Cyber-deterrence. Wired, 2.09, https://www.wired.com/1994/09/cyber-deter/
  • Elliott, David. (2011). Deterring strategic cyberattack. IEEE Security&Pivacy, 9(5), 36-40.
  • Fischerkeller, M. P. & Harknett, R. J. (2017). Deterrence is not a credible strategy for cyberspace. Orbis, 61(3), 381-393.
  • Fisher, M. (2019). The concept of deterrence and its applicability in the cyber domain. Connections, 18(1-2), 69-92.
  • Furnell, S. M. & Warren, M. J. (1999). Computer hacking and cyber terrorism: The real threats in the new milenium? Computer&Security, 18(1), 28-34.
  • Gartzke, E. & Lindsay, J.R. (2015). Weaving tangled webs: Offense, defense, and deception in cyberspace. Security Studies, 24(2), 316-348.
  • Gartzke, E. (2013). The myth of cyberwar: Bringing war in cyberspace back down to Earth. International Security, 38(2), 41-73.
  • Gaycken, S. & Martellini, M. (2013). Cyber as deterrent. M. Martellini (Ed.), Cyber security: Deterrence and IT protection for critical infrastructures (pp.1-10). Springer.
  • Geist, E. (2015). Deterrence stability in the cyber age. Strategic Studies Quarterly, 9(4), 44-61.
  • Gill, P. et al. (2017). Terrorists use of the internet by numbers: Quantifying behaviors, patterns, and process. Criminology&Public Policy, 16(1), 99-117.
  • Goodman, W. (2010). Cyber deterrence: Tougher in theory than in practice. Strategic Studies Quarterly, 4(3), 102-135.
  • Harknett, R. J. (1996). Information warfare and deterrence. Parameters, 26(3), 93-107.
  • Heckmen, K. et al. (2013). Active cyber defense with denial and deception: A cyber-wargame experiment. Computers&Security, 35, 72-77.
  • Hua, J., Chen, Y. & Luo, X. (2018). Are we ready for cyberterrorist attacks? Examining the role of individual resilience. Information&Management, 55(7), 928-938.
  • Huey, L. (2015). This is not your mother’s terrorism: Social media, online radicalization and practice of political jamming. Journal of Terrorism Research, 6(2), 1-16.
  • Iasiello, E. (2014). Is cyber deterrence an illusory course of action? Journal of Strategic Security, 7(1), 54-67.
  • Jabbour, K. & Ratazzi, P. (2012). Does the United States need a new model for cyber deterrence? A. B. Lowther (Ed.), Deterrence: Rising powers, roque regimes, and terrorism in the twenty-first century (pp. 33-48). Palgrave Macmillian.
  • Jasper, S. (2015). Deterring malicious behavior in cyberspace. Strategic Studies Quarterly, 9(1), 60-85.
  • Jervis, R. (2016). Some thoughts on deterrence in the cyber era. Journal of Information Warfare, 15(2), 66-73.
  • Kolton, M. (2017). Interpreting China’s pursuit of cyber sovereignty and its views on cyber deterrence. The Cyber Defense Review, 2(1), 119-157.
  • Klein, J.J. (2015). Deterring and dissuading cyberterrorism. Journal of Strategic Security, 8(4), 23-38.
  • Kuehl, D. T. (2009). From cyberspace to cyberpower: Defining the problem. F. D. Kramer, S. H. Starr & L. K. Wentz (Eds.), Cyberpower and national security (pp.24-42). Potomac Books.
  • Kugler, R. L. (2009). Deterrence of cyber attacks. F. D. Kramer, S. H. Starr & L. K. Wentz (Eds.), Cyberpower and national security (pp.309-342). Potomac Books.
  • Lachow, I. (2009). Cyber terrorism: Menace or myth? F. D. Kramer, S. H. Starr & L. K. Wentz (Eds.), Cyberpower and national security (pp.437-464). Potomac Books.
  • Langner, R. (2016). Cyber power: An emerging factor in national and international security. Horizons: Journal of International Relations and Sustainable Development, 8, 206-2018.
  • Libicki, M. C. (2007). Conquest in cyberspace: National security and information warfare. Cambridge University Press.
  • Libicki, M. C. (2009). Cyberdeterrence and cyberwar. RAND.
  • Libicki, M. C. (2018). Expectation of cyber deterrence. Strategic Studies Quarterly, 12(4), 44-57.
  • Lindsay, J. R. (2015). Tipping the scale: The attribution problem and the feasibility of deterrence against cyberattack. Journal of Cybersecurity, 1(1), 53-67.
  • Lowther, A. B. (2012). Introduction: How has deterrence evolved? A. B. Lowther (Ed.), Deterrence: Rising powers, roque regimes, and terrorism in the twenty-first century (pp.1-16). Palgrave Macmillian.
  • Macdonald, S., Jarvis, L. & Lavis, S. M. (2019). Cyberterrorism today? Findings from a follow-on survey of researchers. Studies in Conflict&Terrorism, 45(8), 1-26.
  • Marsili, M. (2018). The war on cyberterrorism. Democracy and Security, 15(2), 172-199.
  • Mazaar, M. J. (2018). Understanding deterrence. Perspective, RAND Corporation.
  • McKenzie, T. M. (2017). Is cyber deterrence possible? Perspectives on Cyber Power. Air University Press.
  • Nye Jr., J. S. (2017). Deterrence and dissuasion cyberspace. International Security, 41(3), 44-71.
  • Quackenbush, S. L. (2011). Understanding general deterrence: Theory and application. Palgrave Macmillian.
  • Quinlan, M. (2004). Deterrence and deterrability. Contemporary Security Policy, 25(1), 11-17.
  • Soesanto, S. & Smeets, M. (2021). Cyber deterrence: The past, present, and the future. F. Osinga & T. Sweijs (Eds.), NL Arms Netherlands annual review of military studies 2020: Deterrence in the 21st century- Insights from theory and practice. Asser Press&Springer.
  • Stein, J. G. (2009). Rational deterrence against ‘irrational’ adverseries? No common knowledge. T. V. Paul, P. M. Morgan & J. J. Wirtz (Eds.), Complex deterrence: Strategy in the global age (pp. 58-84). The University of Chicago Press.
  • Sterner, E. (2011). Retaliatory deterrence in cyberspace. Strategic Studies Quarterly, 5(1), 62-80.
  • Stevens, T. (2012). A cyber war of ideas? Deterrence and norms in cyberspace. Contemporary Security Policy, 33(1), 148-170.
  • Valari, L. & Knights, M. (2000). Affecting trust: Terrorism, internet and offensive information warfare. Terrorism and Political Violence, 12(1), 15-36.
  • Valeriano, B. & Maness, R. C. (2015). Cyber war versus cyber realities: Cyber conflict in the international system. Oxford University Press.
  • van Creveld, M. (1991). Technology and war: From 2000 B.C. to the present. The Free Press.
  • Weimann, G. (2005). Cyberterrorism: The sum of all fears? Studies in Conflict&Terrorism, 28(2), 129-149.
  • Wheatley, G. F. & Hayes, E. E. (1996). Information warfare and deterrence. NDU Press Book.
  • Wilner, A. (2015). Contemporary deterrence theory and counterterrorism: A bridge too far? International Law and Politics, 47, 439-462.
  • Wilner, A. (2017). Cyber deterrence and critical-infrastructure protection: Expectation, application, and limitation. Comparative Strategy, 36(4), 309-318.
  • Wilner, A. S. (2011). Deterring the undeterrable: Coercion, denial and delegitimization in counterterrorism. The Journal of Strategic Studies, 34(1), 3-37.
Toplam 64 adet kaynakça vardır.

Ayrıntılar

Birincil Dil İngilizce
Konular Uluslararası Güvenlik
Bölüm Araştırma Makalesi
Yazarlar

Emre Çıtak 0000-0002-8704-6495

Yayımlanma Tarihi 15 Nisan 2025
Gönderilme Tarihi 12 Eylül 2024
Kabul Tarihi 11 Kasım 2024
Yayımlandığı Sayı Yıl 2025 Cilt: 14 Sayı: 2

Kaynak Göster

APA Çıtak, E. (2025). A Prevention Strategy in Combatting the Online Actions of Terrorist Organizations: Cyber Deterrence. MANAS Sosyal Araştırmalar Dergisi, 14(2), 838-850. https://doi.org/10.33206/mjss.1549263
AMA Çıtak E. A Prevention Strategy in Combatting the Online Actions of Terrorist Organizations: Cyber Deterrence. MJSS. Nisan 2025;14(2):838-850. doi:10.33206/mjss.1549263
Chicago Çıtak, Emre. “A Prevention Strategy in Combatting the Online Actions of Terrorist Organizations: Cyber Deterrence”. MANAS Sosyal Araştırmalar Dergisi 14, sy. 2 (Nisan 2025): 838-50. https://doi.org/10.33206/mjss.1549263.
EndNote Çıtak E (01 Nisan 2025) A Prevention Strategy in Combatting the Online Actions of Terrorist Organizations: Cyber Deterrence. MANAS Sosyal Araştırmalar Dergisi 14 2 838–850.
IEEE E. Çıtak, “A Prevention Strategy in Combatting the Online Actions of Terrorist Organizations: Cyber Deterrence”, MJSS, c. 14, sy. 2, ss. 838–850, 2025, doi: 10.33206/mjss.1549263.
ISNAD Çıtak, Emre. “A Prevention Strategy in Combatting the Online Actions of Terrorist Organizations: Cyber Deterrence”. MANAS Sosyal Araştırmalar Dergisi 14/2 (Nisan2025), 838-850. https://doi.org/10.33206/mjss.1549263.
JAMA Çıtak E. A Prevention Strategy in Combatting the Online Actions of Terrorist Organizations: Cyber Deterrence. MJSS. 2025;14:838–850.
MLA Çıtak, Emre. “A Prevention Strategy in Combatting the Online Actions of Terrorist Organizations: Cyber Deterrence”. MANAS Sosyal Araştırmalar Dergisi, c. 14, sy. 2, 2025, ss. 838-50, doi:10.33206/mjss.1549263.
Vancouver Çıtak E. A Prevention Strategy in Combatting the Online Actions of Terrorist Organizations: Cyber Deterrence. MJSS. 2025;14(2):838-50.

MANAS Journal of Social Studies (MANAS Sosyal Araştırmalar Dergisi)     


16155