<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20241031//EN"
        "https://jats.nlm.nih.gov/publishing/1.4/JATS-journalpublishing1-4.dtd">
<article  article-type="research-article"        dtd-version="1.4">
            <front>

                <journal-meta>
                                                                <journal-id>taad</journal-id>
            <journal-title-group>
                                                                                    <journal-title>Türkiye Adalet Akademisi Dergisi</journal-title>
            </journal-title-group>
                            <issn pub-type="ppub">1309-6826</issn>
                                                                                                        <publisher>
                    <publisher-name>Türkiye Adalet Akademisi</publisher-name>
                </publisher>
                    </journal-meta>
                <article-meta>
                                        <article-id pub-id-type="doi">10.54049/taad.1861138</article-id>
                                                                <article-categories>
                                            <subj-group  xml:lang="en">
                                                            <subject>Law in Context (Other)</subject>
                                                    </subj-group>
                                            <subj-group  xml:lang="tr">
                                                            <subject>Hukuk (Diğer)</subject>
                                                    </subj-group>
                                    </article-categories>
                                                                                                                                                        <title-group>
                                                                                                                        <article-title>Yapay Zekâ Destekli Sosyal Mühendislik Saldırıları: Ceza Hukuku Açısından Bir İnceleme</article-title>
                                                                                                                                                                                                <trans-title-group xml:lang="en">
                                    <trans-title>AI-Powered Social Engineering Attacks: An Analysis from the Perspective of Criminal Law</trans-title>
                                </trans-title-group>
                                                                                                    </title-group>
            
                                                    <contrib-group content-type="authors">
                                                                        <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0002-6678-2506</contrib-id>
                                                                <name>
                                    <surname>Gitmez</surname>
                                    <given-names>Emin</given-names>
                                </name>
                                                                    <aff>İNÖNÜ ÜNİVERSİTESİ</aff>
                                                            </contrib>
                                                                                </contrib-group>
                        
                                        <pub-date pub-type="pub" iso-8601-date="20260429">
                    <day>04</day>
                    <month>29</month>
                    <year>2026</year>
                </pub-date>
                                                    <issue>66</issue>
                                        <fpage>103</fpage>
                                        <lpage>136</lpage>
                        
                        <history>
                                    <date date-type="received" iso-8601-date="20260111">
                        <day>01</day>
                        <month>11</month>
                        <year>2026</year>
                    </date>
                                                    <date date-type="accepted" iso-8601-date="20260421">
                        <day>04</day>
                        <month>21</month>
                        <year>2026</year>
                    </date>
                            </history>
                                        <permissions>
                    <copyright-statement>Copyright © 2010, Türkiye Adalet Akademisi Dergisi</copyright-statement>
                    <copyright-year>2010</copyright-year>
                    <copyright-holder>Türkiye Adalet Akademisi Dergisi</copyright-holder>
                </permissions>
            
                                                                                                <abstract><p>Bu çalışma, yapay zekâ teknolojilerinin sosyal mühendislik saldırılarına etkisini ceza hukuku perspektifinden incelemektedir. Yapay zekânın özellikle üretken modeller, ses klonlama, deepfake, otomatik oltalama sistemleri ve manipülatif sohbet robotları aracılığıyla geleneksel sosyal mühendisliği daha sofistike, hızlı ve tespit edilmesi güç bir hale getirdiği ortaya konulmuştur. Bu saldırılar, yalnızca bireylerin değil, kurumların, kamu düzeninin ve dijital güvenliğin bütününü tehdit eden yeni bir suç alanı yaratmaktadır. Çalışmada sosyal mühendislik kavramının tarihsel ve kavramsal gelişimi ele alınmış; yapay zekâ destekli saldırıların klasik yöntemleri nasıl dönüştürdüğü detaylı biçimde açıklanmıştır. Türk ceza hukuku yönünden, yapay zekâ destekli sosyal mühendislik saldırılarının dolandırıcılık (TCK m.157–158), özel hayatın gizliliğini ihlal (TCK m.134), kişisel verilerin hukuka aykırı kaydedilmesi ve yayılması (TCK m.135–136) ile bilişim alanındaki suçlar (TCK m.243–245) kapsamında cezalandırılabilir olduğu tespit edilmiştir. Çalışmada kurgusal bir örnek olay üzerinden bu suç tiplerinin nasıl uygulanacağı somutlaştırılmıştır. Karşılaştırmalı hukukta Avrupa Birliği’nin Yapay Zekâ Tüzüğü (AI Act), GDPR ve NIS Direktifi gibi düzenlemelerle geliştirici ve platform işletmecilerine önemli yükümlülükler getirdiği; ABD’de ise cezai sorumluluk alanında parçalı ve sınırlı bir yaklaşım bulunduğu ifade edilmiştir. Çalışma, mevcut ceza hukuku normlarının yapay zekâ destekli sosyal mühendislik saldırılarını karşılamada yetersiz kaldığını, bu nedenle Türk Ceza Hukukunda gerekli düzenlemelerin yapılması gerektiğini ortaya koymaktadır.</p></abstract>
                                                                                                                                    <trans-abstract xml:lang="en">
                            <p>This study examines the impact of artificial intelligence technologies on social engineering attacks from a criminal law perspective. It demonstrates that artificial intelligence, particularly through generative models, voice cloning, deepfakes, automated phishing systems, and manipulative chatbots, has made traditional social engineering more sophisticated, rapid, and difficult to detect. These attacks create a new criminal landscape that threatens not only individuals but also institutions, public order, and digital security as a whole. Under Turkish criminal law, it has been determined that AI-enabled social engineering attacks are punishable under the following categories: fraud, violation of privacy, unlawful recording and dissemination of personal data, and cybercrimes. The study illustrates the application of these crimes through a fictional case study. In comparative law, it has been noted that the European Union imposes significant obligations on developers and platform operators through regulations such as the AI Act, GDPR, and the NIS Directive, while the US has a fragmented and limited approach to criminal liability. The study demonstrates that existing criminal law norms are insufficient to address AI-assisted social engineering attacks, and therefore, the necessary amendments must be made to Turkish Criminal Law.</p></trans-abstract>
                                                            
            
                                                            <kwd-group>
                                                    <kwd>Yapay zekâ destekli sosyal mühendislik</kwd>
                                                    <kwd>  TCK’da bilişim suçları</kwd>
                                                    <kwd>  Yapay zekâ ve ceza sorumluluğu</kwd>
                                            </kwd-group>
                                                        
                                                                            <kwd-group xml:lang="en">
                                                    <kwd>AI-Powered social engineering</kwd>
                                                    <kwd>  Cybercrimes under the Turkish Penal Code</kwd>
                                                    <kwd>  Artificial intelligence and criminal liability</kwd>
                                            </kwd-group>
                                                                                                            </article-meta>
    </front>
    <back>
                            <ref-list>
                                    <ref id="ref1">
                        <label>1</label>
                        <mixed-citation publication-type="journal">Akbulut B, ‘Yapay Zekâ ve Ceza Hukuku Sorumluluğu’(2023) 27(4) Ankara Hacı Bayram Veli Üniversitesi Hukuk Fakültesi Dergisi 267, 319</mixed-citation>
                    </ref>
                                    <ref id="ref2">
                        <label>2</label>
                        <mixed-citation publication-type="journal">Akyürek G, ‘Özel Hayatın Gizliliğini İhlal Suçu’ (Doktora tezi, Galatasaray Üniversitesi 2011)</mixed-citation>
                    </ref>
                                    <ref id="ref3">
                        <label>3</label>
                        <mixed-citation publication-type="journal">Akyürek G, Bayraktar K, Evik VS, Yıldız AK, İnceoğlu AA, Kangal ZT, Sınar H, Bostancı Bozbayındır</mixed-citation>
                    </ref>
                                    <ref id="ref4">
                        <label>4</label>
                        <mixed-citation publication-type="journal">G, Evik AH, Altunç S, Erman B, Aksoy Retornaz E ve Memiş Kartal P, Özel Ceza Hukuku Malvarlığına Karşı Suçlar Cilt IV (1. Baskı, On İki Levha Yayıncılık, 2018).</mixed-citation>
                    </ref>
                                    <ref id="ref5">
                        <label>5</label>
                        <mixed-citation publication-type="journal">Araslı O, ‘Özel Yaşamın Gizliliği Hakkı ve T.C. Anayasasında Düzenlenişi’ (Yayımlanmamış doçentlik tezi, Ankara Üniversitesi 1979)</mixed-citation>
                    </ref>
                                    <ref id="ref6">
                        <label>6</label>
                        <mixed-citation publication-type="journal">Artuk ME, Gökcen A ve Yenidünya AC, Ceza Hukuku Özel Hükümler (Yenilenmiş Gözden Geçirilmiş 15. Baskı, Adalet 2015), 880-886</mixed-citation>
                    </ref>
                                    <ref id="ref7">
                        <label>7</label>
                        <mixed-citation publication-type="journal">Bartoli, L. ‘Cybersecurity and the Fight against Cybercrime: Partners or Competitors?’ (2020) European Journal of Risk Regulation</mixed-citation>
                    </ref>
                                    <ref id="ref8">
                        <label>8</label>
                        <mixed-citation publication-type="journal">&lt;https://www.cambridge.org/core/journals/european-journal-of-risk-regulation/article/cybersecurity-and-the-fight-against-cybercrime-partners-or-competitors/80A53F6CED87BA65B100E7A03B00DC16&gt; Erişim Tarihi 25 Haziran 2025</mixed-citation>
                    </ref>
                                    <ref id="ref9">
                        <label>9</label>
                        <mixed-citation publication-type="journal">Evik AH, Aksoy Retornaz E ve Memiş Kartal P, Özel Ceza Hukuku Cilt VIII Ekonomi, Sanayi ve Ticarete İlişkin Suçlar ve Bilişim Alanındaki Suçlar (1. Baskı, On İki Levha Yayıncılık, 2021)</mixed-citation>
                    </ref>
                                    <ref id="ref10">
                        <label>10</label>
                        <mixed-citation publication-type="journal">Centel N, Zafer H, Çakmut Ö, Kişilere Karşı İşlenen Suçlar, (4. Baskı, Beta, 2017) Cilt I.</mixed-citation>
                    </ref>
                                    <ref id="ref11">
                        <label>11</label>
                        <mixed-citation publication-type="journal">Colonial Pipeline ‘Media Statement Update: Colonial Pipeline System Disruption’ (Colonial Pipeline, 17 May 2021) &lt;https://www.colpipe.com/news/press-releases/media-statement-colonial-pipeline-system-disruption&gt; (or) &lt;https://perma.cc/JYV4-Q432&gt; Erişim Tarihi 14 Haziran 2025</mixed-citation>
                    </ref>
                                    <ref id="ref12">
                        <label>12</label>
                        <mixed-citation publication-type="journal">Council on Criminal Justice, ‘The Implications of AI for Criminal Justice’ (CCJ, October 2024) &lt;https://counciloncj.org/the-implications-of-ai-for-criminal-justice/&gt; Erişim Tarihi 12 August 2025</mixed-citation>
                    </ref>
                                    <ref id="ref13">
                        <label>13</label>
                        <mixed-citation publication-type="journal">Çamlıca B, Yapay Zekânın Ceza Sorumluluğu ve Kişilik Tartışmaları (1. Baskı, Yetkin 2022)</mixed-citation>
                    </ref>
                                    <ref id="ref14">
                        <label>14</label>
                        <mixed-citation publication-type="journal">Ell M, ‘2024 UK Cyber Security Breaches Survey’ (Gov.Uk, 09 April 2024) &lt;https://www.gov.uk/government/statistics/cyber-security-breaches-survey-2024/cyber-security-breaches-survey-2024&gt; Erişim Tarihi 20 Mayıs 2025</mixed-citation>
                    </ref>
                                    <ref id="ref15">
                        <label>15</label>
                        <mixed-citation publication-type="journal">European Parliament, Understanding cybercrime (EPRS Briefing, 2024) https://www.europarl.europa.eu/RegData/etudes/BRIE/2024/760356/EPRS_BRI%282024%29760356_EN.pdf Erişim Tarihi 25 Haziran 2025</mixed-citation>
                    </ref>
                                    <ref id="ref16">
                        <label>16</label>
                        <mixed-citation publication-type="journal">European Commission, Proposal for a Regulation of the European Parliament and of the Council on adapting non-contractual civil liability rules to artificial intelligence (AI Liability Directive) (COM (2022) 496 final).</mixed-citation>
                    </ref>
                                    <ref id="ref17">
                        <label>17</label>
                        <mixed-citation publication-type="journal">&lt;https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:52022PC0496&gt; Erişim Tarihi 25 Haziran 2025</mixed-citation>
                    </ref>
                                    <ref id="ref18">
                        <label>18</label>
                        <mixed-citation publication-type="journal">European Parliament and Council, ‘Regulation (EU) 2024/1689 on laying down harmonised rules on artificial intelligence (Artificial Intelligence Act)’ [2024] OJ L212/1. &lt;https://eur-lex.europa.eu/eli/reg/2024/1689/oj/eng&gt; Erişim Tarihi 25 Haziran 2025</mixed-citation>
                    </ref>
                                    <ref id="ref19">
                        <label>19</label>
                        <mixed-citation publication-type="journal">Federal Trade Commission ‘New FTC Data Show a Big Jump in Reported Losses to Fraud to $12.5 Billion in 2024’ (Federal Trade Commission, 10 March 2025) &lt;https://www.ftc.gov/news-events/news/press-releases/2025/03/new-ftc-data-show-big-jump-reported-losses-fraud-125-billion-2024&gt; Erişim Tarihi 3 Temmuz 2025</mixed-citation>
                    </ref>
                                    <ref id="ref20">
                        <label>20</label>
                        <mixed-citation publication-type="journal">Gless S and Weigend T, ‘Intelligente Agenten und das Strafrecht’ (2014) 126(3) Zeitschrift für die gesamte Strafrechtswissenschaft, 561, 591</mixed-citation>
                    </ref>
                                    <ref id="ref21">
                        <label>21</label>
                        <mixed-citation publication-type="journal">Gray J, An Efficient Remedy for the Distress of Nations (William Tait, Edinburgh 1842)</mixed-citation>
                    </ref>
                                    <ref id="ref22">
                        <label>22</label>
                        <mixed-citation publication-type="journal">Hafızoğulları Z ve Özen M, Türk Ceza Hukuku Özel Hükümler Kişilere Karşı Suçlar (6. Baskı, US-A, 2017) 406</mixed-citation>
                    </ref>
                                    <ref id="ref23">
                        <label>23</label>
                        <mixed-citation publication-type="journal">Hafızoğulları, Z ve Özen M. “Özel Hayata ve Hayatın Gizli Alanına Karşı Suçlar”. Ankara Barosu Dergisi, (Temmuz 2009) 9-22</mixed-citation>
                    </ref>
                                    <ref id="ref24">
                        <label>24</label>
                        <mixed-citation publication-type="journal">Hatfield JM, ‘Social Engineering in Cybersecurity: The Evolution Of A Concept’(2018) 73 Computers &amp; Security 102, 113</mixed-citation>
                    </ref>
                                    <ref id="ref25">
                        <label>25</label>
                        <mixed-citation publication-type="journal">Jackson JE, ‘Fraud Masters: Professional Credit Card Criminals and Crime, Spring’ (1994) 19(1) Criminal Justice Review 24, 55</mixed-citation>
                    </ref>
                                    <ref id="ref26">
                        <label>26</label>
                        <mixed-citation publication-type="journal">Karagöz MC, Bilişim Sistemleri Teorisine Giriş İle Bilişim Sistemini Engelleme, Bozma, Verileri Yok Etme veya Değiştirme Suçu (1. Baskı, On İki Levha 2020)</mixed-citation>
                    </ref>
                                    <ref id="ref27">
                        <label>27</label>
                        <mixed-citation publication-type="journal">Keklik R, ‘Özel Hayatın Gizliliğini İhlal Suçu’ (Doktora tezi, Selçuk Üniversitesi 2011)</mixed-citation>
                    </ref>
                                    <ref id="ref28">
                        <label>28</label>
                        <mixed-citation publication-type="journal">Kilovaty I, ‘Cybersecuring the Pipeline’ (2023) 60(3) Houston Law Review 605, 651.</mixed-citation>
                    </ref>
                                    <ref id="ref29">
                        <label>29</label>
                        <mixed-citation publication-type="journal">Koca M ve Üzülmez İ, Türk Ceza Hukuku Özel Hükümler (4. Baskı, Adalet 2017)</mixed-citation>
                    </ref>
                                    <ref id="ref30">
                        <label>30</label>
                        <mixed-citation publication-type="journal">Koca M ve Üzülmez İ, ‘Kişisel verilerin kaydedilmesi suçu (TCK m. 135)’. Dokuz Eylül Üniversitesi Hukuk Fakültesi Dergisi, Prof. Dr. Durmuş TEZCAN’a Armağan, 2019, 69-93</mixed-citation>
                    </ref>
                                    <ref id="ref31">
                        <label>31</label>
                        <mixed-citation publication-type="journal">Kunter N, Yenisey F ve Nuhoğlu A, Muhakeme Hukuku Dalı Olarak Ceza Muhakemesi Hukuku İkinci Kitap Hüküm Verme Görevi ve Ceza Muhakemesinin Yapısı (17. Baskı, Beta, 2010)</mixed-citation>
                    </ref>
                                    <ref id="ref32">
                        <label>32</label>
                        <mixed-citation publication-type="journal">Kuzgun İ. Türk Ceza Hukuku Açısından Mobbing. (On İki Levha Yayıncılık, 2020)</mixed-citation>
                    </ref>
                                    <ref id="ref33">
                        <label>33</label>
                        <mixed-citation publication-type="journal">Küzeci, Elif: Kişisel Verilerin Korunması, Ankara, 2010</mixed-citation>
                    </ref>
                                    <ref id="ref34">
                        <label>34</label>
                        <mixed-citation publication-type="journal">Laudon KC and Laudon JP, Management Information Systems: Managing the Digital Firm (16th edn, Pearson 2020)</mixed-citation>
                    </ref>
                                    <ref id="ref35">
                        <label>35</label>
                        <mixed-citation publication-type="journal">Marc Santora and Julian E. Barnes, ‘Fake Video Shows Zelensky Telling Troops to Surrender’ The New York Times (16 March 2022)</mixed-citation>
                    </ref>
                                    <ref id="ref36">
                        <label>36</label>
                        <mixed-citation publication-type="journal">&lt;https://www.nytimes.com/2022/03/16/world/europe/zelensky-deepfake-video.html&gt; Erişim Tarihi 14 Haziran 2025</mixed-citation>
                    </ref>
                                    <ref id="ref37">
                        <label>37</label>
                        <mixed-citation publication-type="journal">Krotofil M ve Larsen J, ‘Sociotechnical Attack Framework: Understanding the Real Impact of Cyber Attacks on Industrial Control Systems’ (2017) 12 https://ics-cert.us-cert.gov Erişim Tarihi 10 Haziran 2025</mixed-citation>
                    </ref>
                                    <ref id="ref38">
                        <label>38</label>
                        <mixed-citation publication-type="journal">Marini G, ‘Truffa’(1976) XIX Novissimo Digesto Italiano, 864-888</mixed-citation>
                    </ref>
                                    <ref id="ref39">
                        <label>39</label>
                        <mixed-citation publication-type="journal">Mitnick KD and Simon WL, The Art of Deception: Controlling the Human Element of Security (Wiley Publishing 2002)</mixed-citation>
                    </ref>
                                    <ref id="ref40">
                        <label>40</label>
                        <mixed-citation publication-type="journal">National Highway Traffic Safety Administration, ‘Automated Vehicles for Safety’ &lt;https://www.nhtsa.gov/vehicle-safety/automated-vehicles-safety?&gt; Erişim Tarihi 8 Ağustos 2025</mixed-citation>
                    </ref>
                                    <ref id="ref41">
                        <label>41</label>
                        <mixed-citation publication-type="journal">National Transportation Safety Board, Highway Accident Report- Collision Between Vehicle Controlled by Developmental Automated Driving System and Pedestrian Tempe, Arizona (NTSB, 19 November 2019)</mixed-citation>
                    </ref>
                                    <ref id="ref42">
                        <label>42</label>
                        <mixed-citation publication-type="journal">&lt;https://www.ntsb.gov/investigations/accidentreports/reports/har1903.pdf&gt; Erişim Tarihi 8 Ağustos 2025</mixed-citation>
                    </ref>
                                    <ref id="ref43">
                        <label>43</label>
                        <mixed-citation publication-type="journal">Toroslu N, Ceza Hukuku Özel Kısım (9. Baskı, Savaş 2018).</mixed-citation>
                    </ref>
                                    <ref id="ref44">
                        <label>44</label>
                        <mixed-citation publication-type="journal">OKeefe A, ‘Navigating AI Laws And Regulations Across Practice Areas’ (Thomson Reuters, 28 July 2025) &lt;https://legal.thomsonreuters.com/blog/navigating-ai-laws-and-regulations-across-practice-areas/&gt; Erişim Tarihi 8 Ağustos 2025</mixed-citation>
                    </ref>
                                    <ref id="ref45">
                        <label>45</label>
                        <mixed-citation publication-type="journal">Özbek VÖ, Doğan K, Bacaksız P ve Tepe İ, Türk Ceza Hukuku Özel Hükümler (Genişletilmiş ve</mixed-citation>
                    </ref>
                                    <ref id="ref46">
                        <label>46</label>
                        <mixed-citation publication-type="journal">Güncellenmiş 12. Baskı, Seçkin 2017)</mixed-citation>
                    </ref>
                                    <ref id="ref47">
                        <label>47</label>
                        <mixed-citation publication-type="journal">Özgenç İ, Türk Ceza Hukuku Genel Hükümler (14. Baskı, Seçkin 2018)</mixed-citation>
                    </ref>
                                    <ref id="ref48">
                        <label>48</label>
                        <mixed-citation publication-type="journal">Özgenç İ, Türk Ceza Hukuku Genel Hükümler (18. Baskı, Seçkin 2022)</mixed-citation>
                    </ref>
                                    <ref id="ref49">
                        <label>49</label>
                        <mixed-citation publication-type="journal">Özsoy N, ‘Yargıtay Kararları Işığında Doğrudan Bilişim Suçları’ (2019) 1(2) Yaşar Hukuk Dergisi 295,352</mixed-citation>
                    </ref>
                                    <ref id="ref50">
                        <label>50</label>
                        <mixed-citation publication-type="journal">Özsunay E, Gerçek Kişilerin Hukuki Durumu (5. Baskı, Der Yayınları, 1982)</mixed-citation>
                    </ref>
                                    <ref id="ref51">
                        <label>51</label>
                        <mixed-citation publication-type="journal">Riehle C, ‘Europol Report Criminal Use of Deepfake Technology’ (Eucrim, 9 May 2022) &lt;https://eucrim.eu/news/europol-report-criminal-use-of-deepfake-technology/&gt; Erişim Tarihi 18 Mayıs 2025</mixed-citation>
                    </ref>
                                    <ref id="ref52">
                        <label>52</label>
                        <mixed-citation publication-type="journal">Sachoulidou A, ‘AI Systems and Criminal Liability A Call for Action’ (2024) 11(1) Oslo Law Review 1,10</mixed-citation>
                    </ref>
                                    <ref id="ref53">
                        <label>53</label>
                        <mixed-citation publication-type="journal">Schmitt M and Flechais I ‘Digital deception: generative artificial intelligence in social engineering and phishing’ (2024) 57(324) Artifical Intelligence Review 2, 23</mixed-citation>
                    </ref>
                                    <ref id="ref54">
                        <label>54</label>
                        <mixed-citation publication-type="journal">Sèdes F and Degrace J, ‘Social Engineering and Security: From Human Vulnerabilities to Malicious Threats’ (20th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Paris, October 2024)</mixed-citation>
                    </ref>
                                    <ref id="ref55">
                        <label>55</label>
                        <mixed-citation publication-type="journal">Singh G, ‘Offending Sentiments, A Developing Ground Limiting Free Speech’ (Live Law, 20 June 2025) &lt;https://www.livelaw.in/articles/offending-sentiments-developing-ground-limiting-free-speech-295364&gt; Erişim Tarihi 20 Haziran 2025</mixed-citation>
                    </ref>
                                    <ref id="ref56">
                        <label>56</label>
                        <mixed-citation publication-type="journal">Solon O, ‘The future of fake news: don’t believe everything you read, see or hear’ (The Guardian, 26 Jul 2017) &lt;https://www.theguardian.com/technology/2017/jul/26/fake-news-obama-video-trump-face2face-doctored-content&gt; Erişim Tarihi 18 Mayıs 2025</mixed-citation>
                    </ref>
                                    <ref id="ref57">
                        <label>57</label>
                        <mixed-citation publication-type="journal">Soyaslan D, Ceza Hukuku, Özel Hükümler, (10. Baskı., Ankara, 2014)</mixed-citation>
                    </ref>
                                    <ref id="ref58">
                        <label>58</label>
                        <mixed-citation publication-type="journal">Stupp C, ‘Fraudsters Used AI to Mimic CEO’s Voice in Unusual Cybercrime Case’ Wall Street Journal (30 August 2019) &lt;https://www.wsj.com/articles/fraudsters-use-ai-to-mimic-ceos-voice-in-unusual-cybercrime-case-11567157402&gt; Erişim Tarihi 14 June 2025</mixed-citation>
                    </ref>
                                    <ref id="ref59">
                        <label>59</label>
                        <mixed-citation publication-type="journal">Syafitri W, Shukur Z, Mokhtar UA, Sulaiman R and Ibrahim MA, ‘Social Engineering Attacks Prevention: A Systematic Literature Review’ (2022) 10 IEEE Access 39325–39352</mixed-citation>
                    </ref>
                                    <ref id="ref60">
                        <label>60</label>
                        <mixed-citation publication-type="journal">Kukreja T, ‘Deepfakes as a Tool for Criminal Activity’ (2025) 5(4) Jus Corpus Law Journal  224, 241</mixed-citation>
                    </ref>
                                    <ref id="ref61">
                        <label>61</label>
                        <mixed-citation publication-type="journal">Tezcan D, Erdem MR, Önok RM, Teorik ve Pratik Ceza Özel Hukuku (15. Baskı, Seçkin, 2017)</mixed-citation>
                    </ref>
                                    <ref id="ref62">
                        <label>62</label>
                        <mixed-citation publication-type="journal">The Kid &amp; Co. and The Shadow, ‘More on trashing,’ (1984) 1(9) 2600 Magazine: The Hacker’s Quarterly</mixed-citation>
                    </ref>
                                    <ref id="ref63">
                        <label>63</label>
                        <mixed-citation publication-type="journal">&lt;http://www.hackcanada.com/ice3/2600/2600_01-9_p50.txt&gt; Erişim Tarihi 20 Temmuz 2025</mixed-citation>
                    </ref>
                                    <ref id="ref64">
                        <label>64</label>
                        <mixed-citation publication-type="journal">US Cybersecurity and Infrastructure Security Agency (CISA), ‘Social Engineering Attacks’ &lt;https://www.cisa.gov&gt; Erişim Tarihi 11 Haziran 2025</mixed-citation>
                    </ref>
                                    <ref id="ref65">
                        <label>65</label>
                        <mixed-citation publication-type="journal">Wang Z, Sun L and Zhu H, “ Defining Social Engineering in Cybersecurity”, (2020) 8 IEEE Access, 85094-85115</mixed-citation>
                    </ref>
                                    <ref id="ref66">
                        <label>66</label>
                        <mixed-citation publication-type="journal">Yaşar O, Gökcan HT ve Artuç M, Yorumlu-Uygulamalı Türk Ceza Kanunu Cilt IV (1. Baskı, Adalet, 2010)</mixed-citation>
                    </ref>
                            </ref-list>
                    </back>
    </article>
