Background Image
Previous Page  384 / 617 Next Page
Information
Show Menu
Previous Page 384 / 617 Next Page
Page Background

TBB Dergisi 2015 (120)

Servet YETİM

383

Murray Ryan Patrick, “Myspace-ing is Not a Crime: Why Breaching Terms of Ser-

vice Agreements Should Not Implicate the Computer Fraud and Abuse Act”,

http://digitalcommons.lmu.edu/cgi/viewcontent.cgi?article=1555&context=elr

,

(E.T.22.12.2014)

“MySpace.com

Terms

of

Use

Agreement”,

https://web.archive.org/

web/20061117093857

/http://www1.myspace.com/index.cfm?fuseaction=misc.

terms June 15, 2006, (E.T.28.11:2014);

http://www.dmlp.org/threats/united-

states-v-drew, (E.T.22.11.2014)

Nebil Füsun S, “Siber Zorbalığın Önlenmesinde, Ebeveynler ve Okullara Kadar 3.

Şahıslara da Görev Düşüyor-2”,

http://www.turk.internet.com/portal/yaziyaz.

php?yaziid=35510, (E.T.17.11.2014)

Nebil Füsun S, “Siber Zorbalık Doğrudan ya da Dolaylı Gerçekleşebiliyor – 1”, http://

www.turk-internet.com/portal/yazigoster.php?yaziid=35509

, (E.T.22.11.2014)

Padilla Richard, “Chaos Computer Club Demonstrates How to Reproduce Fin-

gerprints Using Public Photos”,

http://www.macrumors.com/2014.12/29/ccc-

reproduce-fingerprints-public-photos/, (30.12.2014)

Palfrey John, “Enhancing Child Safety And Online Technologies:Final Report Of The

Internet Safety Technical Task Force To The Multi-State Working Group On So-

cial Networking Of State Attorneys General Of The United States”, http://cyber.

law.harvard.edu/sites/cyber.law.harvard.edu/files/ISTTF_Final_Report.pdf

,

(22.11.2014)

“Revised Children’s Online Privacy Protection Rule Goes Into Effect Today”, http://

www.ftc.gov/news-events/press-releases/2013/07/revised-childrens-online-

privacy-protection-rule-goes-effect, (E.T.22.11.2014)

“Right to be forgotten: have you ever wanted something deleted from the web?”,

http://www.theguardian.com/technology/2014/may/13/right-to-be-forgotten-

have-you-ever-wanted-something-deleted-from-the-web-google, (E.T.30.11.2014)

Sacco Dena T, Silbaugh Katharine, Corredor Felipe, Casey June, Doherty Davis, “An

Overview of State Anti-Bullying Legislation and Other Related Laws

Schneider Shari Kessel, Smith Erin, (E.T.22.11.2014)

Sekander Yousaf, “Perception Engineering with Social Media”, http://www.

rocketmill.co.uk/the-use-of-social-media-for-perception-management,

(E.T.01/01.2015)

“Six Unforgettable CyberBullying Cases”,

http://nobullying.com/six-unforgettable-

cyber-bullying-cases/, (E.T.17/05.2014)

Snyder Thomas D, Morgan, Rachel E., Rathbun, Amy., Kemp, Jana., Robers, Simone.,

“Indicators of School Crime and Safety”,

http://nces.ed.gov/pubs2014/2014042.

pdf, (E.T.17.11.2014)

“Social Media and Cyberbullying, Implementation of School-Based Prevention Ef-

forts and Implications for Social Media Approaches”,

http://hhd.org/sites/ hhd.org/files/Social_Media_and_Cyberbullying_FinalReport-EDC_0.pdf

,

(E.T.03.01.2015)

Soyaslan Doğan, Ceza Hukuku Özel Hükümler, Yetkin Yayınları, 8. Baskı, Ankara

2010

Spinello Richard A, Anonymous Speech, Cyberethics Morality and Law in Cyberspa-

ce, Jones&Barlett, Fourt Edition, Burlington 2011

Spotts Alli, Lazzer De, “Faceblur—Facebook, Therapists, and Our Boundaries”,

Family

Therapy Magazine,

Alexandria 2013, Vol.12, No.2