

TBB Dergisi 2015 (120)
Servet YETİM
383
Murray Ryan Patrick, “Myspace-ing is Not a Crime: Why Breaching Terms of Ser-
vice Agreements Should Not Implicate the Computer Fraud and Abuse Act”,
http://digitalcommons.lmu.edu/cgi/viewcontent.cgi?article=1555&context=elr,
(E.T.22.12.2014)
“MySpace.comTerms
of
Use
Agreement”,
https://web.archive.org/web/20061117093857
/http://www1.myspace.com/index.cfm?fuseaction=misc.terms June 15, 2006, (E.T.28.11:2014);
http://www.dmlp.org/threats/united-states-v-drew, (E.T.22.11.2014)
Nebil Füsun S, “Siber Zorbalığın Önlenmesinde, Ebeveynler ve Okullara Kadar 3.
Şahıslara da Görev Düşüyor-2”,
http://www.turk.internet.com/portal/yaziyaz.php?yaziid=35510, (E.T.17.11.2014)
Nebil Füsun S, “Siber Zorbalık Doğrudan ya da Dolaylı Gerçekleşebiliyor – 1”, http://
www.turk-internet.com/portal/yazigoster.php?yaziid=35509, (E.T.22.11.2014)
Padilla Richard, “Chaos Computer Club Demonstrates How to Reproduce Fin-
gerprints Using Public Photos”,
http://www.macrumors.com/2014.12/29/ccc-reproduce-fingerprints-public-photos/, (30.12.2014)
Palfrey John, “Enhancing Child Safety And Online Technologies:Final Report Of The
Internet Safety Technical Task Force To The Multi-State Working Group On So-
cial Networking Of State Attorneys General Of The United States”, http://cyber.
law.harvard.edu/sites/cyber.law.harvard.edu/files/ISTTF_Final_Report.pdf,
(22.11.2014)
“Revised Children’s Online Privacy Protection Rule Goes Into Effect Today”, http://
www.ftc.gov/news-events/press-releases/2013/07/revised-childrens-online-
privacy-protection-rule-goes-effect, (E.T.22.11.2014)
“Right to be forgotten: have you ever wanted something deleted from the web?”,
http://www.theguardian.com/technology/2014/may/13/right-to-be-forgotten-have-you-ever-wanted-something-deleted-from-the-web-google, (E.T.30.11.2014)
Sacco Dena T, Silbaugh Katharine, Corredor Felipe, Casey June, Doherty Davis, “An
Overview of State Anti-Bullying Legislation and Other Related Laws
Schneider Shari Kessel, Smith Erin, (E.T.22.11.2014)
Sekander Yousaf, “Perception Engineering with Social Media”, http://www.
rocketmill.co.uk/the-use-of-social-media-for-perception-management,(E.T.01/01.2015)
“Six Unforgettable CyberBullying Cases”,
http://nobullying.com/six-unforgettable-cyber-bullying-cases/, (E.T.17/05.2014)
Snyder Thomas D, Morgan, Rachel E., Rathbun, Amy., Kemp, Jana., Robers, Simone.,
“Indicators of School Crime and Safety”,
http://nces.ed.gov/pubs2014/2014042.pdf, (E.T.17.11.2014)
“Social Media and Cyberbullying, Implementation of School-Based Prevention Ef-
forts and Implications for Social Media Approaches”,
http://hhd.org/sites/ hhd.org/files/Social_Media_and_Cyberbullying_FinalReport-EDC_0.pdf,
(E.T.03.01.2015)
Soyaslan Doğan, Ceza Hukuku Özel Hükümler, Yetkin Yayınları, 8. Baskı, Ankara
2010
Spinello Richard A, Anonymous Speech, Cyberethics Morality and Law in Cyberspa-
ce, Jones&Barlett, Fourt Edition, Burlington 2011
Spotts Alli, Lazzer De, “Faceblur—Facebook, Therapists, and Our Boundaries”,
Family
Therapy Magazine,
Alexandria 2013, Vol.12, No.2