Document 13317340

advertisement
Proceedings of 11th International Business and Social Science Research Conference
8 - 9 January, 2015, Crowne Plaza Hotel, Dubai, UAE. ISBN: 978-1-922069-70-2
Informatics Crimes and Intellectual Property in Knowledge
Management
Zehra Alakoç Burma*
In the course of information society, our social and public life have
changed. There are no longer national boundaries, and from now on, there
are different lifestyles. With the internet, the classical perceptions have
changed from firm to management, from marketing to sales, from human
resources to knowledge management, from public sector to private sector,
from entairtenment to shopping. Knowledge has become the most
important instrument of competition. Knowledge management and
knowledge security have become one of the most important issues in
recent years. As a result of fascinating technological advances and internet,
new types of crime have emerged, and the criminals have begun to use the
innovations and facilities of technology. The increase of these international
crimes and their diversion to different areas has also introduced
international alliances and agreements. The scope of this study includes
the concept of knowledge management and the knowledge security as one
of the most important stages of it. In the further sections, knowledge and
cyber crimes’ mental possession have been defined and dealt with from the
legal aspect. National and international agreements and constructions in
this issue have been researched. In the conclusion part, a study on what
can be added to present situation of knowledge security and how we can
deal with the knowledge management and security of the future have been
dealt with.
JEL Codes: D8-D83, K3-K33, M1-M15, O3-O32-O33
1. Introduction
The rapid growth of technology, computers, internet, intranet, extranet and united global
networks has transformed today‟s society into the knowledge society. The contribution to
the scientific knowledge which was made in the last five years is as much as the
contribution made in the history of the mankind (Barutçugil, 2002). The internet operations
and global electronic management and commercial systems have made crucial changes
in the administration and management of today‟s systems (Laudon & Laudon, 1999).
Knowledge Management is defined as increasing the value of any firm in accordance with
its objectives, bridging the gap of its development with the rivals, gathering all kinds of
internal and external information/knowledge sources in order to be in conformity with its
own institutional activities, arranging this information/knowledge and giving it to each
employees, and hence contributing to the individual and institutional productivity
(Odabaş,2005).
In terms of management science, management of knowledge is a process which
drastically changes the management understanding. In terms of institutions, knowledge
management is an administrative and strategic tool. By using this tool, institutions make
sound decisions, accurately predict the future, effectively communicate within the
institutions and with outside, give standard service or product, and find solutions to the
existing problems and problems which can appear in future. Knowledge management
plays a crucial role in decision making process since it both shortens decision making
process and facilitates it.
*Zehra Alakoç Burma, Mersin Vocational School, Mersin University, Turkey, E-mail: zalakoc@mersin.edu.tr
Proceedings of 11th International Business and Social Science Research Conference
8 - 9 January, 2015, Crowne Plaza Hotel, Dubai, UAE. ISBN: 978-1-922069-70-2
In order to implement knowledge management effectively in an organization, a strong
infrastructure is essential (Tiwana, 2000). The infrastructure of knowledge management
consists of five main components: technology, leadership, institutional culture, intellectual
capital, and structure of organization.
In knowledge management process, there are a lot of stages such as finding, collecting,
arranging, evaluating knowledge, sharing it with employees, making shared knowledge
productive, putting the knowledge which comes from productivity into a knowledge pool
and evaluating this knowledge system. Beijerse (2000) lists the essential stages in
knowledge management system as follows:









Identify the necessary knowledge
Identify the accessible knowledge
Define knowledge gap
Develop knowledge
Acquire knowledge
Form knowledge channel
Provide knowledge sharing
Make use of knowledge
Evaluate the used knowledge
2. From Knowledge Management To Informatics And Concept Of
Informatics Law
Informatics is an occupational discipline which is based on keeping and transferring the
knowledge (Ana Britannica, 1986). To be more precise, it has been identified as the
science process of the knowledge in regular and cognitive way which is the support of the
science which human beings use for the communication in technical, economic and social
areas, particularly through electronically devices (Artuk & Gökçen & Yenidünya, 2009;
Yazıcıoğlu, 1997; Köksal, 1991). The techniques of keeping knowledge, access
paradigms, processing and transferring knowledge have been identified as the research
areas of this field. In addition, the techniques related to the arrangement of all kinds of
industrial productions and those related to the design, improvement and production of all
means used in knowledge and knowledge access paradigms have been included in this
field (Kurt, 2005).
Law is the pack of rules that stem from the need of order and it is a body of systems,
which evaluates human behaviour and is comprised of norms and rules providing
solutions to the clash of heads of benefits. Law does not indicate how human beings
actually behave in society but shows how they should behave and exists to be obeyed and
to be applied.
As in all fields, technological advances have started to change social life in the field of law
as well. These are the relations and interactions among human beings, and the violations
that emerge during this interaction go into the scope of law. Law is a living system and it
renews itself and changes in line with these changes in the social life.
While technological advances offer new legal benefits on the one hand, on the other hand
they create new violation areas, in other words, besides the benefits it provides,
“technological revolution” causes diversions from the norms and leads to new types of
crimes (Yazıcıoğlu,1999).
Proceedings of 11th International Business and Social Science Research Conference
8 - 9 January, 2015, Crowne Plaza Hotel, Dubai, UAE. ISBN: 978-1-922069-70-2
As in all new technological inventions, with the widespread networking, the emergence
and increase of violations is inevitable. Thus, the concept of “informatics crimes” has
emerged. The law makers of many countries have responded to this situation and
arranged illegal actions through cyber systems as the crime types and took legal
measures (Dülger, 2004).
3. Knowledge Security
Four important changes that have occurred in the world have been effective in the
conditions of management conditions. The first change is the global economy that has
emerged effectively; the second change is the industrial economy and the transition to
knowledge society from the industrial society to knowledge society; the third change is
seen in the organizational scheme of administrations and in the way of administration; the
fourth and the last change is the emergence of digital managements (Laudon & Laudon,
2002).
Digital firms are the firms in which almost all-important transactions with the suppliers and
workers are conducted digitally. These firms have achieved benefits of competition
against other firms with the advantages of easier and faster availability, meeting the
requirements of the customers with lower costs and faster ways thanks to technology.
Nowadays, firms are becoming digital. With globalization, there are no longer national and
international boundaries, and there are increases in digital firms among fields like emarketing, e-selling, e-production, e-education, e-service, e-human e-resources, e-state,
e- library, e-gambling, e-marriage.
Parallel to these developments, knowledge security has become as important as
knowledge management. Knowledge security is the process of preventing the use of
information; the revealing of information; the changing of information without permission
(Wikipedia, 2014)
The employees, customers, financial situations, products, researches, strategies and new
products of the firms are all the sources of information stores just like computer and its
parts, or the information is provided via today‟s modern communication devices like cell
phone. It is time to consider the results of a loss of information, which is obtained by rivals,
because of security gap in information.
Knowledge security is not only important for firms but also important for states. Most of the
leaders of the state, the governments, the army institutions, military abilities, army,
research and strategic state institutions, financial institution‟s, hospitals and private
hospitals are gathered and stored in electronically computers, and then they are
transmitted to the other computers and users through web. What would be the
consequence of obtaining such kind of knowledge by the rival countries? Today, we have
such samples, and we can give similar examples like this.
In order to highlight the importance of topic, I need to attach importance to two crucial
security gaps in recent years. These are Stuxnet and Dragonfly examples.
Stuxnet computer virus was first detected by a Russian firm named as Virus BlockAda in
June of 2010. At the first sight, it was understood that it was not a standard virus with its
complex structure. The worms extremely complex structure, the techniques it uses made
people realize that cyber war, which has been a scenario for years, is real. The reason is
that the aim of that virus was to obtain SCADA(Siemens supervisory control and data
acquisition) systems which is used for the control of water resources, petrol platforms,
Proceedings of 11th International Business and Social Science Research Conference
8 - 9 January, 2015, Crowne Plaza Hotel, Dubai, UAE. ISBN: 978-1-922069-70-2
energy centrals and other industrial places. The virus did its mission my converting the
codes and designs of the available projects in the infected computer After this, the
program used to upload its own codes by the interface to PLC(Programmable Logic
Controllers). These codes cannot be seen even when the all codes in PLCs need to be
examined. What make this virus interesting is the countries in which it infected the
computers. According to sources, it was common in Iran, Indonesia and India (Pamuk,
2010). The most interesting about the virus is that there was a claim about the virus.
According to this, the virus was responsible for the explosion which caused 36 people to
die including Hasan Tahrani Mukaddem, who was responsible for missile studies. The
explosion was in Tehran, and in the military region of Alghadir which belongs to Iran
Revolutionary Guards in 12nd of November (Sabah, 2011)
Dragonfly was announced through the famous computer security database firm Symantec.
The firm announced that people who use their software‟s are not in danger through their
webpage. The firm used “Dragonfly: Energy Spy” The other information in the website
states that “Dragonfly, which is a cyber-spy group, has the aims for energy sector. Since
2013, the group has focused on energy sector particularly in Northern America and
Europe. The group follows the same path of Stuxnet threat, and has aims for the
institutions which use industrial control systems (ICS). Our examinations illustrate that it
has vast resources, and it can use many ways to be a spy in a global organization.
Though its main aim is being spy, it can also prevent obtaining energy sources of Europe
through sabotage (Symantec, 2014).
From now on, recently, knowledge management has widened in new fields and extremely
developed. To be expert on this issue or to choose in career, there are new fields of study
like Information System Inspection and Job Sustainability Planning.
Today, ISO 27001 Information Security Administration system is used internationally. It is
a model which is used for the infrastructure of increasing knowledge and its security.
Thanks to this system, institutions can identify their infrastructure, and they can analyze
the possible risks and their controls for those risks (AndBelgelendirme, 2014).
4. Informatics and Informatics Crimes
Today, computers are not only a tool, which eases our lives, but also a tool for committing
informatics crime. At this point, there is a informatics crime concept. Informatics crime and
computer crime should be distinguished well. In order to distinguish the concepts, the
structure, the properties, and processes of crimes should be examined. The scope of
informatics crime includes the crimes in both information technologies and communication
technologies. These are crimes committed via telephone or fax, selling pirate cd, using
computer program without license are the crimes based on information. Computer crime is
any illegal act, which is done via any computer system or web, or the distribution of
properties with this data. Informatics crime does not only include computer crime but also
includes a field including communication crimes.
The most important effect in the increase of those crimes is with the emergence of
Internet. Via internet, our social and public life have changed; there are no longer national
boundaries and there are new lifestyles. With internet, the classical understanding of life
has changed in many fields, from education to trade, from government to private sector,
from entertainment to shopping. Because of this, the new crime types have appeared, and
the criminals have started to use the new and easy things that technology has brought.
Proceedings of 11th International Business and Social Science Research Conference
8 - 9 January, 2015, Crowne Plaza Hotel, Dubai, UAE. ISBN: 978-1-922069-70-2
Internet provides many access opportunities, makes the national boundaries ineffective,
and thus it makes the control of governments difficult. Furthermore, it provides easy and
cheap access, limitless information potential, strengthens the interaction perspective, and
provides more check opportunities, and it can do its functions independent from the
operation platform (windows, linux etc.) (Beceni & Uçkan, 2004).
By providing the free transaction of information, it provides the communication opportunity
equally; therefore, everybody can know information, which was previously in the
dominance of small groups. An individual can do huge campaigns, which can make firms
have problems through the internet; people from different environments can come
together and do their duties. Thus, the cost of production decreases. In some sectors,
workforce is encouraged to work at home. Therefore, all of this leads to big radical
changes in the structure of the society (Bozkurt, 2000).
Perhaps, the most important thing which distinguishes informatics crime from classical
crime is that there is no concrete clue (modus operandi) after committing crime
(Değirmenci, 2002). Therefore, different from classical crime, it requires special expertise
and investigation procedure. In many countries, there are not laws on this aspect and they
need urgent legal regulations.
It is easy to commit informatics crime, but it is difficult to find guilty ones. In the
globalization meetings done in Seattle-America, in which developed countries attended,
there have been spontaneous intensive protests in a well-organized way (Sınar, 2004).
Depending on the rapidly grown technology, computer and cyber-crimes vary. There will
be solutions for which decisional law or crime typology will be suitable. The big question is
that whether a password of a credit card is stolen and money is withdrawn in another
branch, it should be an act of informatics crime or robbery (booksGoogle, 2010). With the
same rationality, what will be the identification and punishment of a person, who enters euniversity on behalf of another person and sends homework? Is it about educational
discipline or informatics crime?
A computer virus named as love bug spreaded through 100 million computers in June of
2000 within only 18 hours. It has been created by an 18 years old Philippine student, and
it has affected 10% of computers around the world (including the computers in Pentagon
and White House), and it caused 100 million dollars financial loss. Since the informatics
crime was not a crime according to laws in Philippines at that date that action was out of
punishment.
Information related to the security of a problem in some countries of their information
security in the name of their actions; in other countries the problem of information security.
We can give the common study (ECHELON System) of security services of 5 states (USA,
England, Canada, Australia, New Zealand) to illustrate the importance of this topic.
ECHOLON system controls all of the satellite-based communication including telephone
calls and electronic mail traffic via antenna around the world. The raw data obtained from
this system are described and the content of the communication is obtained. Though its
aim is to provide national security, the strategic information, the trade secrets and the
crucial information are all shared in an unright way. According to statistics, ECHELON
system controls the 90% of the world internet traffic (Turkish Informatics Law Council
Report Of The Working Group, 2004).
There are many difficulties in the fight against informatics crime. One of the difficulties is
that the criminals cannot be identified easily. There are many related things between
crime and the result of crime in terms of service providers, content providers, website
owners, and chats without signing up. Another point is the difficulty of finding the place
Proceedings of 11th International Business and Social Science Research Conference
8 - 9 January, 2015, Crowne Plaza Hotel, Dubai, UAE. ISBN: 978-1-922069-70-2
where the crime has been committed. To illustrate, if a person enters an internet branch or
commits a crime in e-trade, it is hard to find the place. In every event, there is a path to
find the clues for the victim from the victim's computer to the old events (Hewe, 2000).
Another topic is that there is a need for advanced technical knowledge, but the education
on this issue there are not adequate salaries in public institutions. One of the most
important things is that internet victims do not know what they have to know technically
such as security, and they do not pay the required attention. Criminal sanctions are the
biggest problem in required national and international regulations.
As a result, internet has to be controlled, and because of this, international structures have
occurred. The first international treaty regarding computer crimes and internet crimes is
Cyber Crime Treaty or The Treaty of Crimes Committed in Virtual Environment. The aim
of the treaty is to prevent the outlined crimes pointed by the member states and to
collaborate against cyber-crimes. With Cyber Crime Treaty, member states have to do
legal regulations about cyber-crime, and the definitions have been made and adapted.
The treaty has been designed in order to make observer countries like Canada, Japan,
and China participate actively. The treaty and explanatory report has been accepted in
109th session from ministers of European Council, has been opened for signature on
23.11.2001, and has become valid since 01.07.2004. The treaty aims to provide the
harmony of national laws and develop research techniques. 15 countries have accepted
and validated the treaty in 02.09.2006. 28 countries signed, but they did not validate.
Since 26.12.2012, it has been accepted by 38 countries in USA. In 10 th of November
2010, Turkey signed the treaty, and it has been applied since then.
5. Intellectual Property Rights and WIPO
In the related literature, the terms of law such as “intellectual rights”, “authors‟ royalties”,
“patent rights”, “patent possession rights” are used. With all these terms, what is meant is
the rights given to people over all kinds of intellectual labour or the products produced as
a result of this process (Şekerci & Yüksel, 2001).
We often encounter the terms such as patent, brand, illegally published books and CDs
and issues of any kind, the performance of a music piece without permission. The
problem attracts our attention in cases such as the apparent difference between the prices
of two items which we think have the same qualities, sometimes the fact that we prefer the
item we buy to have a specific brand or to be produced at a particular region, or the fact
that we copy a CD or a computer program thinking that it will cost less, and the marketing
of champagne with the name of sparkling wine by some producers (Yücekal, 2014).
The core of intellectual property is comprised of the items that creativity produces such as
music, literature, industrial design and scientific inventions. For these to become a part of
the intellectual property, it is necessary for the products to be shared with the others
except the producer without remaining at the thought phase, and to be used for
commercial purposes.
Intellectual property is classified as patent rights and authors‟ royalties. Patent rights
include technological inventions, models, commercial brands of goods and services,
industrial designs and geographical signs. What authors‟ royalties include is literature,
music, artistic products, audio-visual products, films, computer programs and software and
the rights of people who produce these.
Proceedings of 11th International Business and Social Science Research Conference
8 - 9 January, 2015, Crowne Plaza Hotel, Dubai, UAE. ISBN: 978-1-922069-70-2
Apart from this, these rights also include the secondary rights of the performers,
producers, publishers of this who remain out of the group of the main producers.
Industrial revolution, and related to this, developments and commercial concerns have
required international cooperation and legal arrangements in the field. As a result of the
studies conducted WIPO (World Intellectual Property Organization-WIPO) has was
founded with 179 state members.
Intellectual property products are not only used in national borders, but also in all
international areas; hence, intellectual property works of art need to be protected both
nationally and internationally. The first meeting with this purpose was held in Brussels with
the participation of 3000 authors and artists from 15 countries in 1858. Authors and artists
in Brussels meeting asked for the adoption and arrangement of intellectual property rights
(DPT, 1994). Despite the works which started in the past and having gone through many
changes so far, protective actions of intellectual property rights based on multifaceted
agreements have not been functional enough due to the fact that countries do not have
effective legal frameworks, even if they have, they cannot implement them, that they make
discrimination between the local and foreign, the absence of adequate rules and
mechanisms which force them to obey the sentences of treaty (Şekerci & Yüksel, 2001).
6. Conclusion
Today, as one of the places for committing crime, the crime activities are generally done
outside the borders of the country. This makes it difficult to identify and capture the guilty
ones. Since each county's legal system is different from each other and is not equal, it
causes the violation of many rights and legal features. Necessary arrangements should be
made in the legal system.
Today, the most complex types of crimes are the crimes committed via using computer
technology. Since the internet is an international computer network, the fight against crime
and criminals is full of problems and difficulties. The biggest problem about committing
crimes by using the internet and high technology is to determine the identity of the person
who committed the crime. Today, with the technological developments that transcend
national boundaries of our world, cooperation on an international scale and studies about
them are required in order to fight against informatics crime.
For fighting against this type of crimes, national arrangements and structuring is very
important, but international coordination and cooperation have become a more vital issue
(Informatics Council Of Turkey, 2008). National regulations and national law are
insufficient in the fight against informatics crime. Unless the possibilities of the virtual
environment are not used by the states of the world, it is impossible to fight successfully
against crime in this area.
The solution of this depends on the prevention of crimes committed via internet, and the
effectiveness of the treaties that prepare finding the guilty ones. Urgently, there is a need
to provoke interest for participating in those treaties by all countries, and the places, where
crimes are committed, should be decreased. The participant countries should arrange
these treaties in line with their legal structure.
There should be new jobs or positions or maybe expertising studies in order to prevent
crimes. As for technological invests, which compose the most important part of firms, it
can be suggested to invest more on technological people. It should be kept in mind that
powerful technological software and expert technicians will be the most effective ways to
solve this problem.
Proceedings of 11th International Business and Social Science Research Conference
8 - 9 January, 2015, Crowne Plaza Hotel, Dubai, UAE. ISBN: 978-1-922069-70-2
References
Calomiris, CW and Himmelberg, CP 1993, „Directed credit programs for agriculture and
industry : arguments from theory and fact‟, In: Proceedings of the World Bank
Annual Conference on Economic Development, Supplemented to the World Bank
Review and the Third Word Research Observer, 1994, pp 113-13?.
Gupta, S 1990, Rural Credit Policies and Persistence of Overdues in Indian
Agriculture, Unpublished Ph.D Dissertation, Stanford University, Stanford.
Hoque MZ 2004, Flawed working capital loan policy and loan default : Evidences from
Bangladesh, Journal of Accounting, Business and Management, Vol.11, No. 2,
pp.202-213.
The Main Britanica. (1986). The main yayıncılık A.Ş. and Encyclopedia Britannica Inc.
Publications. C.4. In Istanbul.
AndBelgelendirme. (2014). http://www.andbelgelendirme.com/iso27001/#sthash.WI23cvkC.dpuf
Artuk, M.E. and A. Gokcen and Loquat A.C. (2009). Turkish Penal code Commentary. 5.
C. Turhan Publishing. Ankara,
Barutçugil, I., (2002), Knowledge Management, Istanbul, Career publishing
Beceni Y. & Uçkan, I. (2004). Information Communications Technology and the Criminal
Law. the Internet and the Law. Istanbul bilgi University Publications. Istanbul
Beijerse, R.P.Uit(2000), Knowledge Management in Small and Madium-sized
Companies:Knowledge management for entrepreneurs. Journal of Knowledge
Management, 4(2)
booksGoogle (2014).
http://books.google.com.tr/books?id=A9RYRvV5_I0C&pg=PA255&lpg=PA255&dq=
%22yarg%C4%B1tay+uygulamalar%C4%B1nda+bili%C5%9Fim+su%C3%A7lar%C
4%B1%22&source=bl&ots=QFSr1pf2Up&sig=NqagJJ2UhTe17TICWVWSZy_680&hl
=tr&ei=pQr5S5eXEs6C_Qb_v6TPCg&sa=X&oi=book_result&ct=result&resnum=1&v
ed=0CAYQ6AEwAA#v=onepage&q=%22yarg%C4%B1tay%20uygulamalar%C4%B1
nda%20bili%C5%9Fim%20su%C3%A7lar%C4%B1%22&f=true. 23 mayıs 2010.
Bozkurt V.(2000). The Social Impacts Of The Internet To A Global Perspective. Journal Of
Vision. March-April 2000. Vol. 42.
Miller O.(2002). cyber crimes. marmara university institute of social sciences. published
master thesis. Istanbul
DPT(1994), Intellectual property Rights. DPT publication
Dülger M.V. (2004). Informatics Crimes. Seçkin Publishing. Ankara . First Edition. Kasım
2004
Proceedings of 11th International Business and Social Science Research Conference
8 - 9 January, 2015, Crowne Plaza Hotel, Dubai, UAE. ISBN: 978-1-922069-70-2
Hewe, K.(2000), prosecuting foreign-based computer crime-where International law and
technology collide, www.odecp.org/palermo/convmain.html
Köksal, A. (1991). Informatics Glossary Of Terms. Turkish Language Association
Publications. Ankara University Publishing In Ankara.
Kurt L.(2005). Annotated - case law in all aspects of computer crime and applications in
the Turkish penal code. Seçkin Publishing. Ankara.
Laudon K.C. and Laudon J.P.(2002). Management Information systems:Managing the
dijital firm (7.th Ed.) Prentice-Hall Inc. pp.2-65
Laudon, K.C. and Laudon J.P. (1999). Management information systems : Organization
and technology in the networked enterprise (6th ed.) Prentice-Hall Inc. s.2-67
Lindvall, M. and Rus I. and Sinha, S. (2003). Software system support for knowledge
management. Journal of Knowledge Management. vol. 7. number 5. pp. 137-150
Odabaş, H. (2005). Information management system. The Age of information, Information
Management, and Information Systems. Coşkun Can Aktan Independence and Y.
Vural. (The bow. Jun.). Konya:The Line Bookstore
Pamuk O. (2010). Tübitak Bilgem. https://www.bilgiguvenligi.gov.tr/zararliyazilimlar/stuxneti-ozel-yapan-ne.html. 28.09.2010
Sabah. (2011). (http://www.sabah.com.tr/Dunya/2011/11/20/iranli-uzmanlari-stuxnetoldurdu).
Şekerci R.& Yüksel, M.(2001). Intellectual property rights in the process of Globalization.
The
information society. while psychology, sociology and law effects symposium. 23-24 march
2001. Informatics association of Turkey publications, Ankara, march 2001
Sınar H.(1998). Internet Legal Problems posed by a criminal law approach. International
law and private international law bulletin. issue 1-2.
Symantec, 2010,
http://www.symantec.com/tr/tr/outbreak/?id=dragonfly&om_sem_cid=biz_sem_s20812627
1982899|pcrid|47330447003|pmt|b|plc||pdv|c
Tiwana A. (2000). The Knowledge Management Toolkit. Prentice Hall. USA.
Turkish Informatics Law Council Report of the Working Group (2004).
www.bilisimsurasi.org.tr. (Access Date: 15.04.2004)
Turkish Informatics Council. (2008). Computer Crime and the Law.
<http://bilisimsurasi.org.tr/dosyalar/10.doc>. (Access Date: 15.09.2008).
Wikipedia. (2014). (http://tr.wikipedia.org/wiki/Bilgi_g%C3%BCvenli%C4%9Fi,2014).
Proceedings of 11th International Business and Social Science Research Conference
8 - 9 January, 2015, Crowne Plaza Hotel, Dubai, UAE. ISBN: 978-1-922069-70-2
Yazicioglu, R.Y. (1997). Computer Crime: Criminological, Sociological, and Legal
Dimensions. In Istanbul. Alpha Publishing House
Yazicioglu, R.Y.(1999). Encrypted broadcasts of cyber Crimes in the Opposite Position.
Journal of Legal studies. Volume:11, Issue:1-3
Yücekal, Y. (2014). http://www.mfa.gov.tr/fikri-mulkiyet-haklarinin-uluslararasi-duzeydekorunmasi---dunya-fikri-mulkiyet-orgutu-_wipo_.tr.mfa
Download