SİBER ZORBALIK, TÜRKİYE VE ABD KARŞILAŞTIRMASI (ABD V. DREW DOSYASI)

Yıl: 2015 Cilt: 0 Sayı: 120 Sayfa Aralığı: 325 - 384 Metin Dili: Türkçe İndeks Tarihi: 29-07-2022

SİBER ZORBALIK, TÜRKİYE VE ABD KARŞILAŞTIRMASI (ABD V. DREW DOSYASI)

Öz:
İnternet üzerinden haberleşme, sosyal medya faktörü- nün de devreye girmesiyle yeni bir nitelik kazanarak, bireylerarası iletişimi kitlesel boyuta taşımıştır. Haberleşmede, ifade özgürlüğünde ve kamuoyunu etkilemede önemli bir faktör olan bilişim teknolojileri aynı zamanda suçlular açısından da yeni fırsatlar doğurmuştur. Refah düzeyi arttıkça daha çok bireyselleşen insanlar, elektronik medyayı; rakiplerini safdışı bırakma, tehdit etme, küçük düşürme, utandırma, gruptan dışlama, ayrımcılığa maruz bırakma ve benzeri saiklerle taciz etmeye başlamışlardır. Bu eylem, daha çok çocuklar ve gençler arasında gerçekleşen ve siber zorbalık olarak ifade edilen, modern hayatın ve bilişim teknolojilerinin gayri meşru sonucudur. Bilişim suç- ları kişilerin maddi varlıklarını hedef alırken, siber zorbalık daha çok kişinin manevi varlığını hedef almaktadır. Suçun işlenmesinde kullanılan platformların özelliğinden dolayı da mağdur üzerinde çok fazla tahribata yol açmaktadır. Bu eylemlerle mücadele ancak okul, aile, ilgili kamu kurumları ve mağdurla yapılacak işbirliği ile mümkündür.
Anahtar Kelime:

Konular: İletişim

CYBERBULLYING, TURKEY AND USA COMPARISION (UNITED STATES V. DREW CASE)

Öz:
Communication via internet, has become, by gaining new qualification along with social media factor, part of an activity; interpersonal communication has moved to mass size. Information technologies is an important factor in freedom of expression and influencing the public opinion; at the same time, however, it has provided an opportunity to criminals. People, who are getting more individualist by way of rising of their level of welfare, has started to use electronic media for motives such as, eliminating their rivals, threating, humiliation, abashing, exclusion from the group, segregation and so forth. This act, which rather occurs between the youth and children and which is called cyber bullying, is an illegal result of the modern life and information technologies. While cybercrimes are targeting the tangible assets of the persons, cyber bullying is targeting moral assets. Because of the characteristics of the platform that is use for committing the offence, the offence causes far too much destruction on the victim. Fighting against these kinds of acts is only possible with the cooperation with school, family, related public institutions and victims.
Anahtar Kelime:

Konular: İletişim
Belge Türü: Makale Makale Türü: Araştırma Makalesi Erişim Türü: Erişime Açık
  • “Act 451”, http://legislature.mi.gov/doc.aspx?mcl-380-1310b, (E.T.17.11.2014)
  • “Be the Chang …Stop Bullying&Cyberbullying”, http://www.meganmeierfoundation.org/laws.html, (E.T.22.12.2014)
  • Balo Yusuf Solmaz., “Amerika Birleşik Devletleri’nde Mahkeme Teşkilatı”, AÜHFD, Ankara 2012, C. 61, S.3
  • Beauchamp Madam Line, “An Act to pPrevent and Deal with Bullying and Violence in Schools”, http://www2.publicationsduquebec.gouv.qc.ca/dynamicSearch/telecharge.php?type=5&file=2012C19A.PDF, (E.T.01.01.2015)
  • Beran Tanya, Li Qing, “The Relationship between Cyberbullying and School Bullying”, Journal of Student, Wellbeing 2007, Vol. 1(2)
  • Bolaç Ümmü Meliha, Güler Gülsem, Kartal Özlem, “Siber Zorbalık”, http://internetzorbalig.blogspot.com.tr/2012_03_01_archive.html, (E.T.22.11.2014)
  • Broderick Ryan, “9 Teenage Suicides In The Last Year Were Linked To CyberBullying On Social Network Ask.fm”, http://www.buzzfeed.com/ryanhatesthis/a-ninth-teenager-since-last-september-has-committed-suicide#.opYPz5M72, (E.T.28.12.2014)
  • Cartalucci Tony, “Facebook: Colonialism 2.0. Managing Public Perception. The Pinnacle of Social Engineering”, http://www.globalresearch.ca/facebook-colonialism-2-0/5421420, (E.T.01.01.2015)
  • Claypoole Ted, Payton Theresa, “Turning Off Lights:Choosing To Be İnvisible Online, Are You Naked Online? Protecting Your Internet Identity”, Rowman&Littlefield, Lanham 2012
  • Collier Anne, “Youth Safety on a Living Internet:Report of the Online Safety and Technology Working Group”, http://www.ntia.doc.gov/files/ntia/publications/ ostwg_final_report_070610.pdf, (E.T.17.11.2014)
  • Cook Gregory C. Tankersley Will Hill, “A Practitioner’s Guide To The Computer Fraud And Abuse Act:Finally, A Cause Of Action For Anything Wrong” (Over $5000)”, http://www.balch.com/files/Publication/01d78bb1-08f4-4a25-8cf5- c5200c4834a7/Presentation/PublicationAttachment/981f7964-3af6-434a-ba24- 050ba913390a/A_Practitioner’s_Guide-GCOOKWHT.pdf, (E.T.22.12.2014)
  • “Canadian Resource Centre for Victims of Crime”, http://crcvc.ca, (E.T.22.12.2014)
  • “Ceo-Coalition to Make Better in Internet for Kids”, http://ec.europa.eu/digital-agenda/self-regulation-better-internet-kids, (E.T.01.12.2014)
  • “Children’s Online Privacy Protection Act”, http://www.federalreserve.gov/boarddocs/supmanual/cch/coppa.pdf, (E.T.28.11.2014)
  • “Cyber Safety for Kids, 20 Most Useful Recommendations”, http://nobullying.com/ cyber-safety-for-kids-20-most-useful-recommendations/, (E.T.22.12.2014)
  • “Cyberbullying & The Law”, http://www.cybersmile.org/advice-help/category/ cyberbullying-and-the-law, (E.T.22.12.2014)
  • “Cyberbullying A Report On Bullying in a Digital Age, September 2011”, http://www. nysenate.gov/files/pdfs/final%20cyberbullying_report_september_2011_0.pdf, (E.T.17.11.2014)
  • “CyberBullying and the Law in The United Kingdom”, http://nobullying.com/ cyberbullying-law/, (E.T.22.12.2014)
  • “Cyberbullying Research Center”, http://cyberbullying.us/, (E.T.22.12.2014)
  • “Cyberbullying: an Overview”, http://deletecyberbullying.files.wordpress. com/2013/10/euconference-cyberbullying-28-may-madrid-background-papercoface.pdf, (E.T.22.11.2014)
  • “CyberbullyingOverview; The Legislative Assembly of Manitoba”, http://web2.gov. mb.ca/bills/40-2/b214e.php, (E.T.29.11.2014)
  • “Cyberstalking, Prepared by the Canadian Resource Centre for Victims of Crime”, www.crcvc.ca/docs/cyberstalking.pdf, (E.T.22.11.2014)
  • “Dealing with Cyberbullying”, http://www.helpguide.org/articles/abuse/cyberbullying.htm, (E.T.22.11.2014)
  • Dee Juliet, Cyberharassment and Cyberbullying There Ought To Be a Law Regulating Social Media Legal And Ethical Considerations, Peter Lang Puplishing, New York 2013, Vol.2
  • “Discover Internet Abuse Laws”, http://prodsee.wordpress.com/2014/09/25/ discover-internet-abuse-laws/, (E.T.19.11.2014)
  • Donegan Richard, “Bullying and Cyberbullying: History, Statistics, Law, Prevention and Analysis”, The Elon Journal of Undergraduate Research in Communications, Elon 2012, Vol. 3, No. 1
  • Dooley Julian J, Pyzalski Jacek, Cross Donna, “Cyberbullying Versus Face-to-Face Bullying A Theoretical and Conceptual Review”, http://icbtt.arizona.edu/sites/ default/files/cross_set_al_cyber_vs_face-to-face.pdf, (E.T.01.07.2014)
  • Gallagher Sean, “What the Celebrity Photo Hack Can Teach Us About Cloud Security”, http://www.wired.co.uk/news/archive/2014-09/02/j-law-cloud-security, (E.T.27.11.2014)
  • Granick Jennifer Stisa, Hofmann Marcia, “Brief Of Amici Curiae Electronic Frontier Foundation, Association Of Criminal Defense Lawyers Of New Jersey, Et Al. in Support Of Defendants’ Motion To Dismiss The Indictment”, https://www. eff.org/files/filenode/us_v_lowson/lowsonamicusbrieffinal.pdf, (E.T.22.11.2014)
  • Greyes Natch, “A New Proposal for the Department of Justice’s Interpretation of the Computer Fraud & Abuse Act”, Virginia Journal Of Law & Technology, Virginia 2013, Vol. 17, No:04
  • Grossman Andrew M, “The MySpace Suicide: A Case Study in Overcriminalization”, http://www.heritage.org/research/reports/2008/09/the-myspace-suicide-acase-study-in-overcriminalization, (E.T.17.12.2014)
  • Hampton Keith N, “New Communication Technologies and the Nature of Community”, Family Therapy Magazine, Alexandria 2013, V.12, N.2
  • Hartzog Woodrow, “Privacy And Terms of Use, Social Media and the Law”, Routledge, First Edit, New York 2013
  • Hertz Marci Feldman, David Ferdon, “Corinne, Electronic Media and Youth Violence: A CDC Issue Brief for Educators and Caregivers”, http://www.cdc.gov/violenceprevention/pdf/EA-brief-a.pdf, (E.T.17.11.2014)
  • Hinduja Sameer, Patchin Justin W, “Cyberbullying Glossary Brief Overview of Common Terms”, http://cyberbullying.us/cyberbullying_glossary.pdf, (E.T.17.11.2014)
  • http://amandatoddlegacy.org/, (E.T.03.01.2015)
  • http://apps.leg.wa.gov/RCW/default.aspx?cite=28A.300.285, (E.T.17.11.2014)
  • http://curia.europa.eu/juris/document/document.jsf?text=google&docid=152065& pageIndex=0&doclang=EN&mode=req&dir=&occ=first&part=1&cid=49287#c tx1, (E.T.30.11.2014)
  • http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/State_Anti_bullying_Legislation_Overview_0.pdf, (E.T.22.11.2014)
  • http://cyberbullying.us/, (E.T.03.01.2015)
  • http://dictionary.reference.com/browse/cyberbullying, (E.T.22.11.2014)
  • http://en.wikipedia.org/wiki/Amicus_curiae, (E.T.22.11.2014)
  • http://en.wikipedia.org/wiki/Office_on_Violence_Against_Women, (E.T.03.01.2015)
  • http://en.wikipedia.org/wiki/Violence_Against_Women_Act, (E.T.22.11.2014)
  • http://lawblog.usfca.edu/lawreview/wp-content/uploads/2014/09/Cyberbullyingand-Californias-Response.pdf, (E.T.22.12.2014)
  • http://nobullying.com/, (E.T.17.11.2014)
  • http://nobullying.com/jessica-logan/, (E.T.22.12.2014)
  • http://nobullying.com/solutions-for-cyber-bullying/, (E.T.01.07.2014)
  • http://online.wsj.com/public/resources/documents/delegatinggov.pdf, (E.T.22.12.2014)
  • http://open.nysenate.gov/legislation/bill/S7740-¸(E.T.17.11.2014)
  • http://thomas.loc.gov/cgi-bin/query/z?c111:H.R.1966, (E.T.27.12.2014) ht t p://w w w.ark leg.state.ar.us/assembly/2011/2011R/Acts/Act905.pdf., (E.T.17.11.2014)
  • http://www.capitol.hawaii.gov/session2011/Bills/HB688_.HTM, (E.T.17.11.2014)
  • http://www.cga.ct.gov/2011/TOB/S/2011SB-01138-R00-SB.htm, (E.T.17.11.2014)
  • http://www.egm.gov.tr/Sayfalar/Ihbar.aspx, (E.T.03.01.2015)
  • http://www.fcc.gov/guides/childrens-internet-protection-act, (E.T.22.11.2014)
  • http://www.gencourt.state.nh.us/, (E.T.17.11.2014)
  • http://www.gpo.gov/fdsys/pkg/BILLS-113hr482ih/pdf/BILLS-113hr482ih.pdf, (E.T.27.11.2014)
  • http://www.helpguide.org/articles/abuse/cyberbullying.htm, (E.T.22.11.2014)
  • http://www.kslegislature.org/bills/2008/2758.pdf, (E.T.17.11.2014)
  • http://www.leg.state.vt.us/docs/legdoc.cfm?URL=/docs/2004/acts/ACT117.HTM, (E.T.22.11.2014)
  • http://www.legis.ga.gov/Legislation/20112012.110632.pdf, (E.T.17.11.2014)
  • http://www.lrc.ky.gov/record.11rs/hb370.htm, (E.T.17.11.2014)
  • http://www.mainelegislature.org/legis/bills/bills_124th/billpdfs/SP035501.pdf, (E.T.17.11.2014)
  • http://www.malegislature.gov/Laws/SessionLaws/Acts/2010/Chapter92, (E.T.17.11.2014)
  • http://www.merriam-webster.com/dictionary/cyberbullying, (E.T.22.11.2014)
  • http://www.moga.mo.gov/statutes/C100-199/1600000775.HTM, (E.T.17.11.2014)
  • ht t p://w w w.myf lor ida house.gov/Sect ion s/Documents/loaddoc.aspx?, (E.T.17.11.2014)
  • http://www.oyez.org/cases/2010-2019/2014/2014_13_983, (E.T.31.12.2014)
  • http://www.scotusblog.com/case-files/cases/elonis-v-united-states/, (E.T.31.12.2014)
  • http://www.stopbullying.gov/cyberbullying/, (E.T.22.12.2014)
  • http://www.usa.gov/Agencies/Federal/Judicial.shtml, (E.T.03.01.2015)
  • http://www.uscourts.gov/FederalCourts.aspx, (E.T.03.01.2015)
  • http://www.volokh.com/files/Oct6filing.pdf, (E.T.22.11.2014)
  • http://www.wired.com/images_blogs/threatlevel/files/motion_for_acquittal.pdf, (E.T.22.11.2014)
  • https://docs.google.com/viewer?url=http://www.leg.state.or.us.12reg/measpdf/ sb1500.dir/sb1555.en.pdf, (E.T.17.11.2014)
  • https://docs.legis.wisconsin.gov/2009/related/acts/309, (E.T.17.11.2014)
  • https://ec.europa.eu/digital-agenda/node/61973, (E.T.03.01.2015)
  • https://www.eff.org/about, (E.T.22.11.2014)
  • https://www.wiredsafety.org/toolkitmedia/files/file/Articles/Cyberbullying-Harassment-Stalking_State_Legislation.pdf, (E.T.03/01.2015)
  • Jeong Sarah, “The Supreme Court is About to Tackle Online Threats for The First Time, A Case About Violent Facebook Posts Could Change How Internet Speech is Prosecuted”, http://www.theverge.com/2014.11/26/7292755/supreme-courttackle-online-threats-elonis, (E.T.27.11.2014)
  • Johnson Nicholas R, “I Agree To Criminal Liability: Lori Drew‘S Prosecution Under §1030(A)(2)(C) Of The Computer Fraud And Abuse Act, And Why Every Internet User Should Care”, Journal Of Law, Technology & Policy, Pennsylvania 2013, Vol. 2009, No.2
  • Lewis Marieke, Miller Patrick, R. Buchalter Alice, “Internet Crimes Against Children: An Annotated Bibliography of Major Studies”, https://www.ncjrs.gov/pdffiles1/ nij/grants/228813.pdf, (E.T.17/05.2014)
  • Lidsky Lyrissa, Garcia Andrea Pinzon, “How Not to Criminalize Cyberbullying”, http://www.meganmeierfoundation.org/cmss_files/attachmentlibrary/ Cyberbullying-Laws.pdf, (27.12.2014)
  • Lidsky Lyrissa, Garcia Andrea Pinzon, “How Not to Criminalize Cyberbullying”, http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2097684, (E.T.30.11.2014)
  • “Megan’s Story”, http://www.meganmeierfoundation.org/megans-story.html, (E.T.22.12.2014)
  • M. Zweig Janine, Dank Meredith, “Teen Dating Abuse and Harassment in the Digital World Implications for Prevention and Intervention”, http://www.urban.org/ UploadedPDF/412750-teen-dating-abuse.pdf, (E.T.17.11.2014)
  • M. Zweig Janine, Dank Meredith, Lachman Pamela, Yahner Jennifer, “Technology, Teen Dating Violence and Abuse, and Bullying”, https://www.ncjrs.gov/pdffiles1/nij/grants/243296.pdf, (E.T.22.11.2014)
  • Mahidi Mourad, “The Young and The Rightless ? The Protection of Youth Rights in Europe”, http://www.youthforum.org/assets/2013.11/The-Young-andthe-rightless_The-Protection-of-Youth-Rights-in_Europe_THESIS-PDF.pdf, (22.11.2014)
  • Medaris Michael, Girouard Cathy, “Protecting Children in Cyberspace: The ICAC Task Force Program, Juvenile Justice Bulletin”, https://www.ncjrs.gov/pdffiles1/ ojjdp/191213.pdf, (E.T.05/01.2015)
  • Murray Ryan Patrick, “Myspace-ing is Not a Crime: Why Breaching Terms of Service Agreements Should Not Implicate the Computer Fraud and Abuse Act”, http://digitalcommons.lmu.edu/cgi/viewcontent.cgi?article=1555&context=elr, (E.T.22.12.2014)
  • “MySpace.com Terms of Use Agreement”, https://web.archive.org/ web/20061117093857/http://www1.myspace.com/index.cfm?fuseaction=misc. terms June 15, 2006, (E.T.28.11:2014); http://www.dmlp.org/threats/unitedstates-v-drew, (E.T.22.11.2014)
  • Nebil Füsun S, “Siber Zorbalığın Önlenmesinde, Ebeveynler ve Okullara Kadar 3. Şahıslara da Görev Düşüyor-2”, http://www.turk.internet.com/portal/yaziyaz. php?yaziid=35510, (E.T.17.11.2014)
  • Nebil Füsun S, “Siber Zorbalık Doğrudan ya da Dolaylı Gerçekleşebiliyor – 1”, http:// www.turk-internet.com/portal/yazigoster.php?yaziid=35509, (E.T.22.11.2014)
  • Padilla Richard, “Chaos Computer Club Demonstrates How to Reproduce Fingerprints Using Public Photos”, http://www.macrumors.com/2014.12/29/cccreproduce-fingerprints-public-photos/, (30.12.2014)
  • Palfrey John, “Enhancing Child Safety And Online Technologies:Final Report Of The Internet Safety Technical Task Force To The Multi-State Working Group On Social Networking Of State Attorneys General Of The United States”, http://cyber. law.harvard.edu/sites/cyber.law.harvard.edu/files/ISTTF_Final_Report.pdf, (22.11.2014)
  • “Revised Children’s Online Privacy Protection Rule Goes Into Effect Today”, http:// www.ftc.gov/news-events/press-releases/2013/07/revised-childrens-onlineprivacy-protection-rule-goes-effect, (E.T.22.11.2014)
  • “Right to be forgotten: have you ever wanted something deleted from the web?”, http://www.theguardian.com/technology/2014/may/13/right-to-be-forgottenhave-you-ever-wanted-something-deleted-from-the-web-google, (E.T.30.11.2014)
  • Sacco Dena T, Silbaugh Katharine, Corredor Felipe, Casey June, Doherty Davis, “An Overview of State Anti-Bullying Legislation and Other Related Laws Schneider Shari Kessel, Smith Erin, (E.T.22.11.2014)
  • Sekander Yousaf, “Perception Engineering with Social Media”, http://www. rocketmill.co.uk/the-use-of-social-media-for-perception-management, (E.T.01/01.2015)
  • “Six Unforgettable CyberBullying Cases”, http://nobullying.com/six-unforgettablecyber-bullying-cases/, (E.T.17/05.2014)
  • Snyder Thomas D, Morgan, Rachel E., Rathbun, Amy., Kemp, Jana., Robers, Simone., “Indicators of School Crime and Safety”, http://nces.ed.gov/pubs2014/2014042. pdf, (E.T.17.11.2014)
  • “Social Media and Cyberbullying, Implementation of School-Based Prevention Efforts and Implications for Social Media Approaches”, http://hhd.org/sites/ hhd.org/files/Social_Media_and_Cyberbullying_FinalReport-EDC_0.pdf, (E.T.03.01.2015)
  • Soyaslan Doğan, Ceza Hukuku Özel Hükümler, Yetkin Yayınları, 8. Baskı, Ankara 2010
  • Spinello Richard A, Anonymous Speech, Cyberethics Morality and Law in Cyberspace, Jones&Barlett, Fourt Edition, Burlington 2011
  • Spotts Alli, Lazzer De, “Faceblur—Facebook, Therapists, and Our Boundaries”, Family Therapy Magazine, Alexandria 2013, Vol.12, No.2
  • “State Cyberbullying Laws A Brief Review of State Cyberbullying Laws and Policies”, http://www.cyberbullying.us/Bullying_and_Cyberbullying_Laws.pdf, (E.T.17.11.2014)
  • “Stop Cyberbullying Before It Starts: Cyberbullying, Research Report”, http://www. ncpc.org/resources/files/pdf/bullying/cyberbullying.pdf, (E.T.17.11.2014)
  • “Study of Technology Protection Measures in Section 1703”, http://www.ntia.doc. gov/files/ntia/publications/cipareport08142003.pdf, (E.T.22.11.2014)
  • “The Cyberbullying Prevention Act”, http://web2.gov.mb.ca/bills/40-2/b214e.php, (E.T.27.11.2014)
  • “The Cyberbullying Prevention Act”, http://web2.gov.mb.ca/bills/40-2/b214e.php, (E.T.27.11.2014); “The Legislative Assembly of Manitoba”, http://web2.gov.mb.ca/ bills/40-2/b214e.php, (E.T.21.11.2014)
  • “The Megan Meier Story”, http://nobullying.com/the-megan-meier-story/, (E.T.05.12.2014)
  • “The Violence Against Women Act”, http://www.whitehouse.gov/sites/default/files/docs/vawa_factsheet.pdf, https://www.federalregister.gov/articles/2014/10/20/2014-24284/violence-against-women-act, (E.T.22.11.2014)
  • “U.S. Legal System”, http://iipdigital.usembassy.gov/media/pdf/books/legalotln. pdf, (E.T.01.12.2014)
  • “Violance against women act, Education Act and the Act respecting Private education”, http://www.mels.gouv.qc.ca/en/current-initiatives/bullying-and-violencein-the-schools/bill-56/, (E.T.01.07.2014)
  • Walton Alice G, “Internet Addiction: The New Mental Health Disorder?”, http:// www.forbes.com/sites/alicegwalton/2012/10/02/the-new-mental-healthdisorder-internet-addiction/, (E.T.17/05.2014)
  • Wegman Attıcus N, “Cyberbullying and California’s Response”,
  • Word Stephen J.A, Social Media Ethics, Social Media Communication (Concepts, Practices, Data, Law And Ethics), Routledge, First Edition, New York 2015 www.stopcyberbullying, (E.T.03/01.2015)
  • “Zorbalık Nedir?”, www.kocschool.k12.tr/...and.../Zorbalık_ve_Şiddeti_Önleme.sflb. ashx, (E.T.22.12.2014)
  • Zweig Janine, Dank Meredith, “Teen Dating Abuse and Harassment in the Digital World Implications for Prevention and Intervention”, http://www.urban.org/ UploadedPDF/412750-teen-dating-abuse.pdf, (E.T.17.11.2014)
APA YETİM S (2015). SİBER ZORBALIK, TÜRKİYE VE ABD KARŞILAŞTIRMASI (ABD V. DREW DOSYASI). , 325 - 384.
Chicago YETİM Servet SİBER ZORBALIK, TÜRKİYE VE ABD KARŞILAŞTIRMASI (ABD V. DREW DOSYASI). (2015): 325 - 384.
MLA YETİM Servet SİBER ZORBALIK, TÜRKİYE VE ABD KARŞILAŞTIRMASI (ABD V. DREW DOSYASI). , 2015, ss.325 - 384.
AMA YETİM S SİBER ZORBALIK, TÜRKİYE VE ABD KARŞILAŞTIRMASI (ABD V. DREW DOSYASI). . 2015; 325 - 384.
Vancouver YETİM S SİBER ZORBALIK, TÜRKİYE VE ABD KARŞILAŞTIRMASI (ABD V. DREW DOSYASI). . 2015; 325 - 384.
IEEE YETİM S "SİBER ZORBALIK, TÜRKİYE VE ABD KARŞILAŞTIRMASI (ABD V. DREW DOSYASI)." , ss.325 - 384, 2015.
ISNAD YETİM, Servet. "SİBER ZORBALIK, TÜRKİYE VE ABD KARŞILAŞTIRMASI (ABD V. DREW DOSYASI)". (2015), 325-384.
APA YETİM S (2015). SİBER ZORBALIK, TÜRKİYE VE ABD KARŞILAŞTIRMASI (ABD V. DREW DOSYASI). Türkiye Barolar Birliği Dergisi, 0(120), 325 - 384.
Chicago YETİM Servet SİBER ZORBALIK, TÜRKİYE VE ABD KARŞILAŞTIRMASI (ABD V. DREW DOSYASI). Türkiye Barolar Birliği Dergisi 0, no.120 (2015): 325 - 384.
MLA YETİM Servet SİBER ZORBALIK, TÜRKİYE VE ABD KARŞILAŞTIRMASI (ABD V. DREW DOSYASI). Türkiye Barolar Birliği Dergisi, vol.0, no.120, 2015, ss.325 - 384.
AMA YETİM S SİBER ZORBALIK, TÜRKİYE VE ABD KARŞILAŞTIRMASI (ABD V. DREW DOSYASI). Türkiye Barolar Birliği Dergisi. 2015; 0(120): 325 - 384.
Vancouver YETİM S SİBER ZORBALIK, TÜRKİYE VE ABD KARŞILAŞTIRMASI (ABD V. DREW DOSYASI). Türkiye Barolar Birliği Dergisi. 2015; 0(120): 325 - 384.
IEEE YETİM S "SİBER ZORBALIK, TÜRKİYE VE ABD KARŞILAŞTIRMASI (ABD V. DREW DOSYASI)." Türkiye Barolar Birliği Dergisi, 0, ss.325 - 384, 2015.
ISNAD YETİM, Servet. "SİBER ZORBALIK, TÜRKİYE VE ABD KARŞILAŞTIRMASI (ABD V. DREW DOSYASI)". Türkiye Barolar Birliği Dergisi 120 (2015), 325-384.