for Journals by Title or ISSN
for Articles by Keywords
help
Followed Journals
Journal you Follow: 0
 
Sign Up to follow journals, search in your chosen journals and, optionally, receive Email Alerts when new issues of your Followed Journals are published.
Already have an account? Sign In to see the journals you follow.
Journal Cover
Cyberpolitik Journal
Number of Followers: 0  

  This is an Open Access Journal Open Access journal
ISSN (Print) 2587-1218
Published by DergiPark Homepage  [112 journals]
  • HUMAN RIGHTS IN NATIONAL CYBERSECURITY STRATEGY DOCUMENTS

    • Authors: Gül Nazik Ünver
      Abstract: In this paper, the United States, Turkey, United Kingdom, Germany, the Netherlands and Belgium's national cyber security strategy documents and their impact on human rights and international human rights protection mechanisms are being analyzed in the cyber space. First of all, this work will focus on steps and suggestions with a new outlook for bringing a different dimension by focusing on legal regulations of countries, the security approaches of countries by putting forward the perspective of national cyber security. In particular, the paper describes security and strategic management tasks. To clarify the context of the legal approach to a specific nation's cyber security, it presents a literatute review of the objectives of the national information society and the national cyber security strategy.
      PubDate: Tue, 30 Jan 2018 00:00:00 +030
       
  • Crypto Money: Bitcoin and International Relations

    • Authors: Muberra Altıner
      Abstract: In the globalizing world, developments in the 1960s, technically and technologically, have also affected the 'money' issue, which plays an important role in the historical evolution of human beings. The emergence of a virtual currency in the cyber / digital world is a new revolution. Bitcoin is regarded as the pioneer of virtual currencies. In this article, we will analyze currencies which have many nomenclature such as electronic money (virtual money, digital money, crypto money, etc.), discuss Bitcoin which is the first siber money and will compare the policies of some regarding Bitcon. In this article, literature review is done and it is also being supported by quantitative data obtained from current sources.
      PubDate: Tue, 30 Jan 2018 00:00:00 +030
       
  • A THEORETICAL APPROACH ABOUT CYBER SPACE AND SECURITY POLICY

    • Authors: Vahit Güntay
      Abstract: The interest about the cyber security and cyber space is increasing day by day and developing power concept is discussed with its own integrity in cyber area at International Relations discipline. After the Cold War with its bipolar system, borders were removed in minds and multiple security concept shaped with its more dynamic qualities. While it is not possible to make sentence about the concept of security, it is challenging to evaluate cyber security concept in offensive-defensive strategy or establish a policy. The dimension of the security dilemma is affected excessively by technological developments and cyberpolitics become more complicated in global risk society. The diversity of approach strengthens the states but it carries the security perception to utopic dimensions in the common peace concept. In this study, international relations discipline has been examined with its different aspect in which cybersecurity added a new dimension as a perception. Also it is very problematic issue to construct an approach, the concept of the study is to try an essay about cyber security and International Relations.
      PubDate: Tue, 30 Jan 2018 00:00:00 +030
       
  • STAYING AHEAD IN THE CYBER SECURITY GAME: WHAT MATTERS NOW

    • Authors: Mohammed Ishmeal
      Abstract: Erik van Ommeren, Martin Borrett an Marinus Kuivenhoven.(2014). Staying Ahead in theCyber Security Game: What Matters Now: Sogeti and IBM
      PubDate: Tue, 30 Jan 2018 00:00:00 +030
       
  • ‘GÜVENLİKLEŞTİRME’Yİ YENİDEN GÖZDEN GEÇİRMEK: TEORİ VE
           VAKALAR

    • Authors: Cihan Daban
      Abstract: Thierry Balzac, Sarah Leonard and Jan Rujicka.(2015). ‘Securitization’ Revisited: Theory andCases, Sage Journal, 30(4), pp.494-531. 
      PubDate: Tue, 30 Jan 2018 00:00:00 +030
       
  • EDITORIAL PREFACE

    • Authors: Nezir Akyeşilmen
      Abstract: I am very pleased and proud to present and introduce the fourth issue of the Cyberpolitik Journal to you.
      PubDate: Tue, 30 Jan 2018 00:00:00 +030
       
  • RETHINKING CYBERSECURITY : A QUICK TRANSFORMATION

    • Authors: Nezir Akyeşilmen
      Abstract: Cybersecurity has been a popular concept and widely used in media and academy in recentyears. It has both technological and social dimensions. It is so important that should not be leftto the technicians alone. The individuals, politicians and decision-makers need to deal with itand take proper measures. Cyber failure is not only technical but much more political.Therefore, we need policies that aim to provide a safe cyberspace.
      PubDate: Tue, 30 Jan 2018 00:00:00 +030
       
  • SİBER UZAY VE ULUSLAR ARASI İLİŞKİLER /
           TEORİSİ

    • Authors: Müberra Altıner; Fatma Çakır
      Abstract: Siber Uzay ve Uluslararası İlişkiler/ Teorisi Çalıştayı, Cyber Politik Journal, Orta Doğu Teknik Üniversitesi ve Selçuk Üniversitesi ortaklığı ile 11 Aralık 2017 tarihinde gerçekleştirilmiştir. Çalıştay iki oturumdan oluşmuş, ilk oturumda açılış konuşmasını Prof. Dr. Hüseyin Bağcı yapmıştır. Moderatör, Prof. Dr. Özlem Tür olurken, konuşmacılar ise, Dr. M. Emin Erendor (Çukurova Üniversitesi, Cyber Politik Journal) ve Doç. Dr. Nezir Akyeşilmen (Selçuk Üniversitesi, Cyber Politik Journal)’dir. Konuşmacıların sunum başlıkları ise, sırasıyla, ‘Siber Uzayın Temel Kavramları’ ve ‘Siber Uzay ve Uluslararası İlişkiler/ Politika’ dır. Çalıştayın ikinci oturumunun moderatörlüğü ise Prof. Dr. Bilal Sambur (Yıldırım Beyazıt Üniversitesi, Cyber Politik Journal) tarafından yapılmıştır. Konuşmacılar sırasıyla, ‘Siber Uzayın Felsefesi’ konulu sunumu ile Prof. Dr. Mustafa Çevik (Ankara Sosyal Bilimler Üniversitesi) ve ‘Teknoloji ve Uluslararası İlişkiler Teorisi’ adlı sunumu ile Prof. Dr. Davut Ateş (Selçuk Üniversitesi) olmuştur.
      PubDate: Tue, 30 Jan 2018 00:00:00 +030
       
  • CYBERDETERRENCE AND CYBERWAR

    • Authors: Fatma Çakır
      Abstract: Cyberspace that emerged as a new field parallel to technological developments has become anindispensable part of modern societies. Although conceptualizations in this new man-made areaare similar to those in the physical world, it is actually difficult to transfer these concepts in thesame way because of the nature of cyberspace
      PubDate: Tue, 30 Jan 2018 00:00:00 +030
       
  • About the Journal

    • Authors: Nezir Akyeşilmen
      Abstract: ABOUT THE JOURNALEditor-in-Chief / Editör: Assoc. Prof. / Doç.Dr. Nezir Akyeşilmen ( Selçuk University)Associate Editor / Eş-editör: Professor Bilal Sambur (Yıldırım Beyazıt University)Assistant Editors / Yardımcı Editörler:Assist. Prof.Dr. Vanessa Tinker (Ankara Sosyal Bilimler University) (Turkey)Dr. Mehmet Emin Erendor (Çukurova University)(Turkey)Book/Article Reviews - Kitap/Makale DeğerlendirmeÖzgün Özger (Association for Human Rights Education)Adem Bozkurt (Association for Human Rights Education)Mete Kızılkaya (Association for Human Rights Education)Editorial Board:Prof. Pardis Moslemzadeh Tehrani ( University of Malaya) ( Malaysia)Prof. Hüseyin Bağcı (Middle East Technical University) ( Turkey)Prof. Javaid Rehman (SOAS, University of London) (UK)Assist. Prof. Murat Tümay ( School of Law, Istanbul Medeniyet University) (Turkey)Dr. Carla Backley (School of Law, University of Nottingham) (UK)Assist. Prof. Dr. / Yrd.Doç.Dr. Başak Yavcan (TOBB ETÜ University)Orhan Gültekin, MA, (Cyber Expert, Association for Human Rights Education) (Turkey)International Advisory Board:Prof. Michael Freeman (University of Essex) (UK)Prof.Dr. Ramazan Gözen (marmara University)(Turkey)Prof. Dr. Mohd Ikbal Abdul Wahab ( International Islamic University of Malaysia)(Malaysia)Prof. Dr. Farid Suhaib ( International Islamic University of Malaysia) ( Malaysia)Prof Dr Sandra Thompson ( University of Houston)(USA)Prof Mehmet Asutay ( University of Durham)(UK)Prof.Marco Ventura(Italia)Prof. F. Javier D. Revorio (University Lamacha Toledo)(Spain)Prof. Andrzej Bisztyga (Katowice School of Economics)(Poland)Prof. Marjolein van den Brink (Netherland)
      PubDate: Tue, 30 Jan 2018 00:00:00 +030
       
  • The Transforming of Security Perception and Cyber Security in the Process
           of Globalization

    • Authors: Onur Yılmaz
      Abstract: Along with globalization, there have been diverse transformations in security. The technology advancement in the world has transformed the globe into a miniature pie and this has lead to an absence of borders. The diverse change in technology reveals that the security accepts the change as the sources of facts become linked and almost every state in the world endeavors all services in cyber space. Regarding cybersecurity the states have been late in dealing with it. However, on the other hand it has shown to be better understood exclusively after the attacks on states and organizations such as Estonia, Georgia and NATO.Within this context this work tries to explain what the cybersecurity is and the changes in the security patch through the examples of the cyber attacks.
      PubDate: Tue, 30 Jan 2018 00:00:00 +030
       
  • Deep Web and Dark Web: Deep World of the Internet

    • Authors: Emine Çelik
      Abstract: The Internet is undoubtedly still a revolutionary breakthrough in the history of humanity. Many people use the internet for communication, social media, shopping, political and social agenda, and more. Deep Web and Dark Web concepts not only handled by computer, software engineers but also handled by social siciensists because of the role of internet for the States in international arenas, public institutions and human life. By the moving point that very importantrole of internet for social sicientists, the potential hazards of Deep Web and its dark side referred to Dark Web have been put forth. The emergence and development of deep web and dark web concepts and the acsees of them were handled in the paper. The diffrences between the two concepts which are crucial point of the topic, and the Dark web significance of market are impressed on the paper. Additionally; In the face of Dark Web, an attempt has been made to analyze what kind of policy the states need to follow.
      PubDate: Tue, 30 Jan 2018 00:00:00 +030
       
  • CYBERSECURITY IN EDUCATIONAL SETTINGS

    • Authors: Ahmet Yıldırım
      Abstract: Cyber security has gained currency recently since technology and internet started to play a pivotal role in our lives. Moreoever, as most of the organizations carry out their operations and store their work in cyber settings, the notion “cybersecurity” has become more significant. Educational settings are the places in which “cybersecurity” has gained importance as databases of educational settings involve the data about students, staff, parents, resources and budget. Furthermore, the fact that educational settings are the places in which new information is created and databases of educational settings include data about this new information renders educational settings more and more vulnerable to cyber threats. In addition to that, students as shareholders of educational settings may confront cyber threats such as cyber bullying more in their daily lives. In the present article, cyber security was defined, the aims of cyber threats were summarized. How vulnerable educational settings and students are to cyber threats was put forward. Lastly, what could be done so as to provide cybersecurity at the nation level and especially in educational setting was discussed.
      PubDate: Tue, 30 Jan 2018 00:00:00 +030
       
  • CYBERCONFLICTS: AN EFFECT OF GLOBALIZATION ON CONFLICT ECOSYSTEM

    • Authors: Hüseyin Oruç
      Abstract: In this study we aim to understand how does globalization changed / expanded the international conflict ecosystem by introducing a newcomer: Cyber-conflicts. For the purpose of such an understanding first of all in the introduction part we revisit and integrate a number of theories and concepts such as conflict, cyberspace, imperialism, globalization theories and transnationality concept in order to have a theoretical framework about cyber-conflicts. Then we focus on the differences and relations between the conventional / kinetic conflicts and cyberconflicts. Although this study is based on qualitative analysis of what is called cyber-conflicts, we also include some quantitative data in order to clarify the current changes in international conflict ecosystem. In the conclusion part we reach a new conceptualization about cyberconflicts as globalization of war and criticise the lack of peace mechanisms.
      PubDate: Tue, 30 Jan 2018 00:00:00 +030
       
  • THE NEW FACE OF THE WAR: CYBER WARFARE

    • Authors: Mehmet Emin Erendor; Gürkan Tamer
      Abstract: With the development of the information technologies, computers and internet have played a crucial role in our life in the last decades. States, governments, NGO’s, businesses, and other organizations take the advantages of these developments in terms of trade, economy, educationand so on. Although technological developments enhance the ability of organizations to conduct activities in terms of cost-effective and efficient manner, it also has some disadvantages for the international community. Over the past decade, these technological developments have been used by some people, states or terrorist organizations to damage target states to improve their gains or impose their ideas or cut off the electrical power. Also, the Computer and internet was used a part of the war in Ukraine by Russia in 2015. In this study, the concept of cyber warfare will be analysed and its importance points and why states need to tackle with this situation will be explained.
      PubDate: Tue, 30 Jan 2018 00:00:00 +030
       
  • ACTOR - POWER RELATIONSHIP IN CYBERSPACE

    • Authors: Sevda Korhan
      Abstract: The rapid growth of the cyberspace is an important domain in world politics, and cyber is connecting its power to itself. The anonymity, the presence of safety asymmetries, and the low cost of accessing cyber tools make it easier for non-state actors to have a hard and soft power delivery capability in the cyberspace. The inherent characteristics of cyberspace considerably reduce the power disparities between actors, and this leads to the formation of dominant elements, which symbolize global politics in the 21st century, on issues such as "distribution of power" or "diffusion of power". It is not easy for the states, particularly great powers to dominate the cyberspace, as they have a say in domains such as land, sea or air. Therefore, the states are faced with a strong challenge by the non-state actors in the cyberspace.
      PubDate: Tue, 30 Jan 2018 00:00:00 +030
       
 
 
JournalTOCs
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Email: journaltocs@hw.ac.uk
Tel: +00 44 (0)131 4513762
Fax: +00 44 (0)131 4513327
 
Home (Search)
Subjects A-Z
Publishers A-Z
Customise
APIs
Your IP address: 54.166.141.69
 
About JournalTOCs
API
Help
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-