Research Article
BibTex RIS Cite

SİBERUZAMDA SUÇ TİPOLOJİLERİ VE SİBER İLETİŞİM TABANLI ÇÖZÜMLEME MODELİNİN ANALİZİ

Year 2024, , 1375 - 1400, 03.12.2024
https://doi.org/10.17780/ksujes.1477116

Abstract

İnternet tabanlı ağ teknolojilerinin hızlı dönüşümü, bireylerin sanal ortamlarda gösterdikleri katılımı günden güne artırmaktadır. İnternet ortamı diğer kişilerin verilerini illegal olarak elde etmeyi hedefleyen kişiler tarafından da yoğun olarak kullanılmaktadır. Siber dünyada kazanma davranışı ve korsanlık sorunsalı fiziksel alanlardan dijital alanlara doğru geçiş yapmaktadır. Bu çalışmada, siber uzamda yapılan yasadışı işlemlere karşı getirilen özelleştirilmiş Alan Adı Sistemi üzerinden sorgu takipleri yapılmıştır. Uygulama sürecinde, bir aylık tam ölçümlü ve kesinlikli veri akışları dizgesi ile sorgu ve diğer analizlerin takibi yapılmıştır. İçerik analizi kapsamında uygulama üzerinden yapılan izlemede, 64 toplam filtreleme listesi içinde 48 adet yabancı filtre (%87,3) Türk filtre olarak 7 adet (%12,7), ve 9 adet ortak filtre tipolojisi özelliği gösteren filtreler ortaya çıkmaktadır. Sorgulama konusunda; dört temel değer sistemi oluşturularak Alan Adı Sistemi Sorgu Sayısı, Engel Sayısı, Kötü Amaçlı Yazılım ve Kimlik Avı ile Yetişkin İçerikli Siteler şeklinde sistem oluşturulmuştur. Çalışmada, ilgili yönerge üzerinden IP ve Alan Adı Sistemi örnekleri üzerinden suç tipolojilerinin düzeyleri istatistiksel olarak analiz edilmektedir.

Thanks

Y.MÜH.VEDAT FETAH

References

  • Abdüsselam, M. S., Burnaz, E., Ayyıldız, H., & Demir, İsmail K. (2015). web teknolojilerinin e-ticaret ortamlarında kullanımı ile ilgili içerik analizi: Türkiye’deki ilk 500 e-tı̇caret sitesi. KTÜ, SBE Sos. Bil. Dergisi, 2015(10), 263-284.
  • Abide, Ö. F., & Gelişli, Y. (2020). Sosyal bilgiler ders kitaplarının ve öğretim programlarının çocukların güvenli internet kullanımları açısından incelenmesi. JRES, 7(1), 248-269.
  • Akbanov, M., Vassilakis, V.G., & Logothetis, M.D. (2019). Ransomware detection and mitigation using software-defined networking: The case of WannaCry. Computers & Electrical Engineering, 76, 111-121. https://doi.org/10.1016/j.compeleceng.2019.03.012
  • Akbulut, Y., Dursun, Ö.Ö., Dönmez, O., & Şahin, Y.L. (2016). In search of a measure to investigate cyberloafing in educational settings. Computers in Human Behavior, 55, 616-625.
  • Akgün, E. (2022). Güvenli internet ile ilgili tezlerdeki yöntemsel eğilimlerin sistematik incelenmesi. Instructional Technology and Lifelong Learning, 3(1), 64-87. https://doi.org/10.52911/itall.1062981
  • Akman, T. (1982). bilimler bilimi sibernetik. Karacan Yayıncılık.
  • Akyüz, A., & Koç, Z. (2020). Empati yönelimli siber zorbalık psiko-eğitim programının lise 9. ve 10. sınıf öğrencilerinin siber zorbalık ve empati düzeylerine etkisi. Gazi Üniversitesi Gazi Eğitim Fakültesi Dergisi, 40(1), 75-111. https://doi.org/10.17152/gefad.695923
  • Alan, H. (2019). Sosyal ağ kullanımı yoğunluğu ve sanal kaytarma davranışları: Üniversite öğrencileri üzerine bir inceleme. Çağdaş Yönetim Bilimleri Dergisi, 6(2), 112-129. https://dergipark.org.tr/tr/pub/cybd/issue/49666/495333
  • Allen, M. (2006). Social engineering: A Means to violate a computer system. Tech. Rep., SANS Institute. Anandarajan, M., & Simmers, C. A. (2005). Developing human capital through personal web use in the workplace: Mapping employee perceptions. Communications of The Association For Information Systems, 15, 776-791. https://doi.org/10.17705/1CAIS.01541
  • Androutsopoulos, I., Paliouras, G., Karkaletsis, V., Sakkis, G., Spyropoulos, C.D., & Stamatopoulos, P. (2000). Learning to filter spam e-mail: a comparison of a naive bayesian and a memory-based approach.
  • Zaragoza H, Gallinari P, Rajman M. (Eds.), Proceedings of the workshop, Machine Learning and Textual Information Access, (pp.1-13), 4th European Conference on Principles and Practice of Knowledge Discovery in Databases (PKDD-2000), Lyon, France, September 2000.
  • Aponte-Novoa, F.A., & Villanueva-Polanco, R. (2022a). On proof-of-accuracy consensus protocols. Mathematics, 2022(10), 2540, 1-27. https://doi.org/10.3390/math10142504
  • Aponte-Novoa, F.A, Povedano Álvarez, D., Villanueva-Polanco, R., Sandoval Orozco, A.L., & García Villalba, L.J. (2022b). On detecting cryptojacking on websites: Revisiting the use of classifiers. Sensors, 22(23), 9219, 1-15. https://doi.org/10.3390/s22239219
  • APWG. (Anti-Phishing Working Group). (2013). Phishing Activity Trends Report-4th Quarter 2013. http://apwg.org/resources/apwg-reports Accessed:17.11.2023.
  • Arabacı, İ. (2017). Investigation faculty of education students cyberloafing behaviors in terms of various variables. The Turkish Online Journal of Educational Technology, 16(1), 72-82.
  • Arachchilage, N.A.G, & Love, S.A (2013). Game design framework for avoiding phishing attacks. Computers in Human Behavior 29(2013) 706-714. http://dx.doi.org/10.1016/j.chb.2012.12.018
  • Arıcak, T., Siyahhan, S., Uzunhasanoglu, A., Saribeyoglu, S., Çıplak, S., Yılmaz, N., & Memmedov, C. (2008). Cyberbullying among Turkish adolescents. CyberPsychology Behavior, 11(3), 253-261. https://doi.org/10.1089/CPB.2007.0016
  • Aslan, A. & Karakuş Yılmaz, T. (2017). Türkiye’de güvenli internet kullanımına yönelik gerçekleştirilen uygulamalar. Dumlupınar Üniversitesi Sosyal Bilimler Dergisi, 53. Sayı-Temmuz 2017, 121-143.
  • Aslan, O, & Akin, E. (2022). Malware detection method based on file and registry operations using machine learning. Sakarya University Journal of Computer and Information Sciences, 5(2), 134-146. https://doi.org/10.35377/saucis...1049798
  • Aziz, A. (1990). Araştırma yöntemleri-teknikleri ve ı̇letişim. A. Ü Siyasal Bilgiler Fakültesi ve Basın-Yayın Yüksekokulu Basımevi.
  • Bağrıyanık, M. F. (2018). Dijital alanın tipolojileri: dijital kültüre dair sosyolojik bir okuma, Yüksek Lisans Tezi, Selçuk Üniversitesi Sosyal Bilimler Enstitüsü, Konya, 111s.
  • Baldwin, J., & Dehghantanha A. (2018). Leveraging support vector machine for opcode density based detection of crypto-ransomware. In Cyber Threat Intelligence, Cham: Springer, 107-136, https://doi.org/10.1007/978-3-319-73951-9_6
  • Bargh, J.A., & McKenna, K.Y.A (2004). The internet and social life. Annual Review of Psychology, 55, 573-590. Barreno, M., Nelson, B., Joseph, A., & Tygar, J. (2010). The security of machine learning. Machine Learning, 81, 121-148.
  • Baykara, M., & Gürel, Z.Z. (2018). Detection of phishing attacks. 2018 6th International Symposium on Digital Forensic and Security Antalya, Turkey, 2018, (pp.1-5), ISDFS. https://doi.org/10.1109/ISDFS.2018.8355389
  • Bazrafshan, Z., Hashemi, H., Fard, S.M.H., & Hamzeh, A. (2013). A Survey on heuristic malware detection techniques. In IEEE Conference on Information and Knowledge Technology, (pp.113-120), IEEE.
  • Becker, J., Breuker, D., Heide, T., Holler, J., Rauer, H.P., & Böhme, R. (2013). Can we afford integrity by proof-of-work? Scenarios inspired by the Bitcoin currency. The Economics of Information Security and Privacy; 2013, Springer: Berlin, Heidelberg, 135-156.
  • Becker, T.E., & Martin, S.L. (1995). Trying to look bad at work: Methods and motives for managing poor impressions in organisations, Academy of Management Journal, 28(1), 174-200.
  • Berelson, B. (1952). Content analysis in communication research. Free Press.
  • Berelson, B., & Lazarsfeld, P. F. (1948). The Analysis of communication content. University of Chicago and Columbia University.
  • Bergholz, A., DeBeer, J., Glahn, S., Moens, MF, Paaß, G., & Strobel, S. (2010). New filtering approaches for Phishing e-mail. Journal of Computer Security, 18(1), 7-35.
  • Beugre, C. D., & Daeryong, K. (2006). Cyberloafing: Vice or Virtue? Mehdi Khosrow Pour (Ed.), Emerging Trends and Challenges in Information Technology Management, (pp.834-835), Idea Group Inc.
  • Bhavsar, V., Kadlak, A., & Sharma, S. (2018). Study on phishing attacks. International Journal of Computer Applications, (0975-8887), 182(33), December 2018, 27-29.
  • Bhowmick, A., & Hazarika, S. (2018). E-Mail spam filtering: a review of techniques and trends, Bhowmick, Kalam A, Das S, Sharma K. (Eds.) Advances in Electronics, Communication and Computing. Lecture Notes in Electrical Engineering, Vol 443, (pp.583-590), Springer, Singapore. https://doi.org/110.1007/978-981-10-4765-7_61
  • Bilgin, N. (2006). Sosyal bilimlerde içerik analizi teknikler ve örnek çalışmalar. İkinci Baskı. Siyasal. Bin Abbas, M.F., & Srikanthan, T. (2017). Low-complexity signature-based malware detection for IOT devices. In International Conference on Applications and Techniques in Information Security, (pp.181-189), Springer.
  • Blanchard, A. & Henle, C. (2008). Correlates of different forms of cyberloafing: The Role of norms and external locus of control. Computers in Human Behavior, 24(3), 1067-1084.
  • Bozeman, D. P., & Kacmar, K.M. (1997). A Cybernetic model of impression management processes in organisations. Organisational Behaviour and Human Decision Processes, 69(1), 9-30.
  • Brody, R.G., Mulig, E., & Kimball, V. (2007). Phishing, pharming and identity theft. Journal of Academy of Accounting and Financial Studies, 11, 43-56.
  • Brown, D.S. (2016). Cryptocurrency and criminality. The Police Journal: Theory Practice and Principles, 89(4), 327-339. https://doi.org/10.1177/0032258x16658927
  • Brown, D. S., & Wang, T. (2008). Cyberethics: identifying the moral, legal and social issues of cybertechnology in k-12 classrooms. College Teaching Methods & Styles Journal, 4(2), 29-36.
  • Bulut, S. & Gündüz, S. (2012). Exploring violence in the context of Turkish culture and schools. S. R. Jimerson, A. B. Nickerson, M. J. Mayer, & M. J. Furlong (Eds.), (In.) Handbook of School Violence and School Safety: International Research and Practice (2nd Ed.) (pp.165-174), Routledge.
  • Canavan, J.E. (2001). Fundamentals of network security. London, UK, Artech House.
  • Carlin, D., Burgess, J., O’Kane, P., & Sezer S. (2020). You could be mine(d): The Rise of cryptojacking. IEEE Security & Privacy, 2020(18), 16-22. https://doi.org/10.1109/MSEC.2019.2920585
  • Carlin D, O’Kane P, Sezer S, & Burgess J. (2018). Detecting cryptomining using dynamic analysis. In: 2018 16th Annual Conference on Privacy, Security and Trust (PST), (pp.1-6), IEEE. https://doi.org/10.1109/pst.2018.8514167 (08.05.2023).
  • Cassidy, W., Faucher, C., & Jackson, M. (2013). Cyberbullying among youth: a comprehensive review of current international research and its implications and application to policy and practice, School Psychology International, 34(6) 2013, 575-612. https://doi.org/10.1177/0143034313479697
  • Castells, M. (2005). Ağ toplumunun yükselişi, enformasyon çağı: ekonomi, toplum, kültür. (çev. Ebru Kılıç). Birinci Cilt, İstanbul Bilgi Üniversitesi Yayınları.
  • Chickowski, E. (2022). Cryptojacking Explained: How To Prevent, Detect, and Recover From it. https://www.csoonline.com/article/564521/what-is-cryptojacking-how-to-prevent-detect-and-recover-from-it.html Accessed: 22.09.2023.
  • Clayton R. (2005). Insecure Real World Authentication Protocols (or why is phishing so profitable). http://www.cl.cam.ac.uk/users/rnc1/phishproto.pdf. Accessed: 21.09.2023.
  • Clynes, M. E., & Kline, N. S. (1960). Cyborgs and Space. Astronautics, September, 26-76. Cutler, R. (1996). Technologies, relations, and selves. (In.) L. Strate, R. Jacobson, & S. Gibson (Eds.), Communication and Cyberspace: Social Interaction in an Electronic Environment, (pp.317-333), Hampton. Çetin, B. A., & Ceyhan, A. A. (2014). Ergenlerin İnternet’te Kimlik Denemeleri ve Problemli İnternet Kullanım Davranışları. The Turkish Journal on Addictions, 1(2), 5-46.
  • Dashevskyi, S., Zhauniarovich, Y., Gadyatskaya, O., Pilgun, A., & Ouhssain, H. (2020). Dissecting android cryptocurrency miners. ACM, 2020, 191-202.
  • Do, C. T., Tran, N. H., Hong, C., Kamhoua, C.A., Kwiat, K. A., Blasch, E., Ren, S., Pissinou, N. & Iyengar, S. S. (2017). Game theory for cyber security and privacy. ACM Computing Surveys, 50(2), Article 30, (May 2017), 1-37. http://dx.doi.org/10.1145/3057268
  • Doss, A. F. (2020). Cyber Privacy: Who Has Your Data And Why You Should Care. (1st Ed.) Ben Bella Books Inc. Duda, R.O., & Hart, P.E. (1973). Bayes Decision Theory. Chapter 2, Pattern Classification and Scene Analysis, 10-43, New York, John Wiley.
  • Erdur-Baker, Ö., Kavşut, F. (2007). Akran zorbalığının yeni yüzü: siber zorbalık cyber bullying: a new face of peer bullying. Eurasian Journal of Educational Research, 27, 2007, 31-42.
  • Ergün, E., & Altun, A. (2012). Öğrenci gözüyle siber aylaklık ve nedenleri. Eğı̇tı̇m Teknolojisi̇ Kuram ve Uygulama, 2(1), 2012, 36-53.
  • Erkoç, M. F. (2018). Güvenli internet kullanımı, Bilişim Teknolojileri, (İçinde) Serdar Bahadır Kert, (Ed.), (s.399-422), Nobel Yayın Dağıtım,
  • Ferrante, A., Malek, M., Martinelli, F., Mercaldo, F., & Milosevic, J. (2017). Extinguishing ransomware-a hybrid approach to android ransomware detection. In International Symposium on Foundations and Practice of Security, (pp. 242-258), Springer, Cham. https://doi.org/10.1007/978-3-319-75650-9_16
  • Fette, I., Sadeh, N., Tomasic, A. (2007). Learning to detect Phishing emails. In Proceedings of the 16th International Conference on World Wide Web (WWW), ACM, May 2007, (pp.649-656), Banff, Canada.
  • Fielder, A., König, S., Panaousis, E., Schauer, S., & Rass, S. (2018). Risk Assessment Uncertainties in Cybersecurity Investments. Games 2018, 9, 34. https://doi.org/10.3390/g9020034
  • Garrett, R.K. & Danziger, J.N. (2008). On Cyberslacking: workplace status and personal internet use at work, Cyberpsychology & Behaviour, (11)3, 287-292.
  • Gibson, W. (1984). Neuromancer. Penguin Putnam Inc.
  • Gomez-Hernandez, J.A., Alvarez-Gonzalez, L., & García-Teodoro, P. (2018). R-Locker: Thwarting ransomware action through a honeyfile-based approach. Computers & Security, 73, 389-398. https://doi.org/10.1016/j.cose.2017.11.019
  • Goni, O. (2022), Cyber crime and its Classification, Int. J. of Electronics Engineering and Applications,10(1), 01-17, https://doi.org/10.30696/IJEEA.X.I.2021.01-17
  • Gökçe, O. (2006). İçerik çözümlemesi kuramsal ve pratik bilgiler. Siyasal Kitabevi.
  • Greene, M.B. (2006). Bullying in school: A Plea for measure of human rights. Journal of Social Issues 62, 63-69.
  • Gyöngyi, Z., Garcia-Molina, H., & Pedersen, J. (2004). Combating web spam with trustrank. In Proceedings of The Thirtieth International Conference on Very Large Data Bases, Volume 30, (pp.576–587), VLDB Endowment.
  • Haraway, D. (2006). Siborg manifestosu: Geç yirminci yüzyılda bilim, teknoloji ve sosyalist-feminizm. (Çev.) O. Akınhay. Agora Yayıncılık.
  • Herring, S. C. (2004). Content Analysis for New Media: Rethinking the Paradigm, New Research for New Media: Innovative Research Methodologies Symposium Working Papers and Readings, 47-66.
  • Hinduja, S., & Patchin, J.W. (2009). Bullying beyond the schoolyard: Preventing and responding to cyberbullying. Carwin Press.
  • Hong, G., Yang, Z., Yang, S., Zhang, L., Nan, Y., Zhang, Z., Yang, M., Zhang, Y., Qian, Z., Duan, H. (2018). How you get shot in the back: A Systematical study about cryptojacking in the real world. In 2018 ACM SIGSAC Conference on Computer and Communications Security (CCS ’18), (pp.1701-1713), ACM, NY, USA, 15-19 October 2018. https://doi.org/10.1145/3243734.3243840
  • Horan, C., & Saiedian, H. (2021). Cyber Crime Investigation: Landscape, Challenges, and Future Research Directions. J. Cybersecur. Priv. 2021, 1, 580–596. https://doi.org/10.3390/jcp1040029
  • Hu, W., & Tan Y. (2017). Generating adversarial malware examples for black-box attacks based on GAN, arXiv:1702.05983, 1-7. https://doi.org/10.48550/arXiv.1702.05983
  • İşman, A. & Açmacı, N. (2021). Siber zorbalık kavramı üzerinden bir film incelemesi: Cyberbully (sanal zorbalık), IETC-IDEC 21, IQC 21, ITEC 21, ISTEC 21, INTE 21, IWSC 21, ITICAM 21, Conference Paper, (s.503-527). Jindal, N., & Liu, B. (2008). Opinion spam and analysis. In Proceedings of The International Conference on Web Search And Web Data Mining, (pp.219-230), New York, ACM.
  • Kalaycı, E. (2010). Üniversite öğrencilerinin siber aylaklık davranışları ile öz düzenleme stratejileri arasındaki ilişkilerin incelenmesi, (Yayınlanmamış Yüksek Lisans Tezi), Hacettepe Üniversitesi Fen Bilimleri Enstitüsü.
  • Kara, I., & Aydos, M. (2022). The Rise of ransomware: Forensic analysis for Windows based ransomware attacks. Expert Systems With Applications, 190(2022), 1-14. https://doi.org/10.1016/j.eswa.2021.116198
  • Kaşıkçı, D. N., Çağıltay, K., Karakuş, T., Kurşun, E., & Ogan, C. (2014). Türkiye ve Avrupa’daki çocukların internet alışkanlıkları ve güvenli internet kullanımı, Eğitim ve Bilim 2014, 39(171), 230-243.
  • Kharraz, A. (2016). UNVEIL: A Large-Scale, Automated Approach to Detecting Ransomware, In Proceedings of the 25th USENIX Security Symposium (USENIX Security 16), (pp.757-772), USENIX Association.
  • Kharraz, A., Robertson, W., Balzarotti, D., Bilge, L., Kirda, E. (2015). Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks, in Detection of Intrusions and Malware, and Vulnerability Assessment, Vol. 9148 of Lecture Notes in Computer Science, (pp.3-24), Springer International Publishing, Cham.
  • Kirda, E. (2017). UNVEIL: a large-scale, automated approach to Detecting ransomware (keynote). In 2017 IEEE 24th International Conference on Software Analysis, Evolution and Reengineering (SANER), (pp.1-1), IEEE. https://doi.org/ 10.1109/SANER.2017.7884603.
  • Kolukırık, S. & Gün, E. (2020). Bilişim teknolojilerinin suç eylemi üzerindeki etkisi: İnternet haberlerinde dijital suç örneği. ZfWT 12(3), (2020), 323‐339.
  • Korkmaz, M., & Kıran-Esen, B. (2012). The Effects of peer-training about secure internet use on adolescents. Turkish Psychological Counseling and Guidance Journal, 2012, 4(38), 180-187.
  • Kowalski, R.M., Limber, S. P. & Agatston, P.W. (2012). Cyberbullying: Bullying in the digital age. Wiley & Blackwell. Kowalski, R. M., Giumetti, G. W., Schroeder, A. N., & Lattanner, M. R. (2014). Bullying in the digital age: A critical review and meta-analysis of cyberbullying research among youth. Psychological Bulletin, 140(4), 1073-1137. https://doi.org/10.1037/a0035618
  • Krippendorff, K. (2013). Content analysis: An Introduction to its methodology (3.Ed.). Sage.
  • Krishnan, H.R., Saketh, S.Y., Vaibhav, V.T.M. (2015). Cryptocurrency mining-transition to cloud. (IJACSA) International Journal of Advanced Computer Science and Applications, 6(9), 2015, 115-124.
  • Krueger, M. (1991). Artificial reality II. Addison-Wesley, Reading.
  • Kshetri, N., & Voas, J. (2022). Cryptojacking. Computer. IEEE, Computer Society, 55(1), 18-19. https://doi.org/10.1109/MC.2021.3122474
  • Kuehl, D.T. (2009). From Cyberspace to Cyber-power: Defining the Problem, in Cyberpower and National Security, ed. by F.D. Kramer, S. Starr, L.K. Wentz, National Defense University Press, Washington (D.C.).
  • Kut, S. (2013). Sibertektonik mekân. (Yayımlanmamış Doktora Tezi). İstanbul Teknik Üniversitesi Fen Bilimleri Enstitüsü.
  • Lacey, B. (2007). Social aggression: a study of internet harassment. (Unpublished Doctoral Dissertation), Long Island University. New York, USA.
  • Lenhart, A. (2007). Cyberbullying and online teens. http://www.pewinternet.org/pdfs/PIP%20Cyberbullying%20Memo.pdf. Accessed:12.10.2023.
  • Levy, P. (1997). Collective intelligence: Mankind’s emerging world in cyberspace. Perseus Books.
  • Li, F., Huang, M., Yang, Y., & Zhu, X. (2011) Learning to Identify Review Spam, DBLP Conference IJCAI 2011, January 2011, Proceedings of the 22nd International Joint Conference on Artificial Intelligence, 16-22, July 2011, (pp.2488-2493), Barcelona, Catalonia, Spain. https://doi.org/10.5591/978-1-57735-516-8/IJCAI11-414
  • Li, H., Zhou, S.Y., Yuan, W., Li, J., & Leung, H. (2020). Adversarial-example attacks toward android malware detection system. Fellow, IEEE Systems Journal, 14(1), March 2020, 653-656. https://doi.org/10.1109/JSYST.2019.2906120
  • Li, Q. (2006). Cyberbullying in Schools: A Research of Gender Differences. School Psychology International. 2006; 27(2),157-170. https://doi.org/10.1177/0143034306064547
  • Liang, H., & Xue, Y. (2009). Avoidance of information technology threats: A Theoretical perspective. MIS Quarterly, 33(1), 71-90.
  • Lim, V.K., & Chen, D.J. (2012). Cyberloafing at the workplace: Gain or drain on work? Behaviour & Information Technology, 31(4), 343-353.
  • Lippert, K.J., & Cloutier, R. (2021). Cyberspace: A Digital Ecosystem. Systems 2021, 9-48. https://doi.org/10.3390/systems9030048
  • Little, D., Shinder, J., & Cross, M. (2008). Scene of the cybercrime. New York, USA, Elsevier.
  • Martin, K.A & Leary, M.R. (1999). Would you drink after a stranger? the influence of self-presentational motives on willingness to take a health risk. Personality & Social Psychology Bulletin, 25(9), 1092-1111.
  • McCombs, R., Barnes, J., Sood, K., & Barton, I. (2018). Wannamine Cryptomining: Harmless Nuisance or Disruptive Threat? https://www.crowds-trike.com/blog/cryptomining-harmless-nuisance-disruptive-threat Accessed: 21.04.2023.
  • McLuhan, M. (1964). Understanding media: The Extensions of man. McGraw Hill.
  • Medin, B. (2018). Dijital kültür, dijital yerliler ve günümüzdeki yeni film seyir deneyimleri, Erciyes İletişim Dergisi Akademia, 2018, 5(3), 142-158.
  • Meland, P.H., Bayoumy, Y., & Sindre, G. (2020). The Ransomware-as-a-service economy within the darknet. Computers & Security, 92. 101762. https://doi.org/10.1016/j.cose.2020.101762
  • Messmer, E. (2023). Tech talk: Where’d it come from, anyway?, Pc World: Business Cen. https://www.pcworld.com/article/147698/tech.html Accessed: 14.08.2023.
  • Metin, O. & Karakaya, Ş. (2017). Jean Baudrillard perspektifinden sosyal medya analizi denemesi. Afyon Kocatepe Üniversitesi Sosyal Bilimler Dergisi, 19(2), 109-121.
  • Mitchell, T.M. (1997). Machine learning. New York, USA, McGraw-Hill.
  • Monica, Z.P, & Lindskog, D. (2016). Experimental analysis of ransomware on Windows and android platforms: Evolution and characterization. Procedia Computer Science, December 2016, 94, 465-472.
  • Moore, T., & Clayton, R. (2007). Examining the impact of website take-down on Phishing. In Proceedings of The Anti-Phishing Working Group's Annual Ecrime Researchers Summit, (pp.1-13), ACM.
  • Mukhopadhyay, U., Skjellum, A., Hambolu, O., Oakley, J., Yu, L., Brooks, R. (2016). A Brief survey of Cryptocurrency systems. In 2016 14th Annual Conference on Privacy, Security and Trust (PST). (pp.745-752), IEEE. https://doi.org/10.1109/PST.2016.7906988
  • Musch, M., Wressnegger, C., Johns, M., Rieck, K. (2019). Thieves in the browser: web-based cryptojacking in the wild, In The 14th International Conference, (pp.1-10), ACM.
  • Nagy, P., & Koles, B. (2014). The Digital transformation of human identity: Towards a conceptual model of virtual identity in virtual worlds. Convergence, 20(3), 276-292.
  • Nakamoto, S. (2008). Bitcoin: A Peer-To-Peer Electronic Cash System. 1-9, 2008. https://www.ussc.gov/sites/default/files/pdf/training/annual-national-training-seminar/2018/Emerging_Tech_Bitcoin_Crypto.pdf Accessed: 11.06.2023.
  • Nindyati, O., & Nugraha, I.G.B.B. (2019). Detecting scam in online job vacancy using behavioral features extraction. 2019 International Conference on ICT for Smart Society (ICISS), (pp.1-4), Bandung, Indonesia. https://doi.org/10.1109/ICISS48059.2019.8969842
  • Nowicki, J. M. (2020). Data Security: Recent K-12 Data Breaches Show that Students are Vulnerable to Harm, GAO Reports, September 2020, 1-22. https://www.gao.gov/assets/710/709463.pdf Accessed: 23.12.2023.
  • O’Kane, P., Sezer, S., & Carlin, D. (2018). Countering cyber threats for industrial applications: An automated approach for malware evasion detection and analysis”. Journal of Network and Computer Applications, 7(5), 321-327. https://doi.org/10.1049/ntw2.v7.510.1049/iet-net.2017.0207
  • Özdemir, N. G. (2006). Sanal topluluklarda izlenimi yönetme. (Yayımlanmamış Yüksek Lisans Tezi), Ankara Üniversitesi Sosyal Bilimler Enstitüsü, 179s.
  • Öztürk, G. (2013). Dijital reklamcılık ve gençlik. Beta Yayınları.
  • Peker, A, & Ekinci, E. (2016). Genel öz-yeterliğin siber zorbalıkla başa çıkma davranışları üzerindeki yordayıcı etkisi. Uluslararası Türkçe Edebiyat Kültür Eğitim (TEKE) Dergisi, 5(4), 2126-2140. https://dergipark.org.tr/tr/pub/teke/issue/26927/283128
  • Purkait, S. (2012). Phishing counter measures and their effectiveness literature review. Information Management & Computer Security, 20(5), 382-420. http://dx.doi.org/10.1108/09685221211286548
  • Pusey, P., & Sadera, W. A. (2012). Cyberethics, cybersafety, and cybersecurity: Preservice teacher knowledge, preparedness, and the need for teacher education to make a difference. Journal of Digital Learning in Teacher Education, 28(2), 82-88.
  • Qamar, A., Karim, A., & Chang, V. (2019). Mobile malware attacks: Review, taxonomy & future directions. Future Generation Computer Systems, 97(2019), 887-909. https://doi.org/10.1016/j.future.2019.03.007
  • Raad, M., Yeassen, N.M., Alam, G.M., Zaidan, B.B., & Zaidan, A.A. (2010). Impact of spam advertisement through e-mail: A Study to assess the influence of the anti-spam on the e-mail marketing. African Journal of Business Management, 4(11), 2362-2367.
  • Ralston, S. M. & Kirkwood, W. G. (1999). The Trouble with applicant impression management. Journal of Business and Technical Communication, 13(2), 190-207.
  • Rass, S., Schauer, S., König, S., & Zhu, Q. (2020). Cyber-Security in Critical Infrastructures A Game-Theoretic Approach, Springer, Cham, Switzerland.
  • Ray, I., & Poolsapassit, N. (2005). Using Attack Trees to Identify Malicious Attacks from Authorized Insiders. S. De Capitani di Vimercati et al. (Eds.), ESORICS 2005, LNCS 3679, (pp.231-246), Springer-Verlag, Berlin Heidelberg.
  • Razali, M.A., & Mohd, S.S. (2019). CMBlock: In-Browser detection and prevention cryptojacking tool using blacklist and behavior-based detection method. In Badioze Zaman, H., et al. Advances in Visual Informatics, IVIC 2019. Lecture Notes in Computer Science, Vol 11870. (pp.1-12), Springer, Cham. https://doi.org/10.1007/978-3-030-34032-2_36
  • Reshmi, T.R. (2021). Information security breaches due to ransomware attacks- A systematic literature review. International Journal of Information Management Data Insights, 1(2021), 1-10. https://doi.org/10.1016/j.jjimei.2021.100013
  • Rudd, E.M., Rozsa, A., Günther, M., Boult, T.E. (2017). A Survey of Stealth Malware Attacks, Mitigation Measures, and Steps Toward Autonomous Open World Solutions. IEEE Communications Surveys & Tutorials, 19(2), Second Quarter, 1145-1172.
  • Rüth, J., Zimmermann, T., Wolsing, K., & Hohlfeld, O. (2018). Digging into browser-based crypto mining. In: Proceedings of the Internet Measurement Conference 2018, (pp.70-76), ACM. https://doi.org/10.1145/3278532.3278539
  • Saad, M., Khormali, A., & Mohaisen, A. (2018). End-to-End analysis of in-browser cryptojacking, arXiv: Cryptography and Security, 1-15. https://doi.org/10.48550/arXiv.1809.02152
  • Sahami, M., Dumais, S., Heckerman, D., Horvitz, E. (1998). A Bayesian Approach to Filtering Junk E- Mail. In Learning for Text Categorization-Papers from the AAAI Workshop, Madison Wisconsin. AAAI Technical Report, WS-98-05, 55-62.
  • Sahoo, A.K., Sahoo, K.S., Tiwary, M. (2014). Signature based malware detection for unstructured data in Hadoop. In International Conference on Advances in Electronics Computers and Communications, (pp.1-6), IEEE.
  • Savage, K., Coogan, P., Lau, H. (2015). The Evolution of Ransomware. Symantec Security Tech. Report Version 1.0-August 6, Mountain View, CA, USA.
  • Sayar, K. (2002). Psikolojik mekân olarak siberalan. Yeni Symposium 40(2). 60-67.
  • Schneider, C.M., Moreira, A.A., Andrade, José, S. Jr., Havlin, S., & Herrmann, H.J. (2011). Mitigation of malicious attacks on networks. PNAS, March 8, 2011, 108(10), 3838-3841. https://dx.doi.org/10.1073/pnas.1009440108/-/DCSupplemental
  • Schroeder, K. (2002). Safe Internet Use. The Education Digest; Nov. 2002; 68(3), ProQuest Central, 70-73. Schroeder, A., & Lattanner, M. (2014). Bullying in the Digital Age: A Critical Review and Meta-Analysis of Cyberbullying Research Among Youth. Psychological Bulletin.
  • Sharifi, M., Fink, E., & Carbonell, J.G. (2011). Smartnotes: Application of crowdsourcing to the detection of web threats. Carnegie Mellon University. Journal Contribution, IEEE, 1-2.
  • Shinde, R., Veeken, P., Schooten, S., Berg, J. (2016). Ransomware: Studying transfer and mitigation. 2016 International Conference on Computing, Analytics and Security Trends, (CAST), 19-21 December 2016, (pp.90-95), IEEE.
  • Shusterman, R. (2000). Performing live: Aesthetic alternatives for the ends of art. Cornell University Press. Sırakaya, M. & Seferoğlu, S. S. (2018). Çocukların çevrim-içi ortamlarda karşılaştıkları riskler ve güvenli internet kullanımı. B. Akkoyunlu, A. İşman ve H. F. Odabaşı (Ed). Eğitim Teknolojileri Okumaları 2018, 12. Bölüm, (s.185-202), Pegem Akademi.
  • Simpson, B. & Murphy, M. (2014). Cyber-privacy or cyber-surveillance? legal responses to fear in cyberspace. Information & Communications Technology Law, 23(3), 189-191. https://doi.org/10.1080/13600834.2014.978551
  • Siroski, M., & Honig, A. (2012). Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software. San Francisco, CA, USA, No Starch Press,
  • Sittig, D.F, & Singh, H. (2016). A socio-technical approach to preventing, mitigating, and recovering from ransomware attacks”. Appl Clin Inform 7(2), 624-632. http://dx.doi.org/10.4338/ACI-2016-04-SOA-0064
  • Slonje, R., & Smith, P.K. (2008). Cyberbullying: Another main type of bullying? Scandinavian Journal of Psychology, 49, 147-154.
  • Slonje, R., Smith, P. K. & Frisén, A. (2013). The Nature of cyberbullying, and strategies for prevention, Computers in Human Behavior, 29(2013), 26-32.
  • Smith, P. K. (2011). Cyberbullying and cyber aggression, Handbook of school violence and school safety: International research and practice (2nd ed.). Jimerson, S.R., Nickerson, A.B., Mayer, M.J., & Furlong, M. J. (Eds.), Routledge. https://doi.org/10.4324/9780203841372
  • Srinivasan, C.R. (2017). Hobby hackers to billion-dollar industry: the evolution of ransomware, Computer Fraud & Security, 2017(11), 7-9. https://doi.org/10.1016/S1361-3723(17)30081-7
  • Statista (2023). Internet usage worldwide- Statistics & Facts. https://www.statista.com/topics/1145/internet-usage-worldwide/#statisticChapter
  • Statista (2024). Countries with the highest internet penetration rate as of April 2024 https://www.statista.com/statistics/227082/countries-with-the-highest-internet-penetration-rate/
  • Stratton, J. (2002). Siberalan ve kültürün küreselleştirilmesi. Mehmet Doğan (Çev.), Cogito Sayı: 30, Yapı Kredi Yayınları.
  • Suler, J. (1996). The Psychology of cyberspace. http://www.rider.edu/suler/psycyber/psycyber.html Accessed: 13.11. 2023
  • Şenel, S., Günaydın, S., Sarıtaş, M.T., & Çiğdem, H. (2019). Üniversite öğrencilerinin siber aylaklık seviyelerini yordayan faktörler. Kastamonu Education Journal, 27(1), 95-105. https://doi.org/10.24106/kefdergi.2376
  • Tailor, J.P., Patel, A.D. (2017). A Comprehensive survey: Ransomware attacks prevention, monitoring and damage control. International Journal of Research and Scientific Innovation (IJRSI), IV(VIS), June 2017, 116-121.
  • Taylor, P.J, Dargahi, T., Dehghantanha, A., Parizi, R.M., & Choo, K. (2019). A systematic literature review of blockchain cyber security. Digital Commun. Netw., 154, 3-13.
  • Tedeschi, J.T.; Lindskold, S. & Rosenfeld, P. (1985) Introduction to Social Psychology, West Publishing.
  • Tekiner, E., Acar, A., Uluagac, A.S., Kirda, E., Selcuk, A.A. (2021). SoK: Cryptojacking malware. In Proceedings of the 2021 IEEE European Symposium on Security and Privacy (EuroS P), 6-10 September 2021, (pp.120-139), IEEE. https://dx.doi.org/10.1109/EuroSP51992.%202021.00019
  • The Sun. (2018). Illegal Bitcoin Mining Factory Sparks Massive Blaze Thanks to Overheating Computers Used to Create Cryptocurrency. https://www.thesun.co.uk/news/5538526/bitcoin-mining-factory-cryptocurrency-illegal-russia-fire-overheating-computers/ Accessed: 07.05.2023.
  • TIFO-Today I Found Out (2012). This Day in History: The First Mass Commercial Internet Spam Campaign is Launched. https://www.todayifoundout.com/index.php/2012/04/this-day-in-history-the-first-mass-commercial-internet-spam-campaign-is-launched/ Accessed: 15.05.2023.
  • Timisi, N. (2005). Sanallığın gerçekliği: internetin kimlik ve topluluk alanlarına girişi, M. Binark & B. Kılıçbay (Der.). İnternet, Toplum, Kültür, (s.89-106), Epos Yayınları.
  • Törenli, N. (2005). Yeni medya, Yeni iletişim ortamı. Bilim ve Sanat Yayınları.
  • Tuparova, D., & Mehandzhiyska, K. (2018). Online educational computer games related to topic internet safety, analysis of case studies. Proceedings of the National Conference on Education and Research in the Information Society. (pp.057-066), Scitepress.
  • Turkle, S. (1996). Parallel lives: working on identity in virtual space. (In.) D. Grodin & T. R. Lindlof (Eds.), Constructing the self in a Mediated World, (pp.156-175), Sage. https://doi.org/10.4135/9781483327488.N10
  • Ugrin, C. J., Pearson, M.J. & Odom, M.D. (2007). Profiling cyber-slackers in the workplace: demographic, cultural, and workplace factors, Journal of Internet Commerce, 6(3), 75-89.
  • Van Schaik, P. (2017). Risk perceptions of cyber-security and precautionary behavior. Computers in Human Behavior, 75, 547-559.
  • Vishwanath, A., Herath, T., Chen, R., Wang, J., & Rao, H.R. (2011). Why do people get phished? Testing individual differences in Phishing vulnerability with in an integrated, information processing model. Decision Support Systems, 51(3), 576-586.
  • Venugopal, D., & Hu, G. (2008). Efficient signature based malware detection on mobile devices. Mobile Information Systems, 4(1), 33-49.
  • Vitak, J., Crouse, J. & LaRouse, R. (2011). Personal internet use at work: Understanding cyberslacking, Computers in Human Behavior, 27, 1751-1759. https://doi.org/10.1016/j.chb.2011.03.002
  • Willard, N. (2004). An educator’s guide to cyberbullying and cyberthreats. http://cyberbully.org/docs/cbcteducator.pdf Accessed: 12.10.2023.
  • Wang, A.H. (2010). Don’t follow me: Spam detection in Twitter. 2010 International Conference on Security and Cryptography (SECRYPT), (pp.1-10), Athens, Greece.
  • Wang, E. Shih-Tse (2019.) Effects of brand awareness and social norms on user-perceived cyber privacy risk. International Journal of Electronic Commerce, 23(2), 272-293. https://doi.org/10.1080/10864415.2018.1564553
  • Whitty, M.T., & Buchanan, T. (2012). The Online dating romance scam: A Serious crime. CyberPsychology, Behavior, and Social Networking, 15(3), 181-183. https://doi.org/10.1089/cyber.2011.0352
  • Wong-Lo, M., & Bullock, L. M. (2011). Digital aggression: Cyberworld meets school bullies. Part of a Special Issue: Cyberbullying By: Preventing School Failure, 55(2), 64-70. https://doi.org/10.1080/1045988X.2011.539429
  • Wu, C., Yao, W., Pan, W., Sun, G., Liu, J., & Wu, L. (2022). Secure control for cyber-physical systems under malicious attacks, in IEEE Transactions on Control of Network Systems, June 2022, 9(2), (pp.775-788), IEEE. https://dx.doi.org/10.1109/TCNS.2021.3094782
  • Wu, G., Greene, D., Smyth, B., & Cunningham, P. (2010). Distortion as a Validation Criterion in the Identification of Suspicious Reviews. Technical Report, UCD-CSI-2010-04, Dublin, Ireland, University College Dublin, 2010.
  • Xu, G., Dong, W., Xing, J., Lei, W., Liu, J., Gong, L., Feng, M., Zheng, X., & Liu, S. (2022). Delay-CJ: A novel cryptojacking covert attack method based on delayed strategy and its detection. Digital Communications and Networks, 1-11. https://doi.org/10.1016/j.dcan.2022.04.030
  • Xu, J.J. (2016). Are blockchains immune to all Malicious attacks?. Financial Innovation, 2(25),1-9. https://dx.doi.org/10.1186/s40854-016-0046-5
  • Yağcı, M. & Yüceler, A. (2016). Kavramsal boyutlarıyla sanal kaytarma. International Journal of Social Sciences and Education Research, 2(2), 531-540.
  • Yaman, E, & Peker, A. (2012). The perceptions of adolescents about cyberbullying and cybervictimization. Gaziantep University Journal of Social Sciences, 11(3), 819-833. https://dergipark.org.tr/tr/pub/jss/issue/24238/256940
  • Yang, A., Lu, C., Li, J., Huang, X., Ji, T., Li, X., & Sheng, Y. (2023). Application of meta-learning in cyberspace security: a survey, Digital Communications and Networks, 9(1), 2023,67-78. https://doi.org/10.1016/j.dcan.2022.03.007.
  • Yaşar, S. & Yurdugül, H. (2013). The Investigation of Relation Between Cyberloafing Activities and Cyberloafing Behaviors in Higher Education, Procedia- Social and Behavioral Sciences, 83, 600-604.
  • Yazgan, Ç. Ü. & Yıldırım, A. F. (2020). Üniversite gençliğinde internet bağımlılığı ve derslerde siber aylaklık davranışları, Gençlik Araştırmaları Dergisi, Aralık 2020, 8 (Özel Sayı), 5-23.
  • Yetimoğlu, B. (2022). Siber tehdit istihbaratıyla özgün tehdit aktörleri veri kümesi oluşturma ve sınıflandırma, Yüksek Lisans Tezi, Fırat Üniversitesi Fen Bilimleri Enstitüsü, Elazığ, 69s.
  • Yohanandhan, R.V., Elavarasan, R.M., Manoharan, P., Mihet-Popa, L. (2020). Cyber-Physical Power System (CPPS): A review on modeling, simulation, and analysis with cyber security applications. IEEE Access, 2020(8),151019-64.
  • Yoo, K.H., & Gretzel, U. (2009). Comparison of Deceptive and Truthful Travel Review. Information and Communication Technologies in Tourism, 1(1), 37-47.
  • Yüksel, E. (2019). Türkiye’de iletişim araştırmalarında içerik analizi uygulamaları, sorunlar ve çözüm önerileri, International Euroasia Congress on Scientific Researches and Recent Trends-V, 16-19 DEC, 2019, The Book of Full Texts Volume-II, Editors. Prof. Dr. Gülzar İbrahimova & Dr. Terane Nağiyeva ISBN 978-625-7029-51-3, (s.134-152), Bakü, Azerbaycan.
  • Zeng, A., & Liu, W. (2012). Enhancing network robustness against malicious attacks, Physical Rev. E 85, 1-7. https://dx.doi.org/10.1103/PhysRevE.85.066130
  • Zhang, X., Ma, H., & Tse, C.K. (2022a). Assessing the robustness of cyber-physical power systems by considering wide-area protection functions. IEEE J Emerg Sel Top Circ Syst, 12(1), 107-114.
  • Zhang, X., Liu, D., Tu, H., & Tse CK. (2022b). An integrated modeling framework for cascading failure study and robustness assessment of cyber-coupled power grids. Reliability Engineering & System Safety, 226, 108654.
  • Zheng, M., Sun, M., Lui, J.C.S. (2013). Droid analytics: A Signature based analytic system to collect, extract, analyze and associate android malware. In IEEE Conference on Trust, Security and Privacy in Computing and Communications, 2013.
  • Zimba, A., Wang, Z., Mulenga, M., Odongo, N.H. (2020). Crypto mining attacks in information systems: An emerging threat to cyber security. Journal of Computer Information Systems, 60(4), 297-308. https://doi.org/10.1080/08874417.2018.1477076
  • Zinderen, İ. E. (2020). Yeni medyada kimlik inşası: youtuber kimliğine ilişkin bir inceleme, Erciyes İletişim Dergisi, Ocak/January 2020, 7(1), 415-434. https://doi.org/10.17680/erciyesiletisim.650956

TYPOLOGIES OF CRIME IN CYBER SPACE AND ANALYSIS OF CYBER COMMUNICATION BASED ANALYSIS MODEL

Year 2024, , 1375 - 1400, 03.12.2024
https://doi.org/10.17780/ksujes.1477116

Abstract

The rapid transformation of Internet-based network technologies increases the participation of individuals in virtual environments day by day. The internet environment is also used extensively by individuals who aim to illegally obtain other people's data. In the cyber world, the problematic of acquisition behavior and piracy is shifting from physical to digital spaces. In this study, query monitoring was carried out through the customized Domain Name System introduced against illegal transactions in cyberspace. During the implementation process, queries and other analyses were tracked using a one-month set of fully measured and precise data streams. Follow content primarily conducted through the application specified in the scope of the analysis for filtering, filtering in the list according to the analysis of a total of 64, 48 foreign filter (%87,3) Turkish as a filter 7 units (%12,7), and 9 common feature filters which filter typology emerges. Regarding the query; four basic value systems have been created and the system has been created in the form of the Number of Domain Name System Queries, the Number of Obstacles, Malware and Phishing, and Adult Content Sites. In the study, the levels of crime typologies are statistically analyzed through IP and DNS samples over the relevant directive.

References

  • Abdüsselam, M. S., Burnaz, E., Ayyıldız, H., & Demir, İsmail K. (2015). web teknolojilerinin e-ticaret ortamlarında kullanımı ile ilgili içerik analizi: Türkiye’deki ilk 500 e-tı̇caret sitesi. KTÜ, SBE Sos. Bil. Dergisi, 2015(10), 263-284.
  • Abide, Ö. F., & Gelişli, Y. (2020). Sosyal bilgiler ders kitaplarının ve öğretim programlarının çocukların güvenli internet kullanımları açısından incelenmesi. JRES, 7(1), 248-269.
  • Akbanov, M., Vassilakis, V.G., & Logothetis, M.D. (2019). Ransomware detection and mitigation using software-defined networking: The case of WannaCry. Computers & Electrical Engineering, 76, 111-121. https://doi.org/10.1016/j.compeleceng.2019.03.012
  • Akbulut, Y., Dursun, Ö.Ö., Dönmez, O., & Şahin, Y.L. (2016). In search of a measure to investigate cyberloafing in educational settings. Computers in Human Behavior, 55, 616-625.
  • Akgün, E. (2022). Güvenli internet ile ilgili tezlerdeki yöntemsel eğilimlerin sistematik incelenmesi. Instructional Technology and Lifelong Learning, 3(1), 64-87. https://doi.org/10.52911/itall.1062981
  • Akman, T. (1982). bilimler bilimi sibernetik. Karacan Yayıncılık.
  • Akyüz, A., & Koç, Z. (2020). Empati yönelimli siber zorbalık psiko-eğitim programının lise 9. ve 10. sınıf öğrencilerinin siber zorbalık ve empati düzeylerine etkisi. Gazi Üniversitesi Gazi Eğitim Fakültesi Dergisi, 40(1), 75-111. https://doi.org/10.17152/gefad.695923
  • Alan, H. (2019). Sosyal ağ kullanımı yoğunluğu ve sanal kaytarma davranışları: Üniversite öğrencileri üzerine bir inceleme. Çağdaş Yönetim Bilimleri Dergisi, 6(2), 112-129. https://dergipark.org.tr/tr/pub/cybd/issue/49666/495333
  • Allen, M. (2006). Social engineering: A Means to violate a computer system. Tech. Rep., SANS Institute. Anandarajan, M., & Simmers, C. A. (2005). Developing human capital through personal web use in the workplace: Mapping employee perceptions. Communications of The Association For Information Systems, 15, 776-791. https://doi.org/10.17705/1CAIS.01541
  • Androutsopoulos, I., Paliouras, G., Karkaletsis, V., Sakkis, G., Spyropoulos, C.D., & Stamatopoulos, P. (2000). Learning to filter spam e-mail: a comparison of a naive bayesian and a memory-based approach.
  • Zaragoza H, Gallinari P, Rajman M. (Eds.), Proceedings of the workshop, Machine Learning and Textual Information Access, (pp.1-13), 4th European Conference on Principles and Practice of Knowledge Discovery in Databases (PKDD-2000), Lyon, France, September 2000.
  • Aponte-Novoa, F.A., & Villanueva-Polanco, R. (2022a). On proof-of-accuracy consensus protocols. Mathematics, 2022(10), 2540, 1-27. https://doi.org/10.3390/math10142504
  • Aponte-Novoa, F.A, Povedano Álvarez, D., Villanueva-Polanco, R., Sandoval Orozco, A.L., & García Villalba, L.J. (2022b). On detecting cryptojacking on websites: Revisiting the use of classifiers. Sensors, 22(23), 9219, 1-15. https://doi.org/10.3390/s22239219
  • APWG. (Anti-Phishing Working Group). (2013). Phishing Activity Trends Report-4th Quarter 2013. http://apwg.org/resources/apwg-reports Accessed:17.11.2023.
  • Arabacı, İ. (2017). Investigation faculty of education students cyberloafing behaviors in terms of various variables. The Turkish Online Journal of Educational Technology, 16(1), 72-82.
  • Arachchilage, N.A.G, & Love, S.A (2013). Game design framework for avoiding phishing attacks. Computers in Human Behavior 29(2013) 706-714. http://dx.doi.org/10.1016/j.chb.2012.12.018
  • Arıcak, T., Siyahhan, S., Uzunhasanoglu, A., Saribeyoglu, S., Çıplak, S., Yılmaz, N., & Memmedov, C. (2008). Cyberbullying among Turkish adolescents. CyberPsychology Behavior, 11(3), 253-261. https://doi.org/10.1089/CPB.2007.0016
  • Aslan, A. & Karakuş Yılmaz, T. (2017). Türkiye’de güvenli internet kullanımına yönelik gerçekleştirilen uygulamalar. Dumlupınar Üniversitesi Sosyal Bilimler Dergisi, 53. Sayı-Temmuz 2017, 121-143.
  • Aslan, O, & Akin, E. (2022). Malware detection method based on file and registry operations using machine learning. Sakarya University Journal of Computer and Information Sciences, 5(2), 134-146. https://doi.org/10.35377/saucis...1049798
  • Aziz, A. (1990). Araştırma yöntemleri-teknikleri ve ı̇letişim. A. Ü Siyasal Bilgiler Fakültesi ve Basın-Yayın Yüksekokulu Basımevi.
  • Bağrıyanık, M. F. (2018). Dijital alanın tipolojileri: dijital kültüre dair sosyolojik bir okuma, Yüksek Lisans Tezi, Selçuk Üniversitesi Sosyal Bilimler Enstitüsü, Konya, 111s.
  • Baldwin, J., & Dehghantanha A. (2018). Leveraging support vector machine for opcode density based detection of crypto-ransomware. In Cyber Threat Intelligence, Cham: Springer, 107-136, https://doi.org/10.1007/978-3-319-73951-9_6
  • Bargh, J.A., & McKenna, K.Y.A (2004). The internet and social life. Annual Review of Psychology, 55, 573-590. Barreno, M., Nelson, B., Joseph, A., & Tygar, J. (2010). The security of machine learning. Machine Learning, 81, 121-148.
  • Baykara, M., & Gürel, Z.Z. (2018). Detection of phishing attacks. 2018 6th International Symposium on Digital Forensic and Security Antalya, Turkey, 2018, (pp.1-5), ISDFS. https://doi.org/10.1109/ISDFS.2018.8355389
  • Bazrafshan, Z., Hashemi, H., Fard, S.M.H., & Hamzeh, A. (2013). A Survey on heuristic malware detection techniques. In IEEE Conference on Information and Knowledge Technology, (pp.113-120), IEEE.
  • Becker, J., Breuker, D., Heide, T., Holler, J., Rauer, H.P., & Böhme, R. (2013). Can we afford integrity by proof-of-work? Scenarios inspired by the Bitcoin currency. The Economics of Information Security and Privacy; 2013, Springer: Berlin, Heidelberg, 135-156.
  • Becker, T.E., & Martin, S.L. (1995). Trying to look bad at work: Methods and motives for managing poor impressions in organisations, Academy of Management Journal, 28(1), 174-200.
  • Berelson, B. (1952). Content analysis in communication research. Free Press.
  • Berelson, B., & Lazarsfeld, P. F. (1948). The Analysis of communication content. University of Chicago and Columbia University.
  • Bergholz, A., DeBeer, J., Glahn, S., Moens, MF, Paaß, G., & Strobel, S. (2010). New filtering approaches for Phishing e-mail. Journal of Computer Security, 18(1), 7-35.
  • Beugre, C. D., & Daeryong, K. (2006). Cyberloafing: Vice or Virtue? Mehdi Khosrow Pour (Ed.), Emerging Trends and Challenges in Information Technology Management, (pp.834-835), Idea Group Inc.
  • Bhavsar, V., Kadlak, A., & Sharma, S. (2018). Study on phishing attacks. International Journal of Computer Applications, (0975-8887), 182(33), December 2018, 27-29.
  • Bhowmick, A., & Hazarika, S. (2018). E-Mail spam filtering: a review of techniques and trends, Bhowmick, Kalam A, Das S, Sharma K. (Eds.) Advances in Electronics, Communication and Computing. Lecture Notes in Electrical Engineering, Vol 443, (pp.583-590), Springer, Singapore. https://doi.org/110.1007/978-981-10-4765-7_61
  • Bilgin, N. (2006). Sosyal bilimlerde içerik analizi teknikler ve örnek çalışmalar. İkinci Baskı. Siyasal. Bin Abbas, M.F., & Srikanthan, T. (2017). Low-complexity signature-based malware detection for IOT devices. In International Conference on Applications and Techniques in Information Security, (pp.181-189), Springer.
  • Blanchard, A. & Henle, C. (2008). Correlates of different forms of cyberloafing: The Role of norms and external locus of control. Computers in Human Behavior, 24(3), 1067-1084.
  • Bozeman, D. P., & Kacmar, K.M. (1997). A Cybernetic model of impression management processes in organisations. Organisational Behaviour and Human Decision Processes, 69(1), 9-30.
  • Brody, R.G., Mulig, E., & Kimball, V. (2007). Phishing, pharming and identity theft. Journal of Academy of Accounting and Financial Studies, 11, 43-56.
  • Brown, D.S. (2016). Cryptocurrency and criminality. The Police Journal: Theory Practice and Principles, 89(4), 327-339. https://doi.org/10.1177/0032258x16658927
  • Brown, D. S., & Wang, T. (2008). Cyberethics: identifying the moral, legal and social issues of cybertechnology in k-12 classrooms. College Teaching Methods & Styles Journal, 4(2), 29-36.
  • Bulut, S. & Gündüz, S. (2012). Exploring violence in the context of Turkish culture and schools. S. R. Jimerson, A. B. Nickerson, M. J. Mayer, & M. J. Furlong (Eds.), (In.) Handbook of School Violence and School Safety: International Research and Practice (2nd Ed.) (pp.165-174), Routledge.
  • Canavan, J.E. (2001). Fundamentals of network security. London, UK, Artech House.
  • Carlin, D., Burgess, J., O’Kane, P., & Sezer S. (2020). You could be mine(d): The Rise of cryptojacking. IEEE Security & Privacy, 2020(18), 16-22. https://doi.org/10.1109/MSEC.2019.2920585
  • Carlin D, O’Kane P, Sezer S, & Burgess J. (2018). Detecting cryptomining using dynamic analysis. In: 2018 16th Annual Conference on Privacy, Security and Trust (PST), (pp.1-6), IEEE. https://doi.org/10.1109/pst.2018.8514167 (08.05.2023).
  • Cassidy, W., Faucher, C., & Jackson, M. (2013). Cyberbullying among youth: a comprehensive review of current international research and its implications and application to policy and practice, School Psychology International, 34(6) 2013, 575-612. https://doi.org/10.1177/0143034313479697
  • Castells, M. (2005). Ağ toplumunun yükselişi, enformasyon çağı: ekonomi, toplum, kültür. (çev. Ebru Kılıç). Birinci Cilt, İstanbul Bilgi Üniversitesi Yayınları.
  • Chickowski, E. (2022). Cryptojacking Explained: How To Prevent, Detect, and Recover From it. https://www.csoonline.com/article/564521/what-is-cryptojacking-how-to-prevent-detect-and-recover-from-it.html Accessed: 22.09.2023.
  • Clayton R. (2005). Insecure Real World Authentication Protocols (or why is phishing so profitable). http://www.cl.cam.ac.uk/users/rnc1/phishproto.pdf. Accessed: 21.09.2023.
  • Clynes, M. E., & Kline, N. S. (1960). Cyborgs and Space. Astronautics, September, 26-76. Cutler, R. (1996). Technologies, relations, and selves. (In.) L. Strate, R. Jacobson, & S. Gibson (Eds.), Communication and Cyberspace: Social Interaction in an Electronic Environment, (pp.317-333), Hampton. Çetin, B. A., & Ceyhan, A. A. (2014). Ergenlerin İnternet’te Kimlik Denemeleri ve Problemli İnternet Kullanım Davranışları. The Turkish Journal on Addictions, 1(2), 5-46.
  • Dashevskyi, S., Zhauniarovich, Y., Gadyatskaya, O., Pilgun, A., & Ouhssain, H. (2020). Dissecting android cryptocurrency miners. ACM, 2020, 191-202.
  • Do, C. T., Tran, N. H., Hong, C., Kamhoua, C.A., Kwiat, K. A., Blasch, E., Ren, S., Pissinou, N. & Iyengar, S. S. (2017). Game theory for cyber security and privacy. ACM Computing Surveys, 50(2), Article 30, (May 2017), 1-37. http://dx.doi.org/10.1145/3057268
  • Doss, A. F. (2020). Cyber Privacy: Who Has Your Data And Why You Should Care. (1st Ed.) Ben Bella Books Inc. Duda, R.O., & Hart, P.E. (1973). Bayes Decision Theory. Chapter 2, Pattern Classification and Scene Analysis, 10-43, New York, John Wiley.
  • Erdur-Baker, Ö., Kavşut, F. (2007). Akran zorbalığının yeni yüzü: siber zorbalık cyber bullying: a new face of peer bullying. Eurasian Journal of Educational Research, 27, 2007, 31-42.
  • Ergün, E., & Altun, A. (2012). Öğrenci gözüyle siber aylaklık ve nedenleri. Eğı̇tı̇m Teknolojisi̇ Kuram ve Uygulama, 2(1), 2012, 36-53.
  • Erkoç, M. F. (2018). Güvenli internet kullanımı, Bilişim Teknolojileri, (İçinde) Serdar Bahadır Kert, (Ed.), (s.399-422), Nobel Yayın Dağıtım,
  • Ferrante, A., Malek, M., Martinelli, F., Mercaldo, F., & Milosevic, J. (2017). Extinguishing ransomware-a hybrid approach to android ransomware detection. In International Symposium on Foundations and Practice of Security, (pp. 242-258), Springer, Cham. https://doi.org/10.1007/978-3-319-75650-9_16
  • Fette, I., Sadeh, N., Tomasic, A. (2007). Learning to detect Phishing emails. In Proceedings of the 16th International Conference on World Wide Web (WWW), ACM, May 2007, (pp.649-656), Banff, Canada.
  • Fielder, A., König, S., Panaousis, E., Schauer, S., & Rass, S. (2018). Risk Assessment Uncertainties in Cybersecurity Investments. Games 2018, 9, 34. https://doi.org/10.3390/g9020034
  • Garrett, R.K. & Danziger, J.N. (2008). On Cyberslacking: workplace status and personal internet use at work, Cyberpsychology & Behaviour, (11)3, 287-292.
  • Gibson, W. (1984). Neuromancer. Penguin Putnam Inc.
  • Gomez-Hernandez, J.A., Alvarez-Gonzalez, L., & García-Teodoro, P. (2018). R-Locker: Thwarting ransomware action through a honeyfile-based approach. Computers & Security, 73, 389-398. https://doi.org/10.1016/j.cose.2017.11.019
  • Goni, O. (2022), Cyber crime and its Classification, Int. J. of Electronics Engineering and Applications,10(1), 01-17, https://doi.org/10.30696/IJEEA.X.I.2021.01-17
  • Gökçe, O. (2006). İçerik çözümlemesi kuramsal ve pratik bilgiler. Siyasal Kitabevi.
  • Greene, M.B. (2006). Bullying in school: A Plea for measure of human rights. Journal of Social Issues 62, 63-69.
  • Gyöngyi, Z., Garcia-Molina, H., & Pedersen, J. (2004). Combating web spam with trustrank. In Proceedings of The Thirtieth International Conference on Very Large Data Bases, Volume 30, (pp.576–587), VLDB Endowment.
  • Haraway, D. (2006). Siborg manifestosu: Geç yirminci yüzyılda bilim, teknoloji ve sosyalist-feminizm. (Çev.) O. Akınhay. Agora Yayıncılık.
  • Herring, S. C. (2004). Content Analysis for New Media: Rethinking the Paradigm, New Research for New Media: Innovative Research Methodologies Symposium Working Papers and Readings, 47-66.
  • Hinduja, S., & Patchin, J.W. (2009). Bullying beyond the schoolyard: Preventing and responding to cyberbullying. Carwin Press.
  • Hong, G., Yang, Z., Yang, S., Zhang, L., Nan, Y., Zhang, Z., Yang, M., Zhang, Y., Qian, Z., Duan, H. (2018). How you get shot in the back: A Systematical study about cryptojacking in the real world. In 2018 ACM SIGSAC Conference on Computer and Communications Security (CCS ’18), (pp.1701-1713), ACM, NY, USA, 15-19 October 2018. https://doi.org/10.1145/3243734.3243840
  • Horan, C., & Saiedian, H. (2021). Cyber Crime Investigation: Landscape, Challenges, and Future Research Directions. J. Cybersecur. Priv. 2021, 1, 580–596. https://doi.org/10.3390/jcp1040029
  • Hu, W., & Tan Y. (2017). Generating adversarial malware examples for black-box attacks based on GAN, arXiv:1702.05983, 1-7. https://doi.org/10.48550/arXiv.1702.05983
  • İşman, A. & Açmacı, N. (2021). Siber zorbalık kavramı üzerinden bir film incelemesi: Cyberbully (sanal zorbalık), IETC-IDEC 21, IQC 21, ITEC 21, ISTEC 21, INTE 21, IWSC 21, ITICAM 21, Conference Paper, (s.503-527). Jindal, N., & Liu, B. (2008). Opinion spam and analysis. In Proceedings of The International Conference on Web Search And Web Data Mining, (pp.219-230), New York, ACM.
  • Kalaycı, E. (2010). Üniversite öğrencilerinin siber aylaklık davranışları ile öz düzenleme stratejileri arasındaki ilişkilerin incelenmesi, (Yayınlanmamış Yüksek Lisans Tezi), Hacettepe Üniversitesi Fen Bilimleri Enstitüsü.
  • Kara, I., & Aydos, M. (2022). The Rise of ransomware: Forensic analysis for Windows based ransomware attacks. Expert Systems With Applications, 190(2022), 1-14. https://doi.org/10.1016/j.eswa.2021.116198
  • Kaşıkçı, D. N., Çağıltay, K., Karakuş, T., Kurşun, E., & Ogan, C. (2014). Türkiye ve Avrupa’daki çocukların internet alışkanlıkları ve güvenli internet kullanımı, Eğitim ve Bilim 2014, 39(171), 230-243.
  • Kharraz, A. (2016). UNVEIL: A Large-Scale, Automated Approach to Detecting Ransomware, In Proceedings of the 25th USENIX Security Symposium (USENIX Security 16), (pp.757-772), USENIX Association.
  • Kharraz, A., Robertson, W., Balzarotti, D., Bilge, L., Kirda, E. (2015). Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks, in Detection of Intrusions and Malware, and Vulnerability Assessment, Vol. 9148 of Lecture Notes in Computer Science, (pp.3-24), Springer International Publishing, Cham.
  • Kirda, E. (2017). UNVEIL: a large-scale, automated approach to Detecting ransomware (keynote). In 2017 IEEE 24th International Conference on Software Analysis, Evolution and Reengineering (SANER), (pp.1-1), IEEE. https://doi.org/ 10.1109/SANER.2017.7884603.
  • Kolukırık, S. & Gün, E. (2020). Bilişim teknolojilerinin suç eylemi üzerindeki etkisi: İnternet haberlerinde dijital suç örneği. ZfWT 12(3), (2020), 323‐339.
  • Korkmaz, M., & Kıran-Esen, B. (2012). The Effects of peer-training about secure internet use on adolescents. Turkish Psychological Counseling and Guidance Journal, 2012, 4(38), 180-187.
  • Kowalski, R.M., Limber, S. P. & Agatston, P.W. (2012). Cyberbullying: Bullying in the digital age. Wiley & Blackwell. Kowalski, R. M., Giumetti, G. W., Schroeder, A. N., & Lattanner, M. R. (2014). Bullying in the digital age: A critical review and meta-analysis of cyberbullying research among youth. Psychological Bulletin, 140(4), 1073-1137. https://doi.org/10.1037/a0035618
  • Krippendorff, K. (2013). Content analysis: An Introduction to its methodology (3.Ed.). Sage.
  • Krishnan, H.R., Saketh, S.Y., Vaibhav, V.T.M. (2015). Cryptocurrency mining-transition to cloud. (IJACSA) International Journal of Advanced Computer Science and Applications, 6(9), 2015, 115-124.
  • Krueger, M. (1991). Artificial reality II. Addison-Wesley, Reading.
  • Kshetri, N., & Voas, J. (2022). Cryptojacking. Computer. IEEE, Computer Society, 55(1), 18-19. https://doi.org/10.1109/MC.2021.3122474
  • Kuehl, D.T. (2009). From Cyberspace to Cyber-power: Defining the Problem, in Cyberpower and National Security, ed. by F.D. Kramer, S. Starr, L.K. Wentz, National Defense University Press, Washington (D.C.).
  • Kut, S. (2013). Sibertektonik mekân. (Yayımlanmamış Doktora Tezi). İstanbul Teknik Üniversitesi Fen Bilimleri Enstitüsü.
  • Lacey, B. (2007). Social aggression: a study of internet harassment. (Unpublished Doctoral Dissertation), Long Island University. New York, USA.
  • Lenhart, A. (2007). Cyberbullying and online teens. http://www.pewinternet.org/pdfs/PIP%20Cyberbullying%20Memo.pdf. Accessed:12.10.2023.
  • Levy, P. (1997). Collective intelligence: Mankind’s emerging world in cyberspace. Perseus Books.
  • Li, F., Huang, M., Yang, Y., & Zhu, X. (2011) Learning to Identify Review Spam, DBLP Conference IJCAI 2011, January 2011, Proceedings of the 22nd International Joint Conference on Artificial Intelligence, 16-22, July 2011, (pp.2488-2493), Barcelona, Catalonia, Spain. https://doi.org/10.5591/978-1-57735-516-8/IJCAI11-414
  • Li, H., Zhou, S.Y., Yuan, W., Li, J., & Leung, H. (2020). Adversarial-example attacks toward android malware detection system. Fellow, IEEE Systems Journal, 14(1), March 2020, 653-656. https://doi.org/10.1109/JSYST.2019.2906120
  • Li, Q. (2006). Cyberbullying in Schools: A Research of Gender Differences. School Psychology International. 2006; 27(2),157-170. https://doi.org/10.1177/0143034306064547
  • Liang, H., & Xue, Y. (2009). Avoidance of information technology threats: A Theoretical perspective. MIS Quarterly, 33(1), 71-90.
  • Lim, V.K., & Chen, D.J. (2012). Cyberloafing at the workplace: Gain or drain on work? Behaviour & Information Technology, 31(4), 343-353.
  • Lippert, K.J., & Cloutier, R. (2021). Cyberspace: A Digital Ecosystem. Systems 2021, 9-48. https://doi.org/10.3390/systems9030048
  • Little, D., Shinder, J., & Cross, M. (2008). Scene of the cybercrime. New York, USA, Elsevier.
  • Martin, K.A & Leary, M.R. (1999). Would you drink after a stranger? the influence of self-presentational motives on willingness to take a health risk. Personality & Social Psychology Bulletin, 25(9), 1092-1111.
  • McCombs, R., Barnes, J., Sood, K., & Barton, I. (2018). Wannamine Cryptomining: Harmless Nuisance or Disruptive Threat? https://www.crowds-trike.com/blog/cryptomining-harmless-nuisance-disruptive-threat Accessed: 21.04.2023.
  • McLuhan, M. (1964). Understanding media: The Extensions of man. McGraw Hill.
  • Medin, B. (2018). Dijital kültür, dijital yerliler ve günümüzdeki yeni film seyir deneyimleri, Erciyes İletişim Dergisi Akademia, 2018, 5(3), 142-158.
  • Meland, P.H., Bayoumy, Y., & Sindre, G. (2020). The Ransomware-as-a-service economy within the darknet. Computers & Security, 92. 101762. https://doi.org/10.1016/j.cose.2020.101762
  • Messmer, E. (2023). Tech talk: Where’d it come from, anyway?, Pc World: Business Cen. https://www.pcworld.com/article/147698/tech.html Accessed: 14.08.2023.
  • Metin, O. & Karakaya, Ş. (2017). Jean Baudrillard perspektifinden sosyal medya analizi denemesi. Afyon Kocatepe Üniversitesi Sosyal Bilimler Dergisi, 19(2), 109-121.
  • Mitchell, T.M. (1997). Machine learning. New York, USA, McGraw-Hill.
  • Monica, Z.P, & Lindskog, D. (2016). Experimental analysis of ransomware on Windows and android platforms: Evolution and characterization. Procedia Computer Science, December 2016, 94, 465-472.
  • Moore, T., & Clayton, R. (2007). Examining the impact of website take-down on Phishing. In Proceedings of The Anti-Phishing Working Group's Annual Ecrime Researchers Summit, (pp.1-13), ACM.
  • Mukhopadhyay, U., Skjellum, A., Hambolu, O., Oakley, J., Yu, L., Brooks, R. (2016). A Brief survey of Cryptocurrency systems. In 2016 14th Annual Conference on Privacy, Security and Trust (PST). (pp.745-752), IEEE. https://doi.org/10.1109/PST.2016.7906988
  • Musch, M., Wressnegger, C., Johns, M., Rieck, K. (2019). Thieves in the browser: web-based cryptojacking in the wild, In The 14th International Conference, (pp.1-10), ACM.
  • Nagy, P., & Koles, B. (2014). The Digital transformation of human identity: Towards a conceptual model of virtual identity in virtual worlds. Convergence, 20(3), 276-292.
  • Nakamoto, S. (2008). Bitcoin: A Peer-To-Peer Electronic Cash System. 1-9, 2008. https://www.ussc.gov/sites/default/files/pdf/training/annual-national-training-seminar/2018/Emerging_Tech_Bitcoin_Crypto.pdf Accessed: 11.06.2023.
  • Nindyati, O., & Nugraha, I.G.B.B. (2019). Detecting scam in online job vacancy using behavioral features extraction. 2019 International Conference on ICT for Smart Society (ICISS), (pp.1-4), Bandung, Indonesia. https://doi.org/10.1109/ICISS48059.2019.8969842
  • Nowicki, J. M. (2020). Data Security: Recent K-12 Data Breaches Show that Students are Vulnerable to Harm, GAO Reports, September 2020, 1-22. https://www.gao.gov/assets/710/709463.pdf Accessed: 23.12.2023.
  • O’Kane, P., Sezer, S., & Carlin, D. (2018). Countering cyber threats for industrial applications: An automated approach for malware evasion detection and analysis”. Journal of Network and Computer Applications, 7(5), 321-327. https://doi.org/10.1049/ntw2.v7.510.1049/iet-net.2017.0207
  • Özdemir, N. G. (2006). Sanal topluluklarda izlenimi yönetme. (Yayımlanmamış Yüksek Lisans Tezi), Ankara Üniversitesi Sosyal Bilimler Enstitüsü, 179s.
  • Öztürk, G. (2013). Dijital reklamcılık ve gençlik. Beta Yayınları.
  • Peker, A, & Ekinci, E. (2016). Genel öz-yeterliğin siber zorbalıkla başa çıkma davranışları üzerindeki yordayıcı etkisi. Uluslararası Türkçe Edebiyat Kültür Eğitim (TEKE) Dergisi, 5(4), 2126-2140. https://dergipark.org.tr/tr/pub/teke/issue/26927/283128
  • Purkait, S. (2012). Phishing counter measures and their effectiveness literature review. Information Management & Computer Security, 20(5), 382-420. http://dx.doi.org/10.1108/09685221211286548
  • Pusey, P., & Sadera, W. A. (2012). Cyberethics, cybersafety, and cybersecurity: Preservice teacher knowledge, preparedness, and the need for teacher education to make a difference. Journal of Digital Learning in Teacher Education, 28(2), 82-88.
  • Qamar, A., Karim, A., & Chang, V. (2019). Mobile malware attacks: Review, taxonomy & future directions. Future Generation Computer Systems, 97(2019), 887-909. https://doi.org/10.1016/j.future.2019.03.007
  • Raad, M., Yeassen, N.M., Alam, G.M., Zaidan, B.B., & Zaidan, A.A. (2010). Impact of spam advertisement through e-mail: A Study to assess the influence of the anti-spam on the e-mail marketing. African Journal of Business Management, 4(11), 2362-2367.
  • Ralston, S. M. & Kirkwood, W. G. (1999). The Trouble with applicant impression management. Journal of Business and Technical Communication, 13(2), 190-207.
  • Rass, S., Schauer, S., König, S., & Zhu, Q. (2020). Cyber-Security in Critical Infrastructures A Game-Theoretic Approach, Springer, Cham, Switzerland.
  • Ray, I., & Poolsapassit, N. (2005). Using Attack Trees to Identify Malicious Attacks from Authorized Insiders. S. De Capitani di Vimercati et al. (Eds.), ESORICS 2005, LNCS 3679, (pp.231-246), Springer-Verlag, Berlin Heidelberg.
  • Razali, M.A., & Mohd, S.S. (2019). CMBlock: In-Browser detection and prevention cryptojacking tool using blacklist and behavior-based detection method. In Badioze Zaman, H., et al. Advances in Visual Informatics, IVIC 2019. Lecture Notes in Computer Science, Vol 11870. (pp.1-12), Springer, Cham. https://doi.org/10.1007/978-3-030-34032-2_36
  • Reshmi, T.R. (2021). Information security breaches due to ransomware attacks- A systematic literature review. International Journal of Information Management Data Insights, 1(2021), 1-10. https://doi.org/10.1016/j.jjimei.2021.100013
  • Rudd, E.M., Rozsa, A., Günther, M., Boult, T.E. (2017). A Survey of Stealth Malware Attacks, Mitigation Measures, and Steps Toward Autonomous Open World Solutions. IEEE Communications Surveys & Tutorials, 19(2), Second Quarter, 1145-1172.
  • Rüth, J., Zimmermann, T., Wolsing, K., & Hohlfeld, O. (2018). Digging into browser-based crypto mining. In: Proceedings of the Internet Measurement Conference 2018, (pp.70-76), ACM. https://doi.org/10.1145/3278532.3278539
  • Saad, M., Khormali, A., & Mohaisen, A. (2018). End-to-End analysis of in-browser cryptojacking, arXiv: Cryptography and Security, 1-15. https://doi.org/10.48550/arXiv.1809.02152
  • Sahami, M., Dumais, S., Heckerman, D., Horvitz, E. (1998). A Bayesian Approach to Filtering Junk E- Mail. In Learning for Text Categorization-Papers from the AAAI Workshop, Madison Wisconsin. AAAI Technical Report, WS-98-05, 55-62.
  • Sahoo, A.K., Sahoo, K.S., Tiwary, M. (2014). Signature based malware detection for unstructured data in Hadoop. In International Conference on Advances in Electronics Computers and Communications, (pp.1-6), IEEE.
  • Savage, K., Coogan, P., Lau, H. (2015). The Evolution of Ransomware. Symantec Security Tech. Report Version 1.0-August 6, Mountain View, CA, USA.
  • Sayar, K. (2002). Psikolojik mekân olarak siberalan. Yeni Symposium 40(2). 60-67.
  • Schneider, C.M., Moreira, A.A., Andrade, José, S. Jr., Havlin, S., & Herrmann, H.J. (2011). Mitigation of malicious attacks on networks. PNAS, March 8, 2011, 108(10), 3838-3841. https://dx.doi.org/10.1073/pnas.1009440108/-/DCSupplemental
  • Schroeder, K. (2002). Safe Internet Use. The Education Digest; Nov. 2002; 68(3), ProQuest Central, 70-73. Schroeder, A., & Lattanner, M. (2014). Bullying in the Digital Age: A Critical Review and Meta-Analysis of Cyberbullying Research Among Youth. Psychological Bulletin.
  • Sharifi, M., Fink, E., & Carbonell, J.G. (2011). Smartnotes: Application of crowdsourcing to the detection of web threats. Carnegie Mellon University. Journal Contribution, IEEE, 1-2.
  • Shinde, R., Veeken, P., Schooten, S., Berg, J. (2016). Ransomware: Studying transfer and mitigation. 2016 International Conference on Computing, Analytics and Security Trends, (CAST), 19-21 December 2016, (pp.90-95), IEEE.
  • Shusterman, R. (2000). Performing live: Aesthetic alternatives for the ends of art. Cornell University Press. Sırakaya, M. & Seferoğlu, S. S. (2018). Çocukların çevrim-içi ortamlarda karşılaştıkları riskler ve güvenli internet kullanımı. B. Akkoyunlu, A. İşman ve H. F. Odabaşı (Ed). Eğitim Teknolojileri Okumaları 2018, 12. Bölüm, (s.185-202), Pegem Akademi.
  • Simpson, B. & Murphy, M. (2014). Cyber-privacy or cyber-surveillance? legal responses to fear in cyberspace. Information & Communications Technology Law, 23(3), 189-191. https://doi.org/10.1080/13600834.2014.978551
  • Siroski, M., & Honig, A. (2012). Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software. San Francisco, CA, USA, No Starch Press,
  • Sittig, D.F, & Singh, H. (2016). A socio-technical approach to preventing, mitigating, and recovering from ransomware attacks”. Appl Clin Inform 7(2), 624-632. http://dx.doi.org/10.4338/ACI-2016-04-SOA-0064
  • Slonje, R., & Smith, P.K. (2008). Cyberbullying: Another main type of bullying? Scandinavian Journal of Psychology, 49, 147-154.
  • Slonje, R., Smith, P. K. & Frisén, A. (2013). The Nature of cyberbullying, and strategies for prevention, Computers in Human Behavior, 29(2013), 26-32.
  • Smith, P. K. (2011). Cyberbullying and cyber aggression, Handbook of school violence and school safety: International research and practice (2nd ed.). Jimerson, S.R., Nickerson, A.B., Mayer, M.J., & Furlong, M. J. (Eds.), Routledge. https://doi.org/10.4324/9780203841372
  • Srinivasan, C.R. (2017). Hobby hackers to billion-dollar industry: the evolution of ransomware, Computer Fraud & Security, 2017(11), 7-9. https://doi.org/10.1016/S1361-3723(17)30081-7
  • Statista (2023). Internet usage worldwide- Statistics & Facts. https://www.statista.com/topics/1145/internet-usage-worldwide/#statisticChapter
  • Statista (2024). Countries with the highest internet penetration rate as of April 2024 https://www.statista.com/statistics/227082/countries-with-the-highest-internet-penetration-rate/
  • Stratton, J. (2002). Siberalan ve kültürün küreselleştirilmesi. Mehmet Doğan (Çev.), Cogito Sayı: 30, Yapı Kredi Yayınları.
  • Suler, J. (1996). The Psychology of cyberspace. http://www.rider.edu/suler/psycyber/psycyber.html Accessed: 13.11. 2023
  • Şenel, S., Günaydın, S., Sarıtaş, M.T., & Çiğdem, H. (2019). Üniversite öğrencilerinin siber aylaklık seviyelerini yordayan faktörler. Kastamonu Education Journal, 27(1), 95-105. https://doi.org/10.24106/kefdergi.2376
  • Tailor, J.P., Patel, A.D. (2017). A Comprehensive survey: Ransomware attacks prevention, monitoring and damage control. International Journal of Research and Scientific Innovation (IJRSI), IV(VIS), June 2017, 116-121.
  • Taylor, P.J, Dargahi, T., Dehghantanha, A., Parizi, R.M., & Choo, K. (2019). A systematic literature review of blockchain cyber security. Digital Commun. Netw., 154, 3-13.
  • Tedeschi, J.T.; Lindskold, S. & Rosenfeld, P. (1985) Introduction to Social Psychology, West Publishing.
  • Tekiner, E., Acar, A., Uluagac, A.S., Kirda, E., Selcuk, A.A. (2021). SoK: Cryptojacking malware. In Proceedings of the 2021 IEEE European Symposium on Security and Privacy (EuroS P), 6-10 September 2021, (pp.120-139), IEEE. https://dx.doi.org/10.1109/EuroSP51992.%202021.00019
  • The Sun. (2018). Illegal Bitcoin Mining Factory Sparks Massive Blaze Thanks to Overheating Computers Used to Create Cryptocurrency. https://www.thesun.co.uk/news/5538526/bitcoin-mining-factory-cryptocurrency-illegal-russia-fire-overheating-computers/ Accessed: 07.05.2023.
  • TIFO-Today I Found Out (2012). This Day in History: The First Mass Commercial Internet Spam Campaign is Launched. https://www.todayifoundout.com/index.php/2012/04/this-day-in-history-the-first-mass-commercial-internet-spam-campaign-is-launched/ Accessed: 15.05.2023.
  • Timisi, N. (2005). Sanallığın gerçekliği: internetin kimlik ve topluluk alanlarına girişi, M. Binark & B. Kılıçbay (Der.). İnternet, Toplum, Kültür, (s.89-106), Epos Yayınları.
  • Törenli, N. (2005). Yeni medya, Yeni iletişim ortamı. Bilim ve Sanat Yayınları.
  • Tuparova, D., & Mehandzhiyska, K. (2018). Online educational computer games related to topic internet safety, analysis of case studies. Proceedings of the National Conference on Education and Research in the Information Society. (pp.057-066), Scitepress.
  • Turkle, S. (1996). Parallel lives: working on identity in virtual space. (In.) D. Grodin & T. R. Lindlof (Eds.), Constructing the self in a Mediated World, (pp.156-175), Sage. https://doi.org/10.4135/9781483327488.N10
  • Ugrin, C. J., Pearson, M.J. & Odom, M.D. (2007). Profiling cyber-slackers in the workplace: demographic, cultural, and workplace factors, Journal of Internet Commerce, 6(3), 75-89.
  • Van Schaik, P. (2017). Risk perceptions of cyber-security and precautionary behavior. Computers in Human Behavior, 75, 547-559.
  • Vishwanath, A., Herath, T., Chen, R., Wang, J., & Rao, H.R. (2011). Why do people get phished? Testing individual differences in Phishing vulnerability with in an integrated, information processing model. Decision Support Systems, 51(3), 576-586.
  • Venugopal, D., & Hu, G. (2008). Efficient signature based malware detection on mobile devices. Mobile Information Systems, 4(1), 33-49.
  • Vitak, J., Crouse, J. & LaRouse, R. (2011). Personal internet use at work: Understanding cyberslacking, Computers in Human Behavior, 27, 1751-1759. https://doi.org/10.1016/j.chb.2011.03.002
  • Willard, N. (2004). An educator’s guide to cyberbullying and cyberthreats. http://cyberbully.org/docs/cbcteducator.pdf Accessed: 12.10.2023.
  • Wang, A.H. (2010). Don’t follow me: Spam detection in Twitter. 2010 International Conference on Security and Cryptography (SECRYPT), (pp.1-10), Athens, Greece.
  • Wang, E. Shih-Tse (2019.) Effects of brand awareness and social norms on user-perceived cyber privacy risk. International Journal of Electronic Commerce, 23(2), 272-293. https://doi.org/10.1080/10864415.2018.1564553
  • Whitty, M.T., & Buchanan, T. (2012). The Online dating romance scam: A Serious crime. CyberPsychology, Behavior, and Social Networking, 15(3), 181-183. https://doi.org/10.1089/cyber.2011.0352
  • Wong-Lo, M., & Bullock, L. M. (2011). Digital aggression: Cyberworld meets school bullies. Part of a Special Issue: Cyberbullying By: Preventing School Failure, 55(2), 64-70. https://doi.org/10.1080/1045988X.2011.539429
  • Wu, C., Yao, W., Pan, W., Sun, G., Liu, J., & Wu, L. (2022). Secure control for cyber-physical systems under malicious attacks, in IEEE Transactions on Control of Network Systems, June 2022, 9(2), (pp.775-788), IEEE. https://dx.doi.org/10.1109/TCNS.2021.3094782
  • Wu, G., Greene, D., Smyth, B., & Cunningham, P. (2010). Distortion as a Validation Criterion in the Identification of Suspicious Reviews. Technical Report, UCD-CSI-2010-04, Dublin, Ireland, University College Dublin, 2010.
  • Xu, G., Dong, W., Xing, J., Lei, W., Liu, J., Gong, L., Feng, M., Zheng, X., & Liu, S. (2022). Delay-CJ: A novel cryptojacking covert attack method based on delayed strategy and its detection. Digital Communications and Networks, 1-11. https://doi.org/10.1016/j.dcan.2022.04.030
  • Xu, J.J. (2016). Are blockchains immune to all Malicious attacks?. Financial Innovation, 2(25),1-9. https://dx.doi.org/10.1186/s40854-016-0046-5
  • Yağcı, M. & Yüceler, A. (2016). Kavramsal boyutlarıyla sanal kaytarma. International Journal of Social Sciences and Education Research, 2(2), 531-540.
  • Yaman, E, & Peker, A. (2012). The perceptions of adolescents about cyberbullying and cybervictimization. Gaziantep University Journal of Social Sciences, 11(3), 819-833. https://dergipark.org.tr/tr/pub/jss/issue/24238/256940
  • Yang, A., Lu, C., Li, J., Huang, X., Ji, T., Li, X., & Sheng, Y. (2023). Application of meta-learning in cyberspace security: a survey, Digital Communications and Networks, 9(1), 2023,67-78. https://doi.org/10.1016/j.dcan.2022.03.007.
  • Yaşar, S. & Yurdugül, H. (2013). The Investigation of Relation Between Cyberloafing Activities and Cyberloafing Behaviors in Higher Education, Procedia- Social and Behavioral Sciences, 83, 600-604.
  • Yazgan, Ç. Ü. & Yıldırım, A. F. (2020). Üniversite gençliğinde internet bağımlılığı ve derslerde siber aylaklık davranışları, Gençlik Araştırmaları Dergisi, Aralık 2020, 8 (Özel Sayı), 5-23.
  • Yetimoğlu, B. (2022). Siber tehdit istihbaratıyla özgün tehdit aktörleri veri kümesi oluşturma ve sınıflandırma, Yüksek Lisans Tezi, Fırat Üniversitesi Fen Bilimleri Enstitüsü, Elazığ, 69s.
  • Yohanandhan, R.V., Elavarasan, R.M., Manoharan, P., Mihet-Popa, L. (2020). Cyber-Physical Power System (CPPS): A review on modeling, simulation, and analysis with cyber security applications. IEEE Access, 2020(8),151019-64.
  • Yoo, K.H., & Gretzel, U. (2009). Comparison of Deceptive and Truthful Travel Review. Information and Communication Technologies in Tourism, 1(1), 37-47.
  • Yüksel, E. (2019). Türkiye’de iletişim araştırmalarında içerik analizi uygulamaları, sorunlar ve çözüm önerileri, International Euroasia Congress on Scientific Researches and Recent Trends-V, 16-19 DEC, 2019, The Book of Full Texts Volume-II, Editors. Prof. Dr. Gülzar İbrahimova & Dr. Terane Nağiyeva ISBN 978-625-7029-51-3, (s.134-152), Bakü, Azerbaycan.
  • Zeng, A., & Liu, W. (2012). Enhancing network robustness against malicious attacks, Physical Rev. E 85, 1-7. https://dx.doi.org/10.1103/PhysRevE.85.066130
  • Zhang, X., Ma, H., & Tse, C.K. (2022a). Assessing the robustness of cyber-physical power systems by considering wide-area protection functions. IEEE J Emerg Sel Top Circ Syst, 12(1), 107-114.
  • Zhang, X., Liu, D., Tu, H., & Tse CK. (2022b). An integrated modeling framework for cascading failure study and robustness assessment of cyber-coupled power grids. Reliability Engineering & System Safety, 226, 108654.
  • Zheng, M., Sun, M., Lui, J.C.S. (2013). Droid analytics: A Signature based analytic system to collect, extract, analyze and associate android malware. In IEEE Conference on Trust, Security and Privacy in Computing and Communications, 2013.
  • Zimba, A., Wang, Z., Mulenga, M., Odongo, N.H. (2020). Crypto mining attacks in information systems: An emerging threat to cyber security. Journal of Computer Information Systems, 60(4), 297-308. https://doi.org/10.1080/08874417.2018.1477076
  • Zinderen, İ. E. (2020). Yeni medyada kimlik inşası: youtuber kimliğine ilişkin bir inceleme, Erciyes İletişim Dergisi, Ocak/January 2020, 7(1), 415-434. https://doi.org/10.17680/erciyesiletisim.650956
There are 188 citations in total.

Details

Primary Language Turkish
Subjects Information Systems Development Methodologies and Practice
Journal Section Computer Engineering
Authors

Mustafa Aydemir 0000-0001-9414-4053

Publication Date December 3, 2024
Submission Date May 2, 2024
Acceptance Date July 22, 2024
Published in Issue Year 2024

Cite

APA Aydemir, M. (2024). SİBERUZAMDA SUÇ TİPOLOJİLERİ VE SİBER İLETİŞİM TABANLI ÇÖZÜMLEME MODELİNİN ANALİZİ. Kahramanmaraş Sütçü İmam Üniversitesi Mühendislik Bilimleri Dergisi, 27(4), 1375-1400. https://doi.org/10.17780/ksujes.1477116