Buradasınız

KAMU ALANINDA BİLGİNİN İNTERNET İLE SUNUMU VE ÖNÜNDEKİ TEHLİKELER: AMERİKAN ÖRNEĞİ

The Provision of Knowledge in Public Sector via the Internet and its Risks: USA Example

Journal Name:

Publication Year:

Keywords (Original Language):

Author Name
Abstract (2. Language): 
Networked information systems are being rapidly adopted by governments and businesses worldwide to improve Communications, operational control, and -ultimately - competitiveness. Reliance on these systems, especially where the Internet exists as the primary infrastructure, is likely to increase. It gives a complex technical and political task for nations and their commercial enterprises to protect information assets and ensure that critical operations continue even if attacked. Governments to give an answer to attacks for safeguarding information and critical infrastructures. Besides the technological challenges, the legal issues involved as they cross multiple geographical and legal boundaries. For that as we know Networks risks (hacking, social engineering, whacking, etc), we have to make special work goverment knowledge system in law and other field about present knowledge consciously to citizen.
Abstract (Original Language): 
Ağ (Network) iletişim sistemleri dünya çapında devletler ve iş alemi içerisinde iletişim- de operasyonel kontrolde ve işbirlikçi yapıda gelişmektedir. Özellikle birincil araç olarak interneti içeren bu sistemlere güvenme artıştadır. Bu durum devletler ve onların özel teşebbüsleri için karmaşık teknikler ve siyasi görevleri içeren, tehlikeli çalışmalar devam ederken bir saldırı olsa bile, bilgi varlıklarını koruma ve garantisini sağlama görevi verir. Devletlerin kendi kritik araçları ve bilgilerini korunması ve yapılan saldırılara karşılık verebilmesi teknolojik meydan okumanın yanı sıra, yasal konularda siber dünyada birçok coğ-rafik ve yasal sınırlılıklar yüzünden mümkün görünmemektedir. Bu yüzden ağdaki tehlikeleri (sistem kırıcılık, sosyal mühendislik, kuvvetli darbe, vb.) bilerek, devletin bilgi sistemi ile ilgili hukuk ve diğer alanlarda bilginin vatandaşlara bilinçli sunumuna yönelik çalışmalar yapılmalıdır.
63-84

REFERENCES

References: 

CERT Coordination Center, (1999), "International Coordination for Cyber Crime
and Terrorism in the 21 st Century", http://www.cert.org/reports/stan-
ford_whitepaper-V6.pdf,
(01.07.2002)
. CERT Coordination Center, (2002), "How the FBI Investigates Computer
Crime",http://www.cert.org/tech_tips/FBI_investigates_crime.html.,
(19.05.2002).
Cliff, Edwards, (2000), "News", http://abcnews.go.com/sections/tech/Daily-News/transmetaspy000701.html, (13.05.2002).
84 Polis Bilimleri Dergisi: 5 (3-4)
Computer Security Institute, (2002), "FOR IMMEDIATE RELEASE Cyber
crime bleeds U.S. Corporations, Survey Shows; Financial Losses From At-
tacks Climb For Third Year In A Row", http://www.goc-
si.com/press/20020407.html, (16.06.2002). Eisenberg, Daniel, (1999), "Eyeing The Competition", Time BUSINESS, March
22, 1999 Vol. 153, No. 11. Gordon Murnane, Laura, (2002), "Access to Government Information In A Post
9/11 World", Searcher: The Magazine For Database Professionals,
Volume:10, Number:6, June, ss. 51-62. Hart, Teeter, (2002), "E-Government: To Connect, Protect, and Serve Us",
http://egov.gov/documents/egovreport.htm, (18.08.2002). Perton, Victor, (2000a) Aktaran, "Victoria's Proposals for a 21. Century Legal
System", Journal of Information, Law and Technology, Issue:1, ss. 1-13. (K.
Wigg (1999), 'Introducing Knowledge Management into the Enterprise' in J.
Liebowitz (ed) Knowledge Management Handbook, CRC Press, New York.) (2000b) Aktaran, "Victoria's Proposals for a 21st Century Legal
System", Journal of Information, Law and Technology, Issue 1, ss. 1-13. (T.
Davenport ve L. Prusak (1998), "Working Knowledge: How Organisations
Manage What they Know", Harvard Business School Press, Boston, p. 1.) Power, Richard, (2002), "CSI/FBI Computer Crime And Security Survey",
Computer Security Issuses&Trends, Vol:VIII,No:1, Spring. Robinson, Shane W., (2002), "Corporate Espionage 101", http://rr.sans.org/soci-
al/espionage.php, (13.05.2002). Scarponi, Diane, (1997), Newspaper & Magazine Articles, http://www.phonelo-
sers.org/dd.html., (13.05.2002). Stevens, George, (2001), "Enhancing Defenses Against Social Engineering",
SANS Institute, http://www.sans.org/infosecFAQ/social/social.htm,
28.07.2002.
U.S. Supreme Court CALIFORNIA v. GREENWOOD, 486 U.S. 35 (1988)
http://laws.findlaw.com/us/486/35.html, Argued January 11, 1988, Decided
May 16, 1988.
Wendy, Arthurs, (2001), 02.08. "A Proactive Defence to Social Engineering", SANS Institute, http://www.sans.org/infosecFAQ/social/defence.htm,
(20.06.2002).
Widdison, Robin, (1997), "Electronic Law Practice: An Exercise in Legal Futurology", Modern Law Review, N: 60, ss.143-163.

Thank you for copying data from http://www.arastirmax.com