Information Technology Reference
In-Depth Information
2. Paquette, S., Jaeger, P., Wilson, S.: Identifying the Security Risks Associated with
Governmental Use of Cloud Computing. Government Information Quarterly 27, 245-253
(2010)
3. Kaufman, L.: Data Security in the World of Cloud Computing. IEEE Computer and
Reliability Societies 7, 61-64 (2009)
4. Wyld, D.C.: Moving to the Cloud: An Introduction to Cloud Computing in Government,
http://faculty.cbpp.uaa.alaska.edu/afgjp/PADM601%20Fall%2020
10/Moving%20to%20the%20Cloud.pdf
5. TÜİK: Hanehalkı Bilişim Teknolojileri Kullanım Araştırması. Türkiye İstatistik Kurumu,
Ankara (2012)
6. DPT: Bilgi Toplumu İstatistikleri - 2011. T.C. Başbakanlık Devlet Planlama Teşkilatı,
Ankara (2011)
7. Bisong, A., Rahman, S.: An Overview of the Security Concerns in Enterprise Cloud
Computing. International Journal of Network Security & Its Applications (IJNSA) 3(1),
30-45 (2011)
8. Microsoft: Microsoft Online Privacy Statement, http://privacy.microsoft.com
/TR-TR/fullnotice.mspx
9. Perlin, M.: Downtime, Outages and Failures - Understanding Their True Costs, http://
www.evolven.com/blog/downtime-outages-and-failures-
understanding-their-true-costs.html
10. Google: Google Hizmet Şartları, http://www.google.com/policies/terms/
11. Microsoft: Microsoft Hizmetler Sözleşmesi, http://windows.microsoft.com/tr
-TR/windows-live/microsoft-services-agreement
12. Acer Inc.: AcerCloud Son Kullanıcı Lisans Sözleşmesi, https://www.cloud.acer.
com/ops/showEula
13. Svantesson, D., Clarke, R.: Privacy and Consumer Risks in Cloud Computing. Computer
Law & Security Review 26, 391-397 (2010)
14. Google: Gizlilik Politikası, http://www.google.com/policies/privacy/
15. King, N.J., Raja, V.: Protecting the Privacy and Security of Sensitive Customer Data in the
Cloud. Computer Law & Security Review 28, 308-319 (2012)
16. U.S.C.: In the House of Representatives, http://www.gpo.gov/fdsys/pkg/
BILLS-112hr611ih/pdf/BILLS-112hr611ih.pdf
17. European Council: Directive 95/46/EC of the European Parliament and of the Council,
http://idpc.gov.mt/dbfile.aspx/Directive%2095-46%20-
%20Part%202.pdf
18. European Commission: Commission Staff Working Document, http://ec.europa.
eu/justice/policies/privacy/docs/adequacy/sec-2004-
1323_en.pdf
19. European Commission: Commission proposes a comprehensive reform of the data
protection rules, http://ec.europa.eu/justice/newsroom/
data-protection/news/120125_en.htm
20. European Commission: How does the Data Protection Reform Strengthen Citizens'
Rights?, http://ec.europa.eu/justice/data-protection/
document/review2012/factsheets/2_en.pdf
21. Anayasası, T.C.: Türkiye Cumhuriyeti Anayasası, http://www.tbmm.gov.tr/
anayasa/anayasa_2011.pdf
22. Türk Ceza Kanunu, http://www.tbmm.gov.tr/kanunlar/k5237.html
23. European Commission: Convention on Cybercrime, http://conventions.coe.
int/treaty/en/treaties/html/185.htm
 
Search WWH ::




Custom Search