Information Technology Reference
In-Depth Information
2.
Paquette, S., Jaeger, P., Wilson, S.: Identifying the Security Risks Associated with
Governmental Use of Cloud Computing. Government Information Quarterly 27, 245-253
(2010)
3.
Kaufman, L.: Data Security in the World of Cloud Computing. IEEE Computer and
Reliability Societies 7, 61-64 (2009)
4.
Wyld, D.C.: Moving to the Cloud: An Introduction to Cloud Computing in Government,
http://faculty.cbpp.uaa.alaska.edu/afgjp/PADM601%20Fall%2020
10/Moving%20to%20the%20Cloud.pdf
5.
TÜİK: Hanehalkı Bilişim Teknolojileri Kullanım Araştırması. Türkiye İstatistik Kurumu,
Ankara (2012)
6.
DPT: Bilgi Toplumu İstatistikleri - 2011. T.C. Başbakanlık Devlet Planlama Teşkilatı,
Ankara (2011)
7.
Bisong, A., Rahman, S.: An Overview of the Security Concerns in Enterprise Cloud
Computing. International Journal of Network Security & Its Applications (IJNSA) 3(1),
30-45 (2011)
8.
Microsoft: Microsoft Online Privacy Statement,
http://privacy.microsoft.com
/TR-TR/fullnotice.mspx
9.
Perlin, M.: Downtime, Outages and Failures - Understanding Their True Costs,
http://
www.evolven.com/blog/downtime-outages-and-failures-
understanding-their-true-costs.html
10.
Google: Google Hizmet Şartları,
http://www.google.com/policies/terms/
11.
Microsoft: Microsoft Hizmetler Sözleşmesi,
http://windows.microsoft.com/tr
-TR/windows-live/microsoft-services-agreement
12.
Acer Inc.: AcerCloud Son Kullanıcı Lisans Sözleşmesi,
https://www.cloud.acer.
com/ops/showEula
13.
Svantesson, D., Clarke, R.: Privacy and Consumer Risks in Cloud Computing. Computer
Law & Security Review 26, 391-397 (2010)
14.
Google: Gizlilik Politikası,
http://www.google.com/policies/privacy/
15.
King, N.J., Raja, V.: Protecting the Privacy and Security of Sensitive Customer Data in the
Cloud. Computer Law & Security Review 28, 308-319 (2012)
16.
U.S.C.: In the House of Representatives,
http://www.gpo.gov/fdsys/pkg/
BILLS-112hr611ih/pdf/BILLS-112hr611ih.pdf
17.
European Council: Directive 95/46/EC of the European Parliament and of the Council,
http://idpc.gov.mt/dbfile.aspx/Directive%2095-46%20-
%20Part%202.pdf
18.
European Commission: Commission Staff Working Document,
http://ec.europa.
eu/justice/policies/privacy/docs/adequacy/sec-2004-
1323_en.pdf
19.
European Commission: Commission proposes a comprehensive reform of the data
protection rules,
http://ec.europa.eu/justice/newsroom/
data-protection/news/120125_en.htm
20.
European Commission: How does the Data Protection Reform Strengthen Citizens'
Rights?,
http://ec.europa.eu/justice/data-protection/
document/review2012/factsheets/2_en.pdf
21.
Anayasası, T.C.: Türkiye Cumhuriyeti Anayasası,
http://www.tbmm.gov.tr/
anayasa/anayasa_2011.pdf
22.
Türk Ceza Kanunu,
http://www.tbmm.gov.tr/kanunlar/k5237.html
23.
European Commission: Convention on Cybercrime,
http://conventions.coe.
int/treaty/en/treaties/html/185.htm
Search WWH ::
Custom Search