Page 241 - Bilgisayar Bilimi | Kur 1
P. 241
KAYNAKÇA
• Downey, A., Elkner, J., & Meyers, C., How to Think Like a Computer Scientist: Learning with
Python (2nd Edition). Boston, MA: Green Tea Press, 2008.
• Halterman, R. L., Fundamentals of Python Programming, 2016. http://python.cs.southern.edu/
pythonbook/pythonbook.pdf adresinden alınmıştır.
• Levitin, A. & Levitin, M., Algorithmic Puzzles, New York: Oxford University Press, 2011.
• Sprankle, M. &Hubbard, J., Problem Solvingand Programming Concepts (9th Ed). New Jersey:
Pearson Education, 2012.
• Spraul, V. A., Think Like a Programmer, San Francisco: No StarchPress, 2012.
• Burlu, K. Bilişimin Karanlık Yüzü. Nirvana Yayınları, 2011.
• Clarke, Richard A. & Knake, Robert K., Siber Savaş. İstanbul Kültür Üniversitesi - İKÜ Yayınevi,
2010.
• Cyberpower and National Security (National Defense University), Franklin D. Kramer (Ed),
Stuart H. Starr (Ed.), LarryWentz (Ed.), 2009.
• Floridi, L., “Information ethics: On thephilosophicalfoundation of computerethics”, Ethicsand
İnformation Technology, 1(1), 33-52, 1999.
• G. Canbek, Ş. Sağıroğlu, Bilgi ve Bilgisayar Güvenliği: Casus Yazılımlar ve Korunma
Yöntemleri, Grafiker Ltd. Şti. Aralık, 2006.
• Hoyk, R. & Hersey, P., Theethical Executive: Becomingaware Of Therootcauses Of Unethical
Behavior. Stanford: Stanford University Press, 2008.
• Kayak, S., “BÖTE Bölümü Öğrencilerinin İnternet Etiği Algılarının İncelenmesi”, Eğitim
Teknolojileri Araştırmaları Dergisi, 2011.
• Namlu, A. G. & Odabaşı, H. F., “Unethical Computer Using Behavior Scale: A study of
reliabilityandvalidity on Turkish University Students”, Computers & Education, 48(2), 205-
215, 2007.
• Quinn, M. J., “On Teaching Computer Ethics Within A Computer Science Department”,
Science and Engineering Ethics, 12, 335-343, 2006.
• Siegfried, R. M., “Student Attitudes On Software Piracy And Related Issues Of Computer
Ethics”, Ethicsand Information Technology, 6, 215-222, 2004.
• Turilli, M. & Floridi, L., “Theethics of Information Transparency”, Ethicsand Information
Technology, 11(2), 105-112, 2009.
• (Wing, 2006; Zhenrong, Wenming ve Rongsheng, 2009; Liu ve He, 2014; Barr, Harrison ve
Conery, 2011)
240