Modal content
×

T.C. İÇİŞLERİ BAKANLIĞI

WEB SİTESİ GİZLİLİK VE ÇEREZ POLİTİKASI

Web sitemizi ziyaret edenlerin kişisel verilerini 6698 sayılı Kişisel Verilerin Korunması Kanunu uyarınca işlemekte ve gizliliğini korumaktayız. Bu Web Sitesi Gizlilik ve Çerez Politikası ile ziyaretçilerin kişisel verilerinin işlenmesi, çerez politikası ve internet sitesi gizlilik ilkeleri belirlenmektedir.

Çerezler (cookies), küçük bilgileri saklayan küçük metin dosyalarıdır. Çerezler, ziyaret ettiğiniz internet siteleri tarafından, tarayıcılar aracılığıyla cihazınıza veya ağ sunucusuna depolanır. İnternet sitesi tarayıcınıza yüklendiğinde çerezler cihazınızda saklanır. Çerezler, internet sitesinin düzgün çalışmasını, daha güvenli hale getirilmesini, daha iyi kullanıcı deneyimi sunmasını sağlar. Oturum ve yerel depolama alanları da çerezlerle aynı amaç için kullanılır. İnternet sitemizde çerez bulunmamakta, oturum ve yerel depolama alanları çalışmaktadır.

Web sitemizin ziyaretçiler tarafından en verimli şekilde faydalanılması için çerezler kullanılmaktadır. Çerezler tercih edilmemesi halinde tarayıcı ayarlarından silinebilir ya da engellenebilir. Ancak bu web sitemizin performansını olumsuz etkileyebilir. Ziyaretçi tarayıcıdan çerez ayarlarını değiştirmediği sürece bu sitede çerez kullanımını kabul ettiği varsayılır.

1.Kişisel Verilerin İşlenme Amacı

Web sitemizi ziyaret etmeniz dolayısıyla elde edilen kişisel verileriniz aşağıda sıralanan amaçlarla T.C. İçişleri Bakanlığı tarafından Kanun’un 5. ve 6. maddelerine uygun olarak işlenmektedir:

  • T.C. İçişleri Bakanlığı tarafından yürütülen ticari faaliyetlerin yürütülmesi için gerekli çalışmaların yapılması ve buna bağlı iş süreçlerinin gerçekleştirilmesi,
  • T.C. İçişleri Bakanlığı tarafından sunulan ürün ve hizmetlerden ilgili kişileri faydalandırmak için gerekli çalışmaların yapılması ve ilgili iş süreçlerinin gerçekleştirilmesi,
  • T.C. İçişleri Bakanlığı tarafından sunulan ürün ve hizmetlerin ilgili kişilerin beğeni, kullanım alışkanlıkları ve ihtiyaçlarına göre özelleştirilerek ilgili kişilere önerilmesi ve tanıtılması.
 
2.Kişisel Verilerin Aktarıldığı Taraflar ve Aktarım Amacı

Web sitemizi ziyaret etmeniz dolayısıyla elde edilen kişisel verileriniz, kişisel verilerinizin işlenme amaçları doğrultusunda, iş ortaklarımıza, tedarikçilerimize kanunen yetkili kamu kurumlarına ve özel kişilere Kanun’un 8. ve 9. maddelerinde belirtilen kişisel veri işleme şartları ve amaçları kapsamında aktarılabilmektedir.

3.Kişisel Verilerin Toplanma Yöntemi

Çerezler, ziyaret edilen internet siteleri tarafından tarayıcılar aracılığıyla cihaza veya ağ sunucusuna depolanan küçük metin dosyalarıdır. Web sitemiz ziyaret edildiğinde, kişisel verilerin saklanması için herhangi bir çerez kullanılmamaktadır.

4.Çerezleri Kullanım Amacı

Web sitemiz birinci ve üçüncü taraf çerezleri kullanır. Birinci taraf çerezleri çoğunlukla web sitesinin doğru şekilde çalışması için gereklidir, kişisel verilerinizi tutmazlar. Üçüncü taraf çerezleri, web sitemizin performansını, etkileşimini, güvenliğini, reklamları ve sonucunda daha iyi bir hizmet sunmak için kullanılır. Kullanıcı deneyimi ve web sitemizle gelecekteki etkileşimleri hızlandırmaya yardımcı olur. Bu kapsamda çerezler;

İşlevsel: Bunlar, web sitemizdeki bazı önemli olmayan işlevlere yardımcı olan çerezlerdir. Bu işlevler arasında videolar gibi içerik yerleştirme veya web sitesindeki içerikleri sosyal medya platformlarında paylaşma yer alır.

Teknik olarak web sitemizde kullanılan çerez türleri aşağıdaki tabloda gösterilmektedir.

Oturum Çerezleri

(Session Cookies)

Oturum çerezleri ziyaretçilerimizin web sitemizi ziyaretleri süresince kullanılan, tarayıcı kapatıldıktan sonra silinen geçici çerezlerdir. Amacı ziyaretiniz süresince İnternet Sitesinin düzgün bir biçimde çalışmasının teminini sağlamaktır.

 

Web sitemizde çerez kullanılmasının başlıca amaçları aşağıda sıralanmaktadır:

  • • İnternet sitesinin işlevselliğini ve performansını arttırmak yoluyla sizlere sunulan hizmetleri geliştirmek,
5.Çerez Tercihlerini Kontrol Etme

Farklı tarayıcılar web siteleri tarafından kullanılan çerezleri engellemek ve silmek için farklı yöntemler sunar. Çerezleri engellemek / silmek için tarayıcı ayarları değiştirilmelidir. Tanımlama bilgilerinin nasıl yönetileceği ve silineceği hakkında daha fazla bilgi edinmek için www.allaboutcookies.org adresi ziyaret edilebilir. Ziyaretçi, tarayıcı ayarlarını değiştirerek çerezlere ilişkin tercihlerini kişiselleştirme imkânına sahiptir.  

6.Veri Sahiplerinin Hakları

Kanunun ilgili kişinin haklarını düzenleyen 11 inci maddesi kapsamındaki talepleri, Politika’da düzenlendiği şekilde, ayrıntısını Bakanlığımıza ileterek yapabilir. Talebin niteliğine göre en kısa sürede ve en geç otuz gün içinde başvuruları ücretsiz olarak sonuçlandırılır; ancak işlemin ayrıca bir maliyet gerektirmesi halinde Kişisel Verileri Koruma Kurulu tarafından belirlenecek tarifeye göre ücret talep edilebilir.

 

Corporate Promotion Contact Us
EN
  • English
  • Türkçe
SİBERAY
SİBERAY
  • CYBER SECURITY

    Cyber Security

    General information about the development of the internet from the past to the present, the things to be done related to cyber security by individuals and institutions, cybercrime, the importance of personal data and duties of parents.

    • Cyber World
      • What is the Internet?
      • The Purposes of Usage of the Internet
      • What is the Cyber World?
      • Management of Time of Cyber World
      • Digital Literacy
    • Siberay For Individuals
      • Safe Internet
      • Cyber Crimes
      • Social Engineering
      • Harmful Software
      • Harmful Software - 2
      • Cyber Security Measures
      • LPPD for Individulas
      • Parental Control
    • Siberay For Organizations
      • Cyber Security For Business
      • Network and Internet Security For Enterprises
      • LPPD For Organizations
      • Cyber Awareness For Employees
  • SOCIAL MEDIA

    Social Media

    General information about social media platforms, time spent on social media, personal data and cyberbullying.

    • Social Media Platforms
    • Information Pollution
    • Cyber Bullying
    • Time Management
    • Data Processing
  • DIGITAL GAME

    Digital Game

    General information about games on digital platforms, appropriate game selection, numerical data in the digital world and the duties of parents.

    • Selection of Games
    • Numerical Data Regarding the Digital Game Market
    • Permission and Data Management
    • Parental Guide
  • ADDICTION

    Addiction

    What is Technology Addiction? Are you addicted to digital resources? You can find the answers to the questions under this title.

    • Technology Addiction
    • Screen Addiction
    • Social Media Addiction
    • Game Addiction
  • RESOURCES

    Resources

    Contents which may be utilized individually or institutionally.

    • Articles
    • Videos
Search
  • CYBER SECURITY
    • Cyber World
      • What is the Internet?
      • The Purposes of Usage of the Internet
      • What is the Cyber World?
      • Management of Time of Cyber World
      • Digital Literacy
    • Siberay For Individuals
      • Safe Internet
      • Cyber Crimes
      • Social Engineering
      • Harmful Software
      • Harmful Software - 2
      • Cyber Security Measures
      • LPPD for Individulas
      • Parental Control
    • Siberay For Organizations
      • Cyber Security For Business
      • Network and Internet Security For Enterprises
      • LPPD For Organizations
      • Cyber Awareness For Employees
  • SOCIAL MEDIA
    • Social Media Platforms
    • Information Pollution
    • Cyber Bullying
    • Time Management
    • Data Processing
  • DIGITAL GAME
    • Selection of Games
    • Numerical Data Regarding the Digital Game Market
    • Permission and Data Management
    • Parental Guide
  • ADDICTION
    • Technology Addiction
    • Screen Addiction
    • Social Media Addiction
    • Game Addiction
  • RESOURCES
    • Articles
    • Videos

Information Pollution

Information Pollution in Virtual Environment

The information, with its lexical meaning, is the entire of all kinds of facts and understanding that can be acquired through research, learning and observation. Definition of information has been made by many philosophers before. According to some, it is information in accordance with systematic rules, and according to others, it is a mental understanding that is used so as to interpret and manage the world, in which we live.

The increasing use of the Internet day by day means that this endless virtual world is increasingly growing. Nowadays, the increasing interest especially in the social networking web sites and their becoming popular makes the use of the internet more attractive. In these platforms, not only photos and videos are shared, but also information transfer and sharing are made on many subjects such as from arts to politics, from education to science, from sports to personal hobbies. Social sharing platforms are an important means of communicating with other people when they are used consciously, yet, when it comes to "accessing the correct information", we can say that the situation converts into a negative situation.

Freedom in the virtual environment provides unlimited sharing opportunities for individuals. The internet is an environment where individuals can freely share their feelings and thoughts, and different opinions and information collected on every subject are shared. In this way, an accumulation of information, which is endless, is formed in the virtual environment, but the fact that the information in the system lacks any control mechanism brings "the information pollution" in its train. The fact that these shares are not based on scientific values and not made from the right sources also makes it difficult to reach the correct information.
 
Users who want to reach information regarding a specific subject can often access many incorrect and unreliable information that is irrelevant to the research subject. This situation creates confusion and access problems in the virtual environment. For this reason, it is of great importance which information should be paid attention to, or which should not be paid attention to.
 

Data Reliability and Its Impacts on the Internet and Social Media 

Along with the developments made in communication and information technologies, the Internet has gained a bigger place in the daily life of the society, and today, the social media platforms have become digital environments where information and news flows intensely. Unlike traditional news sources, each user in the social media can act as a "news and data source" at the same time.
 
This situation can lead to an uncontrolled increase in the number and variety of news on the social media. The fact that the information disseminated on the Internet is often in the form of uncompiled "raw data" may raise questions about which data users should interpret how, and what inferences users should make. The most critical problem, which is raised by all these factors, is the reliability of information and news and their social effects. Although the accuracy of the information, obtained through traditional media, is also questioned often, the scope and method of information disseminated through the social media may have greater effects on the society due to the fact that it lacks a certain control mechanism. In a study conducted among university students in our country, trust level of participants in media news was questioned.
The main factors affecting reliability among news sources are listed as follows:
  • Bias in the news
  • Close relations / interest relations with news sources
  • Fabricated news
  • Falsification of the news and deliberate concealment of information
  • Ideological bias in the news
  • Making directing in the news
  • Methods used so as to gather the news
  • Adding interpretation to the news
  • Missing information in the news
  • Ownership structure of the media / being a commercial structure
  • Missing self-inspection / self-control in the media
  • Hidden or open advertising made in the news

The social media, along with its user network and technological infrastructure, can (made as being consciously or unconsciously) cause various social effects such as elucidating, agenda creation, knowledge disinformation and perception management. These social effects can result in many side effects such as social, economic, cultural and so on. Examples of knowledge disinformation and its effects on the internet and social media in our country are shown as follows:

  • It has been seen many times that the news, claiming that terrorist incidents such as bombing in social spaces, like the shopping center, etc., would be made, spread uncontrollably, by providing time and location information through various social media platforms, during terrorist incidents.
  • According to a news spread on the social media, the newspaper, The Daily Telegraph, published a news that there would be an earthquake in Istanbul, even giving date and time information.
  • Examples of uncontrolled dissemination of information, which are often inaccurate, regarding the urgent need for blood on the social media led to the accumulation of people in the health departments, and thus its negative effects on post-event crisis management were observed.

1. When should you be worried?

It is difficult to be on the alert all the time, but there are a few red flags, signs, that indicate something can be misleading. The first step is to develop a feeling of conception regarding “when a particular piece of content is too good (or bad) to be true”. If a story gets your attention for any reason, you should examine it deeply. Being heavily influenced by a story should make you want to know more, not less. If the news is correct, you'll learn important details about a topic you care about. If it's wrong or misleading, you can warn other people not to believe the related news.

If a story feels intuitively correct, you should be careful. Disinformation operators, tabloids, and other bad actors distort actual events in a way that they fit popular narratives, assuming (often correctly) that people will be more interested in the news they want to believe. When you share a story with your friends or followers or interact by liking it or commenting on it, you encourage other people to look at this information and strengthen the profile of the entire site or account that posted it. This increases the risk if something is fake or misleading. Therefore, while discussing whether or not a story is suitable for the categories above, you need to be careful before making a big thing of it.

2. How is connection checked?

When you decide to look deeper into an online story, you need to understand where and when it came from. Internet news is like a phone game. Whenever someone reposts or rewrites something, there is a possibility that important details might be lost. It is necessary to find the date of the original story. If the story is shared in a Facebook post or a Tweet, click on the post and find its date, also known as timestamp. You should also search for the source of relevant information. Sometimes a news story explicitly cites its sources, by clarifying that the author has done research and interviews at firsthand, or by giving link to a press release or another news source.

Sometimes, it is unclear where the news is coming from. A Twitter account may share a photo with a description that might be wrong. In these cases, you usually need to do a quick search using search engines so as to find more comprehensive and original resources. Large social media platforms often give verification rosettes to large businesses, celebrities, government agencies. (The blue tick in Twitter is a verification sign.) However, unverified accounts may still be genuine, but you should investigate further accordingly. Do other posts of the account match its default identity? Does a business or organization give link to this on their websites?

It's also easy to fake screenshots of a Tweet or Facebook post. If you see one of these screenshots, check the person's profile in order to find the actual post. If it does not exist there, you should consider how reliable the person posting the screenshot is. The post may have been deleted or never happened. Google can be a good tool so as to find other news of a particular event, but searching for the general topic or most famous topic of a story often yields a lot of general, unhelpful search results. It is better to look for unique keywords, such as the name of a non-famous person quoted in the story or his/her being appeared in the articles, or anything else that is unlikely to happen.

3. How is the real source found?

Some online information is clearly fake or misleading. And some of them may also skip important details, or disproportionately remove small controversies, or use legitimate news in order to attract people before feeding them with poor information. The key here is to look for gaps in a story or for discrepancies between the claims of a story and the actual source material. Biased sources can also publish real news, but you should carefully consider the evidence they provide and, if possible, you should check whether or not other news sources also support the news released. Be careful about the stories, which suggest there is a massive cultural movement or political turmoil that is entirely based on people saying something on the internet. If a story is referring to Tweets or Instagram posts in order to prove that something is popular, you should check whether they are coming from accounts with a lot of followers and interactions, or from Tweets of little-known users or not.

4. How is the evidence evaluated?

Some news sources are really more consistently accurate than others. Some expert opinions are more reliable than your own amateur research. If you believe in things that you check only with your own eyes, you will have a world view by incredibly blinking eye. That’s to say, the purpose here is not to determine why a story is wrong. It is about determining how the story works, which parts are complex and subjective, which parts are likely to be correct, and how much they should change your opinion or behavior.

You should evaluate the consequences of believing or ignoring a news against its likelihood that it is true. Buying for a fraud can be financially devastating, so you want very strong (and possibly non-existent) evidence regarding whether a plan to make a quick buck is working or not. Conversely, ignoring an actual forest fire or an epidemic outbreak warning can be fatal.

References:

https://thinktech.stm.com.tr/

https://toad.halileksi.net/

https://dergipark.org.tr/en/

https://www.theverge.com/

https://www.guvenliweb.org.tr/

 

CYBER SECURITY

  • Cyber World
    • What is the Internet?
    • The Purposes of Usage of the Internet
    • What is the Cyber World?
    • Management of Time of Cyber World
    • Digital Literacy
  • Siberay For Individuals
    • Safe Internet
    • Cyber Crimes
    • Social Engineering
    • Harmful Software
    • Harmful Software - 2
    • Cyber Security Measures
    • LPPD for Individulas
    • Parental Control
  • Siberay For Organizations
    • Cyber Security For Business
    • Network and Internet Security For Enterprises
    • LPPD For Organizations
    • Cyber Awareness For Employees

SOCIAL MEDIA

  • Social Media Platforms
  • Information Pollution
  • Cyber Bullying
  • Time Management
  • Data Processing

DIGITAL GAME

  • Selection of Games
  • Numerical Data Regarding the Digital Game Market
  • Permission and Data Management
  • Parental Guide

ADDICTION

  • Technology Addiction
  • Screen Addiction
  • Social Media Addiction
  • Game Addiction

RESOURCES

  • Articles
  • Videos
  • CYBER SECURITY
    • Cyber World
      • What is the Internet?
      • The Purposes of Usage of the Internet
      • What is the Cyber World?
      • Management of Time of Cyber World
      • Digital Literacy
    • Siberay For Individuals
      • Safe Internet
      • Cyber Crimes
      • Social Engineering
      • Harmful Software
      • Harmful Software - 2
      • Cyber Security Measures
      • LPPD for Individulas
      • Parental Control
    • Siberay For Organizations
      • Cyber Security For Business
      • Network and Internet Security For Enterprises
      • LPPD For Organizations
      • Cyber Awareness For Employees
  • SOCIAL MEDIA
    • Social Media Platforms
    • Information Pollution
    • Cyber Bullying
    • Time Management
    • Data Processing
  • DIGITAL GAME
    • Selection of Games
    • Numerical Data Regarding the Digital Game Market
    • Permission and Data Management
    • Parental Guide
  • ADDICTION
    • Technology Addiction
    • Screen Addiction
    • Social Media Addiction
    • Game Addiction
  • RESOURCES
    • Articles
    • Videos

Follow “Siberay”

    

İncek Mah. Boztepe Sk. No:125 Gölbaşı – ANKARA
Telefon: +90 (312) 462 57 00

E-posta: siber@egm.gov.tr

TRT ÇOCUK TRT
                                                    © 2025 Department of Combating Cyber ​​Crimes
Sizlere daha iyi hizmet verebilmek için sitemizde çerezlere yer veriyoruz 🍪 Çerez politikamız hakkında bilgi edinmek için tıklayınız