Modal content
×

T.C. İÇİŞLERİ BAKANLIĞI

WEB SİTESİ GİZLİLİK VE ÇEREZ POLİTİKASI

T.C. İçişleri Bakanlığı tarafından işletilen www.icisleri.gov.tr web sitesini ziyaret edenlerin kişisel verilerini 6698 sayılı Kişisel Verilerin Korunması Kanunu uyarınca işlemekte ve gizliliğini korumaktayız. Bu Web Sitesi Gizlilik ve Çerez Politikası ile ziyaretçilerin kişisel verilerinin işlenmesi, çerez politikası ve internet sitesi gizlilik ilkeleri belirlenmektedir.

Çerezler (cookies), küçük bilgileri saklayan küçük metin dosyalarıdır. Çerezler, ziyaret ettiğiniz internet siteleri tarafından, tarayıcılar aracılığıyla cihazınıza veya ağ sunucusuna depolanır. İnternet sitesi tarayıcınıza yüklendiğinde, çerezler cihazınızda saklanır. Çerezler, internet sitesinin düzgün çalışmasını, daha güvenli hale getirilmesini, daha iyi kullanıcı deneyimi sunmasını sağlar. Oturum ve yerel depolama alanları da çerezlerle aynı amaç için kullanılır. İnternet sitemizde çerez bulunmamakta, oturum ve yerel depolama alanları çalışmaktadır.

Web sitemizin ziyaretçiler tarafından en verimli şekilde faydalanılması için çerezler kullanılmaktadır. Çerezler tercih edilmemesi halinde tarayıcı ayarlarından silinebilir ya da engellenebilir. Ancak bu web sitemizin performansını olumsuz etkileyebilir. Ziyaretçi tarayıcıdan çerez ayarlarını değiştirmediği sürece bu sitede çerez kullanımını kabul ettiği varsayılır.

1.Kişisel Verilerin İşlenme Amacı

Web sitemizi ziyaret etmeniz dolayısıyla elde edilen kişisel verileriniz aşağıda sıralanan amaçlarla T.C. İçişleri Bakanlığı tarafından Kanun’un 5. ve 6. maddelerine uygun olarak işlenmektedir:

  • T.C. İçişleri Bakanlığı tarafından yürütülen ticari faaliyetlerin yürütülmesi için gerekli çalışmaların yapılması ve buna bağlı iş süreçlerinin gerçekleştirilmesi,
  • T.C. İçişleri Bakanlığı tarafından sunulan ürün ve hizmetlerden ilgili kişileri faydalandırmak için gerekli çalışmaların yapılması ve ilgili iş süreçlerinin gerçekleştirilmesi,
  • T.C. İçişleri Bakanlığı tarafından sunulan ürün ve hizmetlerin ilgili kişilerin beğeni, kullanım alışkanlıkları ve ihtiyaçlarına göre özelleştirilerek ilgili kişilere önerilmesi ve tanıtılması.
 
2.Kişisel Verilerin Aktarıldığı Taraflar ve Aktarım Amacı

Web sitemizi ziyaret etmeniz dolayısıyla elde edilen kişisel verileriniz, kişisel verilerinizin işlenme amaçları doğrultusunda, iş ortaklarımıza, tedarikçilerimize kanunen yetkili kamu kurumlarına ve özel kişilere Kanun’un 8. ve 9. maddelerinde belirtilen kişisel veri işleme şartları ve amaçları kapsamında aktarılabilmektedir.

3.Kişisel Verilerin Toplanma Yöntemi

Çerezler, ziyaret edilen internet siteleri tarafından tarayıcılar aracılığıyla cihaza veya ağ sunucusuna depolanan küçük metin dosyalarıdır. Web sitemiz ziyaret edildiğinde, kişisel verilerin saklanması için herhangi bir çerez kullanılmamaktadır.

4.Çerezleri Kullanım Amacı

Web sitemiz birinci ve üçüncü taraf çerezleri kullanır. Birinci taraf çerezleri çoğunlukla web sitesinin doğru şekilde çalışması için gereklidir, kişisel verilerinizi tutmazlar. Üçüncü taraf çerezleri, web sitemizin performansını, etkileşimini, güvenliğini, reklamları ve sonucunda daha iyi bir hizmet sunmak için kullanılır. Kullanıcı deneyimi ve web sitemizle gelecekteki etkileşimleri hızlandırmaya yardımcı olur. Bu kapsamda çerezler;

İşlevsel: Bunlar, web sitemizdeki bazı önemli olmayan işlevlere yardımcı olan çerezlerdir. Bu işlevler arasında videolar gibi içerik yerleştirme veya web sitesindeki içerikleri sosyal medya platformlarında paylaşma yer alır.

Teknik olarak web sitemizde kullanılan çerez türleri aşağıdaki tabloda gösterilmektedir.

Oturum Çerezleri

(Session Cookies)

Oturum çerezleri ziyaretçilerimizin web sitemizi ziyaretleri süresince kullanılan, tarayıcı kapatıldıktan sonra silinen geçici çerezlerdir. Amacı ziyaretiniz süresince İnternet Sitesinin düzgün bir biçimde çalışmasının teminini sağlamaktır. (ASP.NET_SessionId)

 

Web sitemizde çerez kullanılmasının başlıca amaçları aşağıda sıralanmaktadır:

  • • İnternet sitesinin işlevselliğini ve performansını arttırmak yoluyla sizlere sunulan hizmetleri geliştirmek,
5.Çerez Tercihlerini Kontrol Etme

Farklı tarayıcılar web siteleri tarafından kullanılan çerezleri engellemek ve silmek için farklı yöntemler sunar. Çerezleri engellemek / silmek için tarayıcı ayarları değiştirilmelidir. Tanımlama bilgilerinin nasıl yönetileceği ve silineceği hakkında daha fazla bilgi edinmek için www.allaboutcookies.org adresini ziyaret edilebilir. Ziyaretçi, tarayıcı ayarlarını değiştirerek çerezlere ilişkin tercihlerini kişiselleştirme imkânına sahiptir.  

6.Veri Sahiplerinin Hakları

Kanunun “ilgili kişinin haklarını düzenleyen” 11. maddesi kapsamındaki talepleri, Politika’da düzenlendiği şekilde, ayrıntısını Başvuru Formunu’nu Bakanlığımıza ileterek yapabilir. Talebin niteliğine göre en kısa sürede ve en geç otuz gün içinde başvuruları ücretsiz olarak sonuçlandırılır; ancak işlemin ayrıca bir maliyet gerektirmesi halinde Kişisel Verileri Koruma Kurulu tarafından belirlenecek tarifeye göre ücret talep edilebilir.

 

  • The Journal Of Security Sciences
  • e-Devlet
  • İçişleri Bakanlığı
  • EN
    • English
    • Türkçe
    • Français
    • Italiano
    • Español
GendarmerIe and Coast Guard Academy
GendarmerIe and Coast Guard Academy
  • ABOUT US

    About Us

    You can find information about the organizational structure, history and other information about the Gendarmerie and Coast Guard Academy on this page.

    • Academy President
    • History
    • Integrated Quality Management System
      • Vision
      • Mission
      • Core Values
      • Our Policies
    • Organization Chart
    • Legislation
    • About Campus
    • Gallery
      • Catalog and Brochure
      • Videos
    • Agenda
      • News
      • Announcements
  • ACADEMIC

    Academic

    You can reach the Gendarmerie and Coast Guard Academy Units here.

    • Ethics Committee
    • Faculty
    • The Institute of Security Sciences
    • Vocational High School
    • Directorate of Research Centers
    • Continuing Education Center Command
    • Training Center Command
    • Library
    • Publications
    • International Organizations
    • Gendarmerie E-Academy
    • Learning Management System-JSGA Distance Education
  • ACTIVITIES

    Activities

    You can find all the activities of the Gendarmerie and Coast Guard Academy here.

    • Activities
    • GCGA Wednesday Conferences
    • Symposium
    • Congress
  • CADET

    Cadet

    You can find answers to all the necessary information about the candidates of the Gendarmerie and the Coast Guard Academy, the student processes and the questions you have in mind.

    • Cadet Candidate
    • International Cadet
    • Erasmus Exchange Student
    • Frequently Asked Questions
      • International Cadet / About Erasmus
      • About Faculty
      • About Officer Training Center Cadet Candidacy
      • About NCO Training Center Cadet Candidacy
  • CONTACT
Search
  • ABOUT US
    • Academy President
    • History
    • Integrated Quality Management System
      • Vision
      • Mission
      • Core Values
      • Our Policies
    • Organization Chart
    • Legislation
    • About Campus
    • Gallery
      • Catalog and Brochure
      • Videos
    • Agenda
      • News
      • Announcements
  • ACADEMIC
    • Ethics Committee
    • Faculty
    • The Institute of Security Sciences
    • Vocational High School
    • Directorate of Research Centers
    • Continuing Education Center Command
    • Training Center Command
    • Library
    • Publications
    • International Organizations
    • Gendarmerie E-Academy
    • Learning Management System-JSGA Distance Education
  • ACTIVITIES
    • Activities
    • GCGA Wednesday Conferences
    • Symposium
    • Congress
  • CADET
    • Cadet Candidate
    • International Cadet
    • Erasmus Exchange Student
    • Frequently Asked Questions
      • International Cadet / About Erasmus
      • About Faculty
      • About Officer Training Center Cadet Candidacy
      • About NCO Training Center Cadet Candidacy
  • CONTACT

Institute of Security Science

  • Our Institute
    • About
    • Organizational Chart
    • Director of the Institute
    • Regulation
  • Academic Calender
  • Departments
    • International Security And Terrorism
    • Public Administration
    • Security Management
    • Criminal Investigation
    • Maritime Safety and Security
  • Weekly Schedule
  • Thesis Manual
  • Thesis Delivery Procedure
  • Forms
    • Academic Forms
    • Student Forms
  • Application of Student Candidate
    • Masters Thesis Programs Application
    • Special Student Application
  • The Journal Of Security Sciences
    • Copyright Page
    • Aims and Scope
    • Rights and Responsibilities
    • Advisory Board
    • Contact
    • Current Issue
    • Archive
    • Article Spelling Rules
    • Article Submission
    • Article Format
    • Book Reviews Format
    • Forms

Article Writing Principles

03.06.2020

1. PUBLISHING PRINCIPLES

    1. General Principles

The Journal of Security Sciences is a biannual journal indexed in both national and international indexes which offers theoretical and applied research, analysis and articles on “security” and published by the Gendarmerie and Coast Guard Academy since 2012. The Journal of Security Sciences is published twice in a year, May and November, as in print and online accessible journal.

The main publishing languages of the Journal are Turkish and English. The title, keywords and the abstract of the articles submitted to the journal must be both in Turkish and English.

The Journal of Security Sciences publishes original articles and book reviews focused on “security” aspect from different fields including but not limited to human sciences and public sciences on politics, law, public administration, management, geography, history, communication, economy, informatics, psychology, sociology etc. Submitted articles must not be published nor submitted to any other publications before. Conference/congress/seminar papers are accepted only if they are not previously published as full text and certain info such as presentation date and place provided.  

Submitted manuscripts must follow the grammar rules. Therefore, the author is responsible of problems arising from the breaches of grammar rules of their articles.

Articles which fail to follow the Journal principles and guidelines may not be accepted for reviewing process. Editorial Board has the authority to send articles to reviewers, to send back articles to authors after reviews, to change articles formats, to abbreviate it or to decide not to accept articles which fail to follow the academic integrity and publishing standarts.

The submitted manuscripts undergo a double-blind reviewing process; articles are reviewed by referees whreas book reviews are reviewed by editorial board. To be accepted for publication in the Journal of Security Sciences, articles need to be positively peer reviewed at least by two referees. After articles are accepted for publishing, if there are more articles than the quota for the immediate volume, the articles are automatically shifted for the next volume. If an article is not published this way within a year, it is withdrawn from publishing list.

The copyright for the published articles and book reviews belongs the Journal of Security Sciences, however authors remain responsible for the contents of publications. The Journal of Security Sciences is under no circumstances responsible for the contents of the articles/book reviews. Feedbacks and all relevant information about the articles/book reviews are stored by the Journal of Security Sciences for 5 years.

       The Journal of Security Sciences is free of charge, hence no money is paid to the authors for the copyrights.

1.2. Ethical Principles

       Journal of Security Sciences puts great importance on publication ethics regarding the development of the scientific information. Therefore, such principles like Transparency and Best Practice in Scholarly Publishing regulated by organizations like Committee of Publication ethics (COPE) (https://publicationethics.org/) and Directory of Open Access Journals (DOAJ) (https://doaj.org/publishers#licensing) are strictly followed.

       Any kind of research applying either qualitative or quantitative data collection approach and using any methods  like questionnaire, interview, focus group work, observation, experiment and discussion methods and  involving people or animals (including materials and the data) for scientific or experimental purposes, and retrospective studies require research ethics committee approval regarding the law on the protection of personal data.

       Moreover, it is required to note not only that informed consent form was taken in case reports, and that the permission to use their scales, surveys, photographs was given by the owners, but also that the regulations on the copyright about ideas and art pieces were strictly followed.

       This academic journal sticks to principles like open-access and free of charge in scholarly publishing and thus never requires any fee for the admission of articles from their writers. The complete content is open to access online and full-text at the exact date declared and without any limitation.

  1. RIGHTS AND RESPONSIBILITIES

2.1. Rights and Responsibilities of the Editorial Board

       The Editorial Board of Journal of Security Sciences has the right and responsibility to decide the publication of articles and book reviews by taken into accounts feedbacks received from referees. The Editorial Board recommends publishing guides on (https://publicationethics.org) and promotes academic integrity.

       Editorial Board has the right to decline articles and book reviews which contain plagiairised metarials or breach principles on academic integrity.

       Submitted manuscripts must not be published or scheduled to appear in any other publications. Accepting a manuscript for peer reviewing process does  necessarily mean a confirmation for publication.

2.2. Rights and Responsibilities of Author

       Articles and book reviews submitted to the Journal of Security Sciences have to be original works of the authors. Submitted manuscripts should not be in any kind of submitting process in any other publishing platforms. The authors are responsible for the validity and confirmation of the bibliography. Plagiarism is not tolerated.

       Author has the right to withdraw submitted manuscripts at any time before Editorial Board approves publication. In such cases, authors must inform the Board as early as possible.

       In case of translated manuscripts, authors who write the original work and translators are both responsible for the contents and any breaches of academic integrity principles.

       In cases where the manuscripts are sent back to authors for corrections after peer reviewed, the corrected manuscripts need to be submitted within 2 months.

       In cases where the authors disagree with the feedbacks given by referees and Editorial Board they have a right to object. In such cases, authors need to submit their own thoughts and critics regarding the feedbacks given by referees and Editorial Board in written for re-consideration..

2.3. Responsibilities of Referees

       The Journal ensures that manuscripts are reviewed by using a double-blind peer-review method. Referees are responsible for keeping the manuscripts confidential and not using the knowledge and information they encounter via manuscripts for personal gain.

       All reviews and information on manuscripts are strictly confidential and must not be shared with others. Referees are not allowed to contact with the authors unless allowed otherwise by the Editorial Board.

       Referee is expected to inform the Journal of Security Sciences immediately in case of breaches arising from academic integrity during the review process if they determine any. Referees are expected to be objective and personal criticisms towards authors are not allowed.

 

3. GUIDELINE ON WRITING STYLE

3.1. General Principles

  • Authors are required to submit the workplace info, contact addresses/numbers/email addresses and ORCID (Open Researcher and Contributor ID) number.
  • Manuscripts can be Turkish or English. Submitted manuscripts should be clear and understandable.
  • Articles should be between 4000 and 7000 words including the footnotes. Book reviews are required to be between 1000-1500 words.
  • Articles must have ‘Öz’ in Turkish and ‘Abstract’ in English at the beginning and they must be written in between 150-200 words. Both ‘Öz’ in Turkish and ‘Abstract’ in English need to cover the purpose, method, hypothesis and results of the study briefly. Studies written in English should present the English ‘abstract’ before and those written in Turkish should present the Turkish ‘Öz’ before. Both Turkish ‘Öz’ and English ‘Abstract’ must be typed in single space, 9 point font and in italics. Also in both versions of the articles, at least three or at most seven key words must be added to the abstracts.
  • Author’s academic title, position, institutional email address and ORCID number should be stated in a footnote in the first page starting with a “ * ” 9 points font size. (Assoc. Prof., Gendarmerie and Coast Guard Academy Security Sciences Institute, editorgbd@jandarma.gov.tr, ORCID:… i.e.)
  • Tables, figures and illustrstions should be numbered consecutively, captioned and cited in the text in sequential order. Captions should before the table and after the figures/illustrarions.
  • Equations should be numbered consecutively. That number should be in parenthesis on the right side of the page.
  • Authors need to refrain using footnotes and incorporate them with the main body.
  • Technical terms need to be used with quotation marks and authors need to refrain from using abbreviations without providing the full form of them at first appearance in the text.

3.2. Principles Regarding Page Layout

  • Manuscripts should have single line spacing, Times New Roman font, 11 font size, (Top 4.6 mm, bottom 4.6 mm, left and right indent 4 mm, gutter 0, header 4.6 mm, footnote 5 mm, paper size A4.
  • Manuscripts should start with an introduction section, be separated into proper sections afterwards and following with a conclusion section. Bibliography needs to continue with the conclusion section and the last section should be the attachments section.
  • Without numbered to introduction, conclusion and bibliography; sections should be numbered consecutively. Symbols such as (*, -) can be used after the 3rd level segment. Section headings;

1. FIRST LEVEL SEGMENT (ALIGN LEFT, BOLD, CAPITAL LETTERS)

1.1. Second Level Segment (Align Left, Bold, First Letters are Capital)

      1. Third Level (Align Left, Italic, First Letters are Capital)
  • Tables, figures and illustrations should be numbered (Table-1., Chart-2. ie.). Tables names should be on top of the tables and centered; names of the figures should be under the figures and centered as well.
  • Contents of the tables and figures should be Times New Roman and 9 points font size (can be used as 9 or 11 according to the page layout). Statistical numbers are expected to have no more than 3 digits after decimal point. Tables, figures and illustrations should be cited if needed.
  • After the first page, authors name should be in the header in even number pages and name of the manuscript should be on the odd page headers in 9 points font size.

3.3. Guideline for Citiations

  • References in the body of your manuscripts should be in (Author, Date) format. When directly quoting from a text, you must include a page number in the citation as well.
  • If you are using more than one reference by the same author/authors, the earlier dated publications should be listed first in the bibliography. If it is published in the same year, authors need to assign letter suffixes after the year i.e.: "Pala (1981a) makes similar claims...".
  • Citiations for the publications with 3 and more authors should have their full names written for the first citing and then use “(The first authors surname) et al. for subsequent entries. If there are more than 5 authors, first author’s name should be followed with “et al.”
  • If author is directly quoting from a work, then it will need to include the author, year of publication, and page number for the reference (preceded by "p."). Introduce the quotation with a signal phrase that includes the author's last name followed by the date of publication in parentheses.
  • If the author is quoting more than 40 words, it is required to start the quotation on a new line, indented two tabs from the left margin, i.e. in the same place one would begin a new paragraph.
  • In case of citing a periodic publication without a specific author name, the name of the publication can be used instead of author name. (Wall Street Journal, 2009 i.e).
  • In case of parenthetical citation including two or more authors, it is required to order them alphabetically, separated by a semi-colon. (Abrams, 2000; Sullivan and Hellman, 1999).
  • In case the source quotes or refers to another source, indirect sources should be cited as (Blau, 1964 cited in Tamer, 2013)
  • Online articles follow the same guidelines for printed articles. Citiations should include all information the online host makes available.
  • Authors may add an acknowledgement section at the end of the manuscripts to express thanks and pay their tribute.

3.4. Guideline for Reference List

  • Reference list should be 12 points font size and written alphabetically. There should not be any other kind of categorization in the reference list.
  • Book references won’t be having page numbers but the articles will show the pages of the article in where it is published.
  • Online sources should show the access date.
  • This Journal utilizes APA 6th Reference Style with some minor differences. Please advise the manual for further info and details. (https://www.apastyle.org/manual)
  • Authors surnames first letter should be capitalized and include only the first letter of the name. If there is any DOI number of the reference, it should be included in the reference as well. Please find the below examples of common references.

Books

Sarı, G. (2013). Ermeni meselesi ışığında Süryaniler. Ankara: Barış Platin Publishing.

Bloch, S. ve Whiteley, P. (2010). Düz bir dünyada yöneticilik (2nd Edition). (Ü. Şensoy, Trans.) İstanbul: İş Bankası Publishing.

Avcı, E. (2017). Türkiye’de terörizmin tarihsel seyri. G.Sarı ve C.K.Demir. (Ed.), Güvenlik bilimlerine giriş (pp. 287-314). Ankara: Jandarma Publishing.

Articles

Ak, T. (2018, Mayıs). Silahlı insansız hava araçlarının kullanımında karar mekanizmaları. Güvenlik Bilimleri Dergisi, 7(1), 111-130. doi:10.28956/gbd.422803

Encyclopedia

Ersoy, O. (1973). Kağıt. Türk Ansiklopedisi içinde (Vol. 21, pp.112-115). Ankara: Milli Eğitim Bakanlığı.

Unpublished Papers

Aplak, H.S. (2010). Karar verme sürecinde bulanık mantık bazlı oyun teorisi. (Unpublished Doctoral Thesis). Gazi University, Ankara.

Conference Proceedings

Sarı, G. ve Ak, T. (2018). Güvenlik alan yeterlilikleri ve akademik çalışmalar. In H.Kahya (Ed.), 1.Uluslararası Eğitim ve Sosyal Bilimlerde Yeni Ufuklar Kongresi bildiriler kitabı (pp. 130-134). İstanbul: ASOS. doi:10.21733/ibad.417321

Electronic Sources

Shotton, M.A. (1989). Computer addiction? A study of computer dependency. Retrieved August 18, 2011, from http://www.ebookstore.tandf.co.uk/ html/index

Unknown Authored Online Articles

New child vaccine gets funding boost. (2001). Retrieved February 21, 2012, from http://news.ninemsn.com.au/health/story_13178.asp.

Blog

Webber, S. (2008, October 10th). Information literacy in work place contexts. Retrieved October 22, 2018, from http://information-literacy.blogspot.com/.

3.5. Guideline for Book Reviews

Book reviews are detailed reviews of claims and subjects of the books. The review should include an introduction, discussion (method, scope and contents) and conclusion. Introduction section is a summary of the claims and main arguments in the book. In the discussion sections, book reviewers are expected to discuss the method, scope and contents of the book in a whole. The conclusion section talks critically about the general impressions of the reviewer on the book and the contribution the book makes.

Book Review titles should include the name of the book, author, in which city it is published, publication year and ISBN. At the bottom of the first page the book reviewers need to include their title, the institution they work and email address corresponding to an asterisk.

 

ABOUT US

  • Academy President
  • History
  • Integrated Quality Management System
    • Vision
    • Mission
    • Core Values
    • Our Policies
  • Organization Chart
  • Legislation
  • About Campus
  • Gallery
    • Catalog and Brochure
    • Videos
  • Agenda
    • News
    • Announcements

ACADEMIC

  • Ethics Committee
  • Faculty
  • The Institute of Security Sciences
  • Vocational High School
  • Directorate of Research Centers
  • Continuing Education Center Command
  • Training Center Command
  • Library
  • Publications
  • International Organizations
  • Gendarmerie E-Academy
  • Learning Management System-JSGA Distance Education

ACTIVITIES

  • Activities
  • GCGA Wednesday Conferences
  • Symposium
  • Congress

CADET

  • Cadet Candidate
  • International Cadet
  • Erasmus Exchange Student
  • Frequently Asked Questions
    • International Cadet / About Erasmus
    • About Faculty
    • About Officer Training Center Cadet Candidacy
    • About NCO Training Center Cadet Candidacy

CONTACT

  • ABOUT US
    • Academy President
    • History
    • Integrated Quality Management System
      • Vision
      • Mission
      • Core Values
      • Our Policies
    • Organization Chart
    • Legislation
    • About Campus
    • Gallery
      • Catalog and Brochure
      • Videos
    • Agenda
      • News
      • Announcements
  • ACADEMIC
    • Ethics Committee
    • Faculty
    • The Institute of Security Sciences
    • Vocational High School
    • Directorate of Research Centers
    • Continuing Education Center Command
    • Training Center Command
    • Library
    • Publications
    • International Organizations
    • Gendarmerie E-Academy
    • Learning Management System-JSGA Distance Education
  • ACTIVITIES
    • Activities
    • GCGA Wednesday Conferences
    • Symposium
    • Congress
  • CADET
    • Cadet Candidate
    • International Cadet
    • Erasmus Exchange Student
    • Frequently Asked Questions
      • International Cadet / About Erasmus
      • About Faculty
      • About Officer Training Center Cadet Candidacy
      • About NCO Training Center Cadet Candidacy
  • CONTACT
© 2020  Gendarmerie And Coast Guard Academy 
Sizlere daha iyi hizmet verebilmek için sitemizde çerezlere yer veriyoruz 🍪 Çerez politikamız hakkında bilgi edinmek için tıklayınız