Course Description
Course | Code | Semester | T+P (Hour) | Credit | ECTS |
---|---|---|---|---|---|
CYBER CRIMES | KHKY1212191 | Spring Semester | 3+0 | 3 | 7 |
Course Program | Salı 13:30-14:15 Salı 14:30-15:15 Salı 15:30-16:15 |
Prerequisites Courses | |
Recommended Elective Courses |
Language of Course | Turkish |
Course Level | Second Cycle (Master's Degree) |
Course Type | Elective |
Course Coordinator | Prof.Dr. Mahmut KOCA |
Name of Lecturer(s) | Prof.Dr. Mahmut KOCA |
Assistant(s) | |
Aim | It is aimed the students to have information about cyber crimes, the methods on fighting against these crimes and measures that should be taken, even the methods of obtaining the evidence. |
Course Content | This course contains; The definition and history of the computer, concepts related to computer and the information system.,Explanation of IT law in legal order as a law discipline, the relation about basic law disciplines, the concept, history and methods of cyber crimes as well cyber crimes on comparative law.,Explanation and critisizm of the position of cyber crimes in Turkish law and cyber crimes in 765 numbered Turkish Criminal Code.,General explanation on the new Turkish Criminal Code, the system of the cyber crimes stated on the code, logging in the information system illegally, hacking into a computer system and not logging out., Prevention, corruption of the information system process, destruction or transformation of the data offense; providing illegal benefit via information system offense.,Abuse of the bank or credit cards offense.,Offenses against personal data.,Theft and fraud via information systems offenses., More offenses via information systems.,Cyber crimes enacted Code of Intellectual and Artistic Works and Code of Electronic Signiture.,Criminal procedure protection measures, digital forensics and provisions should be made fighting against there crimes.,Criminal procedure protection measures, digital forensics and provisions should be made fighting against there crimes.,Relations between cyber crimes and criminology, economical offenses and cyber terrorism., Cyber crimes with regard to the law required.. |
Dersin Öğrenme Kazanımları | Teaching Methods | Assessment Methods |
1.1 Defines the basic concepts of information law. | 16, 9 | A |
1.2. Interprets information systems | 16, 9 | A |
2.1 Solves the problems related to cybercrimes by analyzing systematically based on the theoretical background acquired. | 16, 9 | A |
2.2. To comprehend the relevant provisions of Turkish legislation and international legislation. | 16, 9 | A |
2.3. Interpret relevant national and international jurisprudence. | 16, 9 | A |
3.1. Resolve practical problems. | 10, 16 | A |
3.2. Evaluate recent developments. | 10, 16 | A |
3.3. Propose solutions for the problems of cyberspace. | 10, 16 | A |
Teaching Methods: | 10: Discussion Method, 16: Question - Answer Technique, 9: Lecture Method |
Assessment Methods: | A: Traditional Written Exam |
Course Outline
Order | Subjects | Preliminary Work |
---|---|---|
1 | The definition and history of the computer, concepts related to computer and the information system. | There is no preliminary preparation. |
2 | Explanation of IT law in legal order as a law discipline, the relation about basic law disciplines, the concept, history and methods of cyber crimes as well cyber crimes on comparative law. | There is no preliminary preparation. |
3 | Explanation and critisizm of the position of cyber crimes in Turkish law and cyber crimes in 765 numbered Turkish Criminal Code. | There is no preliminary preparation. |
4 | General explanation on the new Turkish Criminal Code, the system of the cyber crimes stated on the code, logging in the information system illegally, hacking into a computer system and not logging out. | There is no preliminary preparation. |
5 | Prevention, corruption of the information system process, destruction or transformation of the data offense; providing illegal benefit via information system offense. | There is no preliminary preparation. |
6 | Abuse of the bank or credit cards offense. | There is no preliminary preparation. |
7 | Offenses against personal data. | There is no preliminary preparation. |
8 | Theft and fraud via information systems offenses. | There is no preliminary preparation. |
9 | More offenses via information systems. | There is no preliminary preparation. |
10 | Cyber crimes enacted Code of Intellectual and Artistic Works and Code of Electronic Signiture. | There is no preliminary preparation. |
11 | Criminal procedure protection measures, digital forensics and provisions should be made fighting against there crimes. | There is no preliminary preparation. |
12 | Criminal procedure protection measures, digital forensics and provisions should be made fighting against there crimes. | There is no preliminary preparation. |
13 | Relations between cyber crimes and criminology, economical offenses and cyber terrorism. | There is no preliminary preparation. |
14 | Cyber crimes with regard to the law required. | There is no preliminary preparation. |
Resources |
Mahmut KOCA, İlhan ÜZÜLMEZ, Türk Ceza Hukuku Özel Hükümler, 9th Ed., Ankara 2023 |
Course Contribution to Program Qualifications
Course Contribution to Program Qualifications | |||||||
No | Program Qualification | Contribution Level | |||||
1 | 2 | 3 | 4 | 5 | |||
1 | PY1) In light of the current developments in the field of public law, have knowledge about the main sources, legislation and jurisprudence which related to the public law. | X | |||||
2 | PY2) With understanding relationships among concept, institution and method that related to disciplines of public law, establish a connection between them. | X | |||||
3 | PY3) Reach scientific knowledge in the field of public law, evaluate, and use this information to solve legal problems. | X | |||||
4 | PY4) Implement the idea about individual and social problems of public law and in the light of current developments find resolutions. | X | |||||
5 | PY5) Solve the problems encountered in the legal theory and practice by using research methods that specific to field of law. | X | |||||
6 | PY6) Carry out an independent study which needs expertise in the field of public law and its sub-disciplines. | X | |||||
7 | PY7) Develop different perspectives and take responsibility to solve complex issues which require expertise and encountered in the field of public law and its sub-disciplines. | X | |||||
8 | PY8) Critically evaluate acquired knowledge and skills in the field of public law and its sub-disciplines. | X | |||||
9 | PY9) Develop a positive attitude towards lifelong learning and convert it to behavior. | X | |||||
10 | PY10) Mean acquired knowledge in the field of public law and current developments about legal theory and practice to all groups systematically in written or oral form. | X | |||||
11 | PY11) Critically question concepts and institutions of law, settled practice of law and norms and when necessary develop and attempt to change them. | X | |||||
12 | PY12) Use software which in the level required by the field of law and information and communication technologies in the advanced level. | X | |||||
13 | PY13) Take into consideration and internalize social, scientific and ethical values in the process of gathering, processing and evaluating information about field of public law and its sub-disciplines. | X | |||||
14 | PY14) With developing understanding of honesty, justice and ethics are required to be lawyer, teach around them. | X |
Assessment Methods
Contribution Level | Absolute Evaluation | |
Rate of Midterm Exam to Success | 50 | |
Rate of Final Exam to Success | 50 | |
Total | 100 |
ECTS / Workload Table | ||||||
Activities | Number of | Duration(Hour) | Total Workload(Hour) | |||
Course Hours | 14 | 3 | 42 | |||
Guided Problem Solving | 6 | 6 | 36 | |||
Resolution of Homework Problems and Submission as a Report | 14 | 3 | 42 | |||
Term Project | 1 | 20 | 20 | |||
Presentation of Project / Seminar | 1 | 20 | 20 | |||
Quiz | 0 | 0 | 0 | |||
Midterm Exam | 1 | 17 | 17 | |||
General Exam | 1 | 33 | 33 | |||
Performance Task, Maintenance Plan | 0 | 0 | 0 | |||
Total Workload(Hour) | 210 | |||||
Dersin AKTS Kredisi = Toplam İş Yükü (Saat)/30*=(210/30) | 7 | |||||
ECTS of the course: 30 hours of work is counted as 1 ECTS credit. |
Detail Informations of the Course
Course Description
Course | Code | Semester | T+P (Hour) | Credit | ECTS |
---|---|---|---|---|---|
CYBER CRIMES | KHKY1212191 | Spring Semester | 3+0 | 3 | 7 |
Course Program | Salı 13:30-14:15 Salı 14:30-15:15 Salı 15:30-16:15 |
Prerequisites Courses | |
Recommended Elective Courses |
Language of Course | Turkish |
Course Level | Second Cycle (Master's Degree) |
Course Type | Elective |
Course Coordinator | Prof.Dr. Mahmut KOCA |
Name of Lecturer(s) | Prof.Dr. Mahmut KOCA |
Assistant(s) | |
Aim | It is aimed the students to have information about cyber crimes, the methods on fighting against these crimes and measures that should be taken, even the methods of obtaining the evidence. |
Course Content | This course contains; The definition and history of the computer, concepts related to computer and the information system.,Explanation of IT law in legal order as a law discipline, the relation about basic law disciplines, the concept, history and methods of cyber crimes as well cyber crimes on comparative law.,Explanation and critisizm of the position of cyber crimes in Turkish law and cyber crimes in 765 numbered Turkish Criminal Code.,General explanation on the new Turkish Criminal Code, the system of the cyber crimes stated on the code, logging in the information system illegally, hacking into a computer system and not logging out., Prevention, corruption of the information system process, destruction or transformation of the data offense; providing illegal benefit via information system offense.,Abuse of the bank or credit cards offense.,Offenses against personal data.,Theft and fraud via information systems offenses., More offenses via information systems.,Cyber crimes enacted Code of Intellectual and Artistic Works and Code of Electronic Signiture.,Criminal procedure protection measures, digital forensics and provisions should be made fighting against there crimes.,Criminal procedure protection measures, digital forensics and provisions should be made fighting against there crimes.,Relations between cyber crimes and criminology, economical offenses and cyber terrorism., Cyber crimes with regard to the law required.. |
Dersin Öğrenme Kazanımları | Teaching Methods | Assessment Methods |
1.1 Defines the basic concepts of information law. | 16, 9 | A |
1.2. Interprets information systems | 16, 9 | A |
2.1 Solves the problems related to cybercrimes by analyzing systematically based on the theoretical background acquired. | 16, 9 | A |
2.2. To comprehend the relevant provisions of Turkish legislation and international legislation. | 16, 9 | A |
2.3. Interpret relevant national and international jurisprudence. | 16, 9 | A |
3.1. Resolve practical problems. | 10, 16 | A |
3.2. Evaluate recent developments. | 10, 16 | A |
3.3. Propose solutions for the problems of cyberspace. | 10, 16 | A |
Teaching Methods: | 10: Discussion Method, 16: Question - Answer Technique, 9: Lecture Method |
Assessment Methods: | A: Traditional Written Exam |
Course Outline
Order | Subjects | Preliminary Work |
---|---|---|
1 | The definition and history of the computer, concepts related to computer and the information system. | There is no preliminary preparation. |
2 | Explanation of IT law in legal order as a law discipline, the relation about basic law disciplines, the concept, history and methods of cyber crimes as well cyber crimes on comparative law. | There is no preliminary preparation. |
3 | Explanation and critisizm of the position of cyber crimes in Turkish law and cyber crimes in 765 numbered Turkish Criminal Code. | There is no preliminary preparation. |
4 | General explanation on the new Turkish Criminal Code, the system of the cyber crimes stated on the code, logging in the information system illegally, hacking into a computer system and not logging out. | There is no preliminary preparation. |
5 | Prevention, corruption of the information system process, destruction or transformation of the data offense; providing illegal benefit via information system offense. | There is no preliminary preparation. |
6 | Abuse of the bank or credit cards offense. | There is no preliminary preparation. |
7 | Offenses against personal data. | There is no preliminary preparation. |
8 | Theft and fraud via information systems offenses. | There is no preliminary preparation. |
9 | More offenses via information systems. | There is no preliminary preparation. |
10 | Cyber crimes enacted Code of Intellectual and Artistic Works and Code of Electronic Signiture. | There is no preliminary preparation. |
11 | Criminal procedure protection measures, digital forensics and provisions should be made fighting against there crimes. | There is no preliminary preparation. |
12 | Criminal procedure protection measures, digital forensics and provisions should be made fighting against there crimes. | There is no preliminary preparation. |
13 | Relations between cyber crimes and criminology, economical offenses and cyber terrorism. | There is no preliminary preparation. |
14 | Cyber crimes with regard to the law required. | There is no preliminary preparation. |
Resources |
Mahmut KOCA, İlhan ÜZÜLMEZ, Türk Ceza Hukuku Özel Hükümler, 9th Ed., Ankara 2023 |
Course Contribution to Program Qualifications
Course Contribution to Program Qualifications | |||||||
No | Program Qualification | Contribution Level | |||||
1 | 2 | 3 | 4 | 5 | |||
1 | PY1) In light of the current developments in the field of public law, have knowledge about the main sources, legislation and jurisprudence which related to the public law. | X | |||||
2 | PY2) With understanding relationships among concept, institution and method that related to disciplines of public law, establish a connection between them. | X | |||||
3 | PY3) Reach scientific knowledge in the field of public law, evaluate, and use this information to solve legal problems. | X | |||||
4 | PY4) Implement the idea about individual and social problems of public law and in the light of current developments find resolutions. | X | |||||
5 | PY5) Solve the problems encountered in the legal theory and practice by using research methods that specific to field of law. | X | |||||
6 | PY6) Carry out an independent study which needs expertise in the field of public law and its sub-disciplines. | X | |||||
7 | PY7) Develop different perspectives and take responsibility to solve complex issues which require expertise and encountered in the field of public law and its sub-disciplines. | X | |||||
8 | PY8) Critically evaluate acquired knowledge and skills in the field of public law and its sub-disciplines. | X | |||||
9 | PY9) Develop a positive attitude towards lifelong learning and convert it to behavior. | X | |||||
10 | PY10) Mean acquired knowledge in the field of public law and current developments about legal theory and practice to all groups systematically in written or oral form. | X | |||||
11 | PY11) Critically question concepts and institutions of law, settled practice of law and norms and when necessary develop and attempt to change them. | X | |||||
12 | PY12) Use software which in the level required by the field of law and information and communication technologies in the advanced level. | X | |||||
13 | PY13) Take into consideration and internalize social, scientific and ethical values in the process of gathering, processing and evaluating information about field of public law and its sub-disciplines. | X | |||||
14 | PY14) With developing understanding of honesty, justice and ethics are required to be lawyer, teach around them. | X |
Assessment Methods
Contribution Level | Absolute Evaluation | |
Rate of Midterm Exam to Success | 50 | |
Rate of Final Exam to Success | 50 | |
Total | 100 |