Skip to main content

Course Description

CourseCodeSemesterT+P (Hour)CreditECTS
CYBER CRIMES-Spring Semester3+037
Course Program
Prerequisites Courses
Recommended Elective Courses
Language of CourseTurkish
Course LevelSecond Cycle (Master's Degree)
Course TypeElective
Course CoordinatorProf.Dr. Mahmut KOCA
Name of Lecturer(s)Prof.Dr. Mahmut KOCA
Assistant(s)
AimIt is aimed the students to have information about cyber crimes, the methods on fighting against these crimes and measures that should be taken, even the methods of obtaining the evidence.
Course ContentThis course contains; The definition and history of the computer, concepts related to computer and the information system.,Explanation of IT law in legal order as a law discipline, the relation about basic law disciplines, the concept, history and methods of cyber crimes as well cyber crimes on comparative law.,Explanation and critisizm of the position of cyber crimes in Turkish law and cyber crimes in 765 numbered Turkish Criminal Code.,General explanation on the new Turkish Criminal Code, the system of the cyber crimes stated on the code, logging in the information system illegally, hacking into a computer system and not logging out., Prevention, corruption of the information system process, destruction or transformation of the data offense; providing illegal benefit via information system offense.,Abuse of the bank or credit cards offense.,Offenses against personal data.,Theft and fraud via information systems offenses., More offenses via information systems.,Cyber crimes enacted Code of Intellectual and Artistic Works and Code of Electronic Signiture.,Criminal procedure protection measures, digital forensics and provisions should be made fighting against there crimes.,Criminal procedure protection measures, digital forensics and provisions should be made fighting against there crimes.,Relations between cyber crimes and criminology, economical offenses and cyber terrorism., Cyber crimes with regard to the law required..
Dersin Öğrenme KazanımlarıTeaching MethodsAssessment Methods
1.1 Defines the basic concepts of information law.16, 9A
1.2. Interprets information systems16, 9A
2.1 Solves the problems related to cybercrimes by analyzing systematically based on the theoretical background acquired.16, 9A
2.2. To comprehend the relevant provisions of Turkish legislation and international legislation.16, 9A
2.3. Interpret relevant national and international jurisprudence.16, 9A
3.1. Resolve practical problems.10, 16A
3.2. Evaluate recent developments.10, 16A
3.3. Propose solutions for the problems of cyberspace.10, 16A
Teaching Methods:10: Discussion Method, 16: Question - Answer Technique, 9: Lecture Method
Assessment Methods:A: Traditional Written Exam

Course Outline

OrderSubjectsPreliminary Work
1The definition and history of the computer, concepts related to computer and the information system.There is no preliminary preparation.
2Explanation of IT law in legal order as a law discipline, the relation about basic law disciplines, the concept, history and methods of cyber crimes as well cyber crimes on comparative law.There is no preliminary preparation.
3Explanation and critisizm of the position of cyber crimes in Turkish law and cyber crimes in 765 numbered Turkish Criminal Code.There is no preliminary preparation.
4General explanation on the new Turkish Criminal Code, the system of the cyber crimes stated on the code, logging in the information system illegally, hacking into a computer system and not logging out.There is no preliminary preparation.
5 Prevention, corruption of the information system process, destruction or transformation of the data offense; providing illegal benefit via information system offense.There is no preliminary preparation.
6Abuse of the bank or credit cards offense.There is no preliminary preparation.
7Offenses against personal data.There is no preliminary preparation.
8Theft and fraud via information systems offenses.There is no preliminary preparation.
9 More offenses via information systems.There is no preliminary preparation.
10Cyber crimes enacted Code of Intellectual and Artistic Works and Code of Electronic Signiture.There is no preliminary preparation.
11Criminal procedure protection measures, digital forensics and provisions should be made fighting against there crimes.There is no preliminary preparation.
12Criminal procedure protection measures, digital forensics and provisions should be made fighting against there crimes.There is no preliminary preparation.
13Relations between cyber crimes and criminology, economical offenses and cyber terrorism.There is no preliminary preparation.
14 Cyber crimes with regard to the law required.There is no preliminary preparation.
Resources
Mahmut KOCA, İlhan ÜZÜLMEZ, Türk Ceza Hukuku Özel Hükümler, 9th Ed., Ankara 2023

Course Contribution to Program Qualifications

Course Contribution to Program Qualifications
NoProgram QualificationContribution Level
12345
1
PY1) In light of the current developments in the field of public law, have knowledge about the main sources, legislation and jurisprudence which related to the public law.
X
2
PY2) With understanding relationships among concept, institution and method that related to disciplines of public law, establish a connection between them.
X
3
PY3) Reach scientific knowledge in the field of public law, evaluate, and use this information to solve legal problems.
X
4
PY4) Implement the idea about individual and social problems of public law and in the light of current developments find resolutions.
X
5
PY5) Solve the problems encountered in the legal theory and practice by using research methods that specific to field of law.
X
6
PY6) Carry out an independent study which needs expertise in the field of public law and its sub-disciplines.
X
7
PY7) Develop different perspectives and take responsibility to solve complex issues which require expertise and encountered in the field of public law and its sub-disciplines.
X
8
PY8) Critically evaluate acquired knowledge and skills in the field of public law and its sub-disciplines.
X
9
PY9) Develop a positive attitude towards lifelong learning and convert it to behavior.
X
10
PY10) Mean acquired knowledge in the field of public law and current developments about legal theory and practice to all groups systematically in written or oral form.
X
11
PY11) Critically question concepts and institutions of law, settled practice of law and norms and when necessary develop and attempt to change them.
X
12
PY12) Use software which in the level required by the field of law and information and communication technologies in the advanced level.
X
13
PY13) Take into consideration and internalize social, scientific and ethical values in the process of gathering, processing and evaluating information about field of public law and its sub-disciplines.
X
14
PY14) With developing understanding of honesty, justice and ethics are required to be lawyer, teach around them.
X

Assessment Methods

Contribution LevelAbsolute Evaluation
Rate of Midterm Exam to Success 50
Rate of Final Exam to Success 50
Total 100
ECTS / Workload Table
ActivitiesNumber ofDuration(Hour)Total Workload(Hour)
Course Hours14342
Guided Problem Solving6636
Resolution of Homework Problems and Submission as a Report14342
Term Project12020
Presentation of Project / Seminar12020
Quiz000
Midterm Exam11717
General Exam13333
Performance Task, Maintenance Plan000
Total Workload(Hour)210
Dersin AKTS Kredisi = Toplam İş Yükü (Saat)/30*=(210/30)7
ECTS of the course: 30 hours of work is counted as 1 ECTS credit.

Detail Informations of the Course

Course Description

CourseCodeSemesterT+P (Hour)CreditECTS
CYBER CRIMES-Spring Semester3+037
Course Program
Prerequisites Courses
Recommended Elective Courses
Language of CourseTurkish
Course LevelSecond Cycle (Master's Degree)
Course TypeElective
Course CoordinatorProf.Dr. Mahmut KOCA
Name of Lecturer(s)Prof.Dr. Mahmut KOCA
Assistant(s)
AimIt is aimed the students to have information about cyber crimes, the methods on fighting against these crimes and measures that should be taken, even the methods of obtaining the evidence.
Course ContentThis course contains; The definition and history of the computer, concepts related to computer and the information system.,Explanation of IT law in legal order as a law discipline, the relation about basic law disciplines, the concept, history and methods of cyber crimes as well cyber crimes on comparative law.,Explanation and critisizm of the position of cyber crimes in Turkish law and cyber crimes in 765 numbered Turkish Criminal Code.,General explanation on the new Turkish Criminal Code, the system of the cyber crimes stated on the code, logging in the information system illegally, hacking into a computer system and not logging out., Prevention, corruption of the information system process, destruction or transformation of the data offense; providing illegal benefit via information system offense.,Abuse of the bank or credit cards offense.,Offenses against personal data.,Theft and fraud via information systems offenses., More offenses via information systems.,Cyber crimes enacted Code of Intellectual and Artistic Works and Code of Electronic Signiture.,Criminal procedure protection measures, digital forensics and provisions should be made fighting against there crimes.,Criminal procedure protection measures, digital forensics and provisions should be made fighting against there crimes.,Relations between cyber crimes and criminology, economical offenses and cyber terrorism., Cyber crimes with regard to the law required..
Dersin Öğrenme KazanımlarıTeaching MethodsAssessment Methods
1.1 Defines the basic concepts of information law.16, 9A
1.2. Interprets information systems16, 9A
2.1 Solves the problems related to cybercrimes by analyzing systematically based on the theoretical background acquired.16, 9A
2.2. To comprehend the relevant provisions of Turkish legislation and international legislation.16, 9A
2.3. Interpret relevant national and international jurisprudence.16, 9A
3.1. Resolve practical problems.10, 16A
3.2. Evaluate recent developments.10, 16A
3.3. Propose solutions for the problems of cyberspace.10, 16A
Teaching Methods:10: Discussion Method, 16: Question - Answer Technique, 9: Lecture Method
Assessment Methods:A: Traditional Written Exam

Course Outline

OrderSubjectsPreliminary Work
1The definition and history of the computer, concepts related to computer and the information system.There is no preliminary preparation.
2Explanation of IT law in legal order as a law discipline, the relation about basic law disciplines, the concept, history and methods of cyber crimes as well cyber crimes on comparative law.There is no preliminary preparation.
3Explanation and critisizm of the position of cyber crimes in Turkish law and cyber crimes in 765 numbered Turkish Criminal Code.There is no preliminary preparation.
4General explanation on the new Turkish Criminal Code, the system of the cyber crimes stated on the code, logging in the information system illegally, hacking into a computer system and not logging out.There is no preliminary preparation.
5 Prevention, corruption of the information system process, destruction or transformation of the data offense; providing illegal benefit via information system offense.There is no preliminary preparation.
6Abuse of the bank or credit cards offense.There is no preliminary preparation.
7Offenses against personal data.There is no preliminary preparation.
8Theft and fraud via information systems offenses.There is no preliminary preparation.
9 More offenses via information systems.There is no preliminary preparation.
10Cyber crimes enacted Code of Intellectual and Artistic Works and Code of Electronic Signiture.There is no preliminary preparation.
11Criminal procedure protection measures, digital forensics and provisions should be made fighting against there crimes.There is no preliminary preparation.
12Criminal procedure protection measures, digital forensics and provisions should be made fighting against there crimes.There is no preliminary preparation.
13Relations between cyber crimes and criminology, economical offenses and cyber terrorism.There is no preliminary preparation.
14 Cyber crimes with regard to the law required.There is no preliminary preparation.
Resources
Mahmut KOCA, İlhan ÜZÜLMEZ, Türk Ceza Hukuku Özel Hükümler, 9th Ed., Ankara 2023

Course Contribution to Program Qualifications

Course Contribution to Program Qualifications
NoProgram QualificationContribution Level
12345
1
PY1) In light of the current developments in the field of public law, have knowledge about the main sources, legislation and jurisprudence which related to the public law.
X
2
PY2) With understanding relationships among concept, institution and method that related to disciplines of public law, establish a connection between them.
X
3
PY3) Reach scientific knowledge in the field of public law, evaluate, and use this information to solve legal problems.
X
4
PY4) Implement the idea about individual and social problems of public law and in the light of current developments find resolutions.
X
5
PY5) Solve the problems encountered in the legal theory and practice by using research methods that specific to field of law.
X
6
PY6) Carry out an independent study which needs expertise in the field of public law and its sub-disciplines.
X
7
PY7) Develop different perspectives and take responsibility to solve complex issues which require expertise and encountered in the field of public law and its sub-disciplines.
X
8
PY8) Critically evaluate acquired knowledge and skills in the field of public law and its sub-disciplines.
X
9
PY9) Develop a positive attitude towards lifelong learning and convert it to behavior.
X
10
PY10) Mean acquired knowledge in the field of public law and current developments about legal theory and practice to all groups systematically in written or oral form.
X
11
PY11) Critically question concepts and institutions of law, settled practice of law and norms and when necessary develop and attempt to change them.
X
12
PY12) Use software which in the level required by the field of law and information and communication technologies in the advanced level.
X
13
PY13) Take into consideration and internalize social, scientific and ethical values in the process of gathering, processing and evaluating information about field of public law and its sub-disciplines.
X
14
PY14) With developing understanding of honesty, justice and ethics are required to be lawyer, teach around them.
X

Assessment Methods

Contribution LevelAbsolute Evaluation
Rate of Midterm Exam to Success 50
Rate of Final Exam to Success 50
Total 100

Numerical Data

Student Success

Ekleme Tarihi: 28/11/2023 - 17:07Son Güncelleme Tarihi: 28/11/2023 - 17:07