Course Description
Course | Code | Semester | T+P (Hour) | Credit | ECTS |
---|---|---|---|---|---|
INFORMATION TECHNOLOGY LAW | BPR2244640 | Spring Semester | 2+0 | 2 | 3 |
Course Program | Çarşamba 16:30-17:15 Çarşamba 17:30-18:15 |
Prerequisites Courses | |
Recommended Elective Courses |
Language of Course | Turkish |
Course Level | Short Cycle (Associate's Degree) |
Course Type | Required |
Course Coordinator | Lect. Beyza KOYULMUŞ |
Name of Lecturer(s) | Lect. Cihan ALP |
Assistant(s) | |
Aim | It is aimed the students to have information about cyber crimes, the methods on fighting against these crimes and measures that should be taken, even the methods of obtaining the evidence. |
Course Content | This course contains; The definition and history of the computer, concepts related to computer and the information system.,Explanation of IT law in legal order as a law discipline, the relation about basic law disciplines, the concept, history and methods of cyber crimes as well cyber crimes on comparative law.,Explanation and critisizm of the position of cyber crimes in Turkish law and cyber crimes in 765 numbered Turkish Criminal Code.,General explanation on the new Turkish Criminal Code, the system of the cyber crimes stated on the code, logging in the information system illegally, hacking into a computer system and not logging out.,The crime of preventing, disrupting, destroying or changing the functioning of the information system; knows the crime of providing illegal benefit through the information system,Abuse of the bank or credit cards offense.,Offenses against personal data.,Theft and fraud via information systems offenses.,More offenses via information systems.,Criminal procedure protection measures, digital forensics and provisions should be made fighting against there crimes.,Criminal procedure protection measures, digital forensics and provisions should be made fighting against there crimes.,Criminal procedure protection measures, digital forensics and provisions should be made fighting against there crimes.,Relations between cyber crimes and criminology, economical offenses and cyber terrorism.,General Review. |
Dersin Öğrenme Kazanımları | Teaching Methods | Assessment Methods |
1. Define basic concepts of cyber area. | 10, 12, 14, 2, 6, 9 | A, E, F |
1.1. Recognize the computer and derivatives. | 11, 12, 13, 14, 2, 6, 9 | A, E |
1.2. Recognize the infaormation systems. | 10, 14, 23, 4, 6, 9 | A, E, F |
1.3. Recognize the interaction of information systems. | 10, 12, 16, 2, 23, 4, 8, 9 | A, E, F |
2. Analyze systematically the problems on cybercrimes under favour of theoretical background. | 11, 12, 14, 16, 2, 23, 6 | A, E, F |
2.1. Identify relevant Turkish law. | 11, 14, 23, 8, 9 | A, E, F |
2.2. Identify relevant international law. | 12, 14, 2, 23, 9 | A, E |
2.3. Interpret relevant national and international jurisprudence. | 10, 11, 16, 23, 9 | A, E |
3. Resolve problems occured in practice. | 14, 2, 23, 4, 9 | A, E |
3.1. Resolve practical problems. | 11, 14, 2, 23, 9 | A, E |
3.2. Evaluate recent developments. | 10, 13, 23, 4, 9 | A, E |
3.3. Propose solutions for the problems of cyberspace. | 10, 23, 4, 8, 9 | A, E, F |
Teaching Methods: | 10: Discussion Method, 11: Demonstration Method, 12: Problem Solving Method, 13: Case Study Method, 14: Self Study Method, 16: Question - Answer Technique, 2: Project Based Learning Model, 23: Concept Map Technique, 4: Inquiry-Based Learning, 6: Experiential Learning, 8: Flipped Classroom Learning, 9: Lecture Method |
Assessment Methods: | A: Traditional Written Exam, E: Homework, F: Project Task |
Course Outline
Order | Subjects | Preliminary Work |
---|---|---|
1 | The definition and history of the computer, concepts related to computer and the information system. | |
2 | Explanation of IT law in legal order as a law discipline, the relation about basic law disciplines, the concept, history and methods of cyber crimes as well cyber crimes on comparative law. | |
3 | Explanation and critisizm of the position of cyber crimes in Turkish law and cyber crimes in 765 numbered Turkish Criminal Code. | |
4 | General explanation on the new Turkish Criminal Code, the system of the cyber crimes stated on the code, logging in the information system illegally, hacking into a computer system and not logging out. | |
5 | The crime of preventing, disrupting, destroying or changing the functioning of the information system; knows the crime of providing illegal benefit through the information system | |
6 | Abuse of the bank or credit cards offense. | |
7 | Offenses against personal data. | |
8 | Theft and fraud via information systems offenses. | |
9 | More offenses via information systems. | |
10 | Criminal procedure protection measures, digital forensics and provisions should be made fighting against there crimes. | |
11 | Criminal procedure protection measures, digital forensics and provisions should be made fighting against there crimes. | |
12 | Criminal procedure protection measures, digital forensics and provisions should be made fighting against there crimes. | |
13 | Relations between cyber crimes and criminology, economical offenses and cyber terrorism. | |
14 | General Review |
Resources |
Murat Volkan Dülger, Bilişim Suçları ve İnternet İletişim Hukuku, 6. Baskı, Seçkin Yayıncılık, 2015, Ankara. Ali Karagülmez, Bilişim Suçları ve Soruşturma-Kovuşturma Evreleri, 5. Baskı, Seçkin Yayıncılık, 2014, Ankara. |
Course Contribution to Program Qualifications
Course Contribution to Program Qualifications | |||||||
No | Program Qualification | Contribution Level | |||||
1 | 2 | 3 | 4 | 5 | |||
1 | Algoritma programlama, bilgisayar uygulaması geliştirme ve yazılım projelerinde kod geliştirme konularında yeterli altyapıya ve bunları iş hayatlarında kullanma yeteneğine sahiptir. | ||||||
2 | Programlama problemleri için bilinen çözüm yöntemlerini ve özel teknikleri kullanır ve uygular. | ||||||
3 | Yazılım uygulamaları için gerekli olan modern teknik ve araçları kullanır. | ||||||
4 | Bireysel olarak ve çok disiplinli takımlarda etkin olarak çalışır. | ||||||
5 | Geliştirilmiş uygulama veya yazılımın test aşamalarını gerçekler ve takip eder. | ||||||
6 | İşyeri uygulamaları, çalışanların sağlığı, çevre ve iş güvenliği, mesleki ve etik sorumluluk, programlama uygulamalarının hukuksal sonuçları konularında farkındalığa sahiptir. | ||||||
7 | Bilgiye erişir ve bu amaçla kaynak araştırması yapar. | ||||||
8 | Yaşam boyu öğrenmenin gerekliliği bilincindedir; bilim ve teknolojideki gelişmeleri izler ve kendini sürekli yeniler. | ||||||
9 | Sözlü ve yazılı, gerektiğinde teknik resimler ve modern araçlar kullanarak etkin iletişim kurar. | ||||||
10 | Yazılım çözümlerinin ve uygulamalarının evrensel ve toplumsal boyutlardaki etkilerinin bilincinde olur; çağın sorunları çözmede ve toplumsal ilerlemede yeni yazılımlar geliştirir. | ||||||
11 | Geliştirdiği yazılımın temiz ve anlaşılır olmasına özen ve dikkat gösterir. | ||||||
12 | Kullanıcı odaklı tasarım ilkelerine riayet eder. |
Assessment Methods
Contribution Level | Absolute Evaluation | |
Rate of Midterm Exam to Success | 40 | |
Rate of Final Exam to Success | 60 | |
Total | 100 |
ECTS / Workload Table | ||||||
Activities | Number of | Duration(Hour) | Total Workload(Hour) | |||
Course Hours | 14 | 2 | 28 | |||
Guided Problem Solving | 0 | 1 | 0 | |||
Resolution of Homework Problems and Submission as a Report | 14 | 1 | 14 | |||
Term Project | 1 | 10 | 10 | |||
Presentation of Project / Seminar | 1 | 4 | 4 | |||
Quiz | 1 | 2 | 2 | |||
Midterm Exam | 1 | 11 | 11 | |||
General Exam | 1 | 21 | 21 | |||
Performance Task, Maintenance Plan | 0 | 0 | 0 | |||
Total Workload(Hour) | 90 | |||||
Dersin AKTS Kredisi = Toplam İş Yükü (Saat)/30*=(90/30) | 3 | |||||
ECTS of the course: 30 hours of work is counted as 1 ECTS credit. |
Detail Informations of the Course
Course Description
Course | Code | Semester | T+P (Hour) | Credit | ECTS |
---|---|---|---|---|---|
INFORMATION TECHNOLOGY LAW | BPR2244640 | Spring Semester | 2+0 | 2 | 3 |
Course Program | Çarşamba 16:30-17:15 Çarşamba 17:30-18:15 |
Prerequisites Courses | |
Recommended Elective Courses |
Language of Course | Turkish |
Course Level | Short Cycle (Associate's Degree) |
Course Type | Required |
Course Coordinator | Lect. Beyza KOYULMUŞ |
Name of Lecturer(s) | Lect. Cihan ALP |
Assistant(s) | |
Aim | It is aimed the students to have information about cyber crimes, the methods on fighting against these crimes and measures that should be taken, even the methods of obtaining the evidence. |
Course Content | This course contains; The definition and history of the computer, concepts related to computer and the information system.,Explanation of IT law in legal order as a law discipline, the relation about basic law disciplines, the concept, history and methods of cyber crimes as well cyber crimes on comparative law.,Explanation and critisizm of the position of cyber crimes in Turkish law and cyber crimes in 765 numbered Turkish Criminal Code.,General explanation on the new Turkish Criminal Code, the system of the cyber crimes stated on the code, logging in the information system illegally, hacking into a computer system and not logging out.,The crime of preventing, disrupting, destroying or changing the functioning of the information system; knows the crime of providing illegal benefit through the information system,Abuse of the bank or credit cards offense.,Offenses against personal data.,Theft and fraud via information systems offenses.,More offenses via information systems.,Criminal procedure protection measures, digital forensics and provisions should be made fighting against there crimes.,Criminal procedure protection measures, digital forensics and provisions should be made fighting against there crimes.,Criminal procedure protection measures, digital forensics and provisions should be made fighting against there crimes.,Relations between cyber crimes and criminology, economical offenses and cyber terrorism.,General Review. |
Dersin Öğrenme Kazanımları | Teaching Methods | Assessment Methods |
1. Define basic concepts of cyber area. | 10, 12, 14, 2, 6, 9 | A, E, F |
1.1. Recognize the computer and derivatives. | 11, 12, 13, 14, 2, 6, 9 | A, E |
1.2. Recognize the infaormation systems. | 10, 14, 23, 4, 6, 9 | A, E, F |
1.3. Recognize the interaction of information systems. | 10, 12, 16, 2, 23, 4, 8, 9 | A, E, F |
2. Analyze systematically the problems on cybercrimes under favour of theoretical background. | 11, 12, 14, 16, 2, 23, 6 | A, E, F |
2.1. Identify relevant Turkish law. | 11, 14, 23, 8, 9 | A, E, F |
2.2. Identify relevant international law. | 12, 14, 2, 23, 9 | A, E |
2.3. Interpret relevant national and international jurisprudence. | 10, 11, 16, 23, 9 | A, E |
3. Resolve problems occured in practice. | 14, 2, 23, 4, 9 | A, E |
3.1. Resolve practical problems. | 11, 14, 2, 23, 9 | A, E |
3.2. Evaluate recent developments. | 10, 13, 23, 4, 9 | A, E |
3.3. Propose solutions for the problems of cyberspace. | 10, 23, 4, 8, 9 | A, E, F |
Teaching Methods: | 10: Discussion Method, 11: Demonstration Method, 12: Problem Solving Method, 13: Case Study Method, 14: Self Study Method, 16: Question - Answer Technique, 2: Project Based Learning Model, 23: Concept Map Technique, 4: Inquiry-Based Learning, 6: Experiential Learning, 8: Flipped Classroom Learning, 9: Lecture Method |
Assessment Methods: | A: Traditional Written Exam, E: Homework, F: Project Task |
Course Outline
Order | Subjects | Preliminary Work |
---|---|---|
1 | The definition and history of the computer, concepts related to computer and the information system. | |
2 | Explanation of IT law in legal order as a law discipline, the relation about basic law disciplines, the concept, history and methods of cyber crimes as well cyber crimes on comparative law. | |
3 | Explanation and critisizm of the position of cyber crimes in Turkish law and cyber crimes in 765 numbered Turkish Criminal Code. | |
4 | General explanation on the new Turkish Criminal Code, the system of the cyber crimes stated on the code, logging in the information system illegally, hacking into a computer system and not logging out. | |
5 | The crime of preventing, disrupting, destroying or changing the functioning of the information system; knows the crime of providing illegal benefit through the information system | |
6 | Abuse of the bank or credit cards offense. | |
7 | Offenses against personal data. | |
8 | Theft and fraud via information systems offenses. | |
9 | More offenses via information systems. | |
10 | Criminal procedure protection measures, digital forensics and provisions should be made fighting against there crimes. | |
11 | Criminal procedure protection measures, digital forensics and provisions should be made fighting against there crimes. | |
12 | Criminal procedure protection measures, digital forensics and provisions should be made fighting against there crimes. | |
13 | Relations between cyber crimes and criminology, economical offenses and cyber terrorism. | |
14 | General Review |
Resources |
Murat Volkan Dülger, Bilişim Suçları ve İnternet İletişim Hukuku, 6. Baskı, Seçkin Yayıncılık, 2015, Ankara. Ali Karagülmez, Bilişim Suçları ve Soruşturma-Kovuşturma Evreleri, 5. Baskı, Seçkin Yayıncılık, 2014, Ankara. |
Course Contribution to Program Qualifications
Course Contribution to Program Qualifications | |||||||
No | Program Qualification | Contribution Level | |||||
1 | 2 | 3 | 4 | 5 | |||
1 | Algoritma programlama, bilgisayar uygulaması geliştirme ve yazılım projelerinde kod geliştirme konularında yeterli altyapıya ve bunları iş hayatlarında kullanma yeteneğine sahiptir. | ||||||
2 | Programlama problemleri için bilinen çözüm yöntemlerini ve özel teknikleri kullanır ve uygular. | ||||||
3 | Yazılım uygulamaları için gerekli olan modern teknik ve araçları kullanır. | ||||||
4 | Bireysel olarak ve çok disiplinli takımlarda etkin olarak çalışır. | ||||||
5 | Geliştirilmiş uygulama veya yazılımın test aşamalarını gerçekler ve takip eder. | ||||||
6 | İşyeri uygulamaları, çalışanların sağlığı, çevre ve iş güvenliği, mesleki ve etik sorumluluk, programlama uygulamalarının hukuksal sonuçları konularında farkındalığa sahiptir. | ||||||
7 | Bilgiye erişir ve bu amaçla kaynak araştırması yapar. | ||||||
8 | Yaşam boyu öğrenmenin gerekliliği bilincindedir; bilim ve teknolojideki gelişmeleri izler ve kendini sürekli yeniler. | ||||||
9 | Sözlü ve yazılı, gerektiğinde teknik resimler ve modern araçlar kullanarak etkin iletişim kurar. | ||||||
10 | Yazılım çözümlerinin ve uygulamalarının evrensel ve toplumsal boyutlardaki etkilerinin bilincinde olur; çağın sorunları çözmede ve toplumsal ilerlemede yeni yazılımlar geliştirir. | ||||||
11 | Geliştirdiği yazılımın temiz ve anlaşılır olmasına özen ve dikkat gösterir. | ||||||
12 | Kullanıcı odaklı tasarım ilkelerine riayet eder. |
Assessment Methods
Contribution Level | Absolute Evaluation | |
Rate of Midterm Exam to Success | 40 | |
Rate of Final Exam to Success | 60 | |
Total | 100 |