Skip to main content

Course Description

CourseCodeSemesterT+P (Hour)CreditECTS
INFORMATION TECHNOLOGY LAW-Spring Semester2+023
Course Program
Prerequisites Courses
Recommended Elective Courses
Language of CourseTurkish
Course LevelShort Cycle (Associate's Degree)
Course TypeRequired
Course CoordinatorLect. Beyza KOYULMUŞ
Name of Lecturer(s)Lect. Hasan Semih ŞAKIR
Assistant(s)
AimIt is aimed the students to have information about cyber crimes, the methods on fighting against these crimes and measures that should be taken, even the methods of obtaining the evidence.
Course ContentThis course contains; The definition and history of the computer, concepts related to computer and the information system.,Explanation of IT law in legal order as a law discipline, the relation about basic law disciplines, the concept, history and methods of cyber crimes as well cyber crimes on comparative law.,Explanation and critisizm of the position of cyber crimes in Turkish law and cyber crimes in 765 numbered Turkish Criminal Code.,General explanation on the new Turkish Criminal Code, the system of the cyber crimes stated on the code, logging in the information system illegally, hacking into a computer system and not logging out.,The crime of preventing, disrupting, destroying or changing the functioning of the information system; knows the crime of providing illegal benefit through the information system,Abuse of the bank or credit cards offense.,Offenses against personal data.,Theft and fraud via information systems offenses.,More offenses via information systems.,Criminal procedure protection measures, digital forensics and provisions should be made fighting against there crimes.,Criminal procedure protection measures, digital forensics and provisions should be made fighting against there crimes.,Criminal procedure protection measures, digital forensics and provisions should be made fighting against there crimes.,Relations between cyber crimes and criminology, economical offenses and cyber terrorism.,General Review.
Dersin Öğrenme KazanımlarıTeaching MethodsAssessment Methods
1. Define basic concepts of cyber area.10, 12, 14, 2, 6, 9A, E, F
1.1. Recognize the computer and derivatives.11, 12, 13, 14, 2, 6, 9A, E
1.2. Recognize the infaormation systems.10, 14, 23, 4, 6, 9A, E, F
1.3. Recognize the interaction of information systems.10, 12, 16, 2, 23, 4, 8, 9A, E, F
2. Analyze systematically the problems on cybercrimes under favour of theoretical background.11, 12, 14, 16, 2, 23, 6A, E, F
2.1. Identify relevant Turkish law.11, 14, 23, 8, 9A, E, F
2.2. Identify relevant international law.12, 14, 2, 23, 9A, E
2.3. Interpret relevant national and international jurisprudence.10, 11, 16, 23, 9A, E
3. Resolve problems occured in practice.14, 2, 23, 4, 9A, E
3.1. Resolve practical problems.11, 14, 2, 23, 9A, E
3.2. Evaluate recent developments.10, 13, 23, 4, 9A, E
3.3. Propose solutions for the problems of cyberspace.10, 23, 4, 8, 9A, E, F
Teaching Methods:10: Discussion Method, 11: Demonstration Method, 12: Problem Solving Method, 13: Case Study Method, 14: Self Study Method, 16: Question - Answer Technique, 2: Project Based Learning Model, 23: Concept Map Technique, 4: Inquiry-Based Learning, 6: Experiential Learning, 8: Flipped Classroom Learning, 9: Lecture Method
Assessment Methods:A: Traditional Written Exam, E: Homework, F: Project Task

Course Outline

OrderSubjectsPreliminary Work
1The definition and history of the computer, concepts related to computer and the information system.
2Explanation of IT law in legal order as a law discipline, the relation about basic law disciplines, the concept, history and methods of cyber crimes as well cyber crimes on comparative law.
3Explanation and critisizm of the position of cyber crimes in Turkish law and cyber crimes in 765 numbered Turkish Criminal Code.
4General explanation on the new Turkish Criminal Code, the system of the cyber crimes stated on the code, logging in the information system illegally, hacking into a computer system and not logging out.
5The crime of preventing, disrupting, destroying or changing the functioning of the information system; knows the crime of providing illegal benefit through the information system
6Abuse of the bank or credit cards offense.
7Offenses against personal data.
8Theft and fraud via information systems offenses.
9More offenses via information systems.
10Criminal procedure protection measures, digital forensics and provisions should be made fighting against there crimes.
11Criminal procedure protection measures, digital forensics and provisions should be made fighting against there crimes.
12Criminal procedure protection measures, digital forensics and provisions should be made fighting against there crimes.
13Relations between cyber crimes and criminology, economical offenses and cyber terrorism.
14General Review
Resources
Murat Volkan Dülger, Bilişim Suçları ve İnternet İletişim Hukuku, 6. Baskı, Seçkin Yayıncılık, 2015, Ankara. Ali Karagülmez, Bilişim Suçları ve Soruşturma-Kovuşturma Evreleri, 5. Baskı, Seçkin Yayıncılık, 2014, Ankara.

Course Contribution to Program Qualifications

Course Contribution to Program Qualifications
NoProgram QualificationContribution Level
12345
1
Has the background in algorithms, programming, and application development in software engineering projects; and has the ability to use them together in business.
X
2
Chooses and uses the proper solution methods and special techniques for programming purpose.
X
3
Uses modern techniques and tools for programming applications.
X
4
Works effectively individually and in teams.
X
5
Implements and follows test cases of developed software and applications.
6
Has the awareness in workplace practices, worker health, environmental and workplace safety, professional and ethical responsibility, and legal issues about programming practices.
X
7
Reaches information, and surveys resources for this purpose.
X
8
Aware of the necessity of life-long learning; follows technological advances and renews him/herself.
X
9
Communicates, oral and written, effectively using modern tools.
X
10
Aware of universal and social effects of software solutions and practices; develops new software tools for solving universal problems and social advance.
X
11
Keeps attention in clean and readable code design.
12
Considers and follows user centered design principles.

Assessment Methods

Contribution LevelAbsolute Evaluation
Rate of Midterm Exam to Success 40
Rate of Final Exam to Success 60
Total 100
ECTS / Workload Table
ActivitiesNumber ofDuration(Hour)Total Workload(Hour)
Course Hours14228
Guided Problem Solving010
Resolution of Homework Problems and Submission as a Report14114
Term Project11010
Presentation of Project / Seminar144
Quiz122
Midterm Exam11111
General Exam12121
Performance Task, Maintenance Plan000
Total Workload(Hour)90
Dersin AKTS Kredisi = Toplam İş Yükü (Saat)/30*=(90/30)3
ECTS of the course: 30 hours of work is counted as 1 ECTS credit.

Detail Informations of the Course

Course Description

CourseCodeSemesterT+P (Hour)CreditECTS
INFORMATION TECHNOLOGY LAW-Spring Semester2+023
Course Program
Prerequisites Courses
Recommended Elective Courses
Language of CourseTurkish
Course LevelShort Cycle (Associate's Degree)
Course TypeRequired
Course CoordinatorLect. Beyza KOYULMUŞ
Name of Lecturer(s)Lect. Hasan Semih ŞAKIR
Assistant(s)
AimIt is aimed the students to have information about cyber crimes, the methods on fighting against these crimes and measures that should be taken, even the methods of obtaining the evidence.
Course ContentThis course contains; The definition and history of the computer, concepts related to computer and the information system.,Explanation of IT law in legal order as a law discipline, the relation about basic law disciplines, the concept, history and methods of cyber crimes as well cyber crimes on comparative law.,Explanation and critisizm of the position of cyber crimes in Turkish law and cyber crimes in 765 numbered Turkish Criminal Code.,General explanation on the new Turkish Criminal Code, the system of the cyber crimes stated on the code, logging in the information system illegally, hacking into a computer system and not logging out.,The crime of preventing, disrupting, destroying or changing the functioning of the information system; knows the crime of providing illegal benefit through the information system,Abuse of the bank or credit cards offense.,Offenses against personal data.,Theft and fraud via information systems offenses.,More offenses via information systems.,Criminal procedure protection measures, digital forensics and provisions should be made fighting against there crimes.,Criminal procedure protection measures, digital forensics and provisions should be made fighting against there crimes.,Criminal procedure protection measures, digital forensics and provisions should be made fighting against there crimes.,Relations between cyber crimes and criminology, economical offenses and cyber terrorism.,General Review.
Dersin Öğrenme KazanımlarıTeaching MethodsAssessment Methods
1. Define basic concepts of cyber area.10, 12, 14, 2, 6, 9A, E, F
1.1. Recognize the computer and derivatives.11, 12, 13, 14, 2, 6, 9A, E
1.2. Recognize the infaormation systems.10, 14, 23, 4, 6, 9A, E, F
1.3. Recognize the interaction of information systems.10, 12, 16, 2, 23, 4, 8, 9A, E, F
2. Analyze systematically the problems on cybercrimes under favour of theoretical background.11, 12, 14, 16, 2, 23, 6A, E, F
2.1. Identify relevant Turkish law.11, 14, 23, 8, 9A, E, F
2.2. Identify relevant international law.12, 14, 2, 23, 9A, E
2.3. Interpret relevant national and international jurisprudence.10, 11, 16, 23, 9A, E
3. Resolve problems occured in practice.14, 2, 23, 4, 9A, E
3.1. Resolve practical problems.11, 14, 2, 23, 9A, E
3.2. Evaluate recent developments.10, 13, 23, 4, 9A, E
3.3. Propose solutions for the problems of cyberspace.10, 23, 4, 8, 9A, E, F
Teaching Methods:10: Discussion Method, 11: Demonstration Method, 12: Problem Solving Method, 13: Case Study Method, 14: Self Study Method, 16: Question - Answer Technique, 2: Project Based Learning Model, 23: Concept Map Technique, 4: Inquiry-Based Learning, 6: Experiential Learning, 8: Flipped Classroom Learning, 9: Lecture Method
Assessment Methods:A: Traditional Written Exam, E: Homework, F: Project Task

Course Outline

OrderSubjectsPreliminary Work
1The definition and history of the computer, concepts related to computer and the information system.
2Explanation of IT law in legal order as a law discipline, the relation about basic law disciplines, the concept, history and methods of cyber crimes as well cyber crimes on comparative law.
3Explanation and critisizm of the position of cyber crimes in Turkish law and cyber crimes in 765 numbered Turkish Criminal Code.
4General explanation on the new Turkish Criminal Code, the system of the cyber crimes stated on the code, logging in the information system illegally, hacking into a computer system and not logging out.
5The crime of preventing, disrupting, destroying or changing the functioning of the information system; knows the crime of providing illegal benefit through the information system
6Abuse of the bank or credit cards offense.
7Offenses against personal data.
8Theft and fraud via information systems offenses.
9More offenses via information systems.
10Criminal procedure protection measures, digital forensics and provisions should be made fighting against there crimes.
11Criminal procedure protection measures, digital forensics and provisions should be made fighting against there crimes.
12Criminal procedure protection measures, digital forensics and provisions should be made fighting against there crimes.
13Relations between cyber crimes and criminology, economical offenses and cyber terrorism.
14General Review
Resources
Murat Volkan Dülger, Bilişim Suçları ve İnternet İletişim Hukuku, 6. Baskı, Seçkin Yayıncılık, 2015, Ankara. Ali Karagülmez, Bilişim Suçları ve Soruşturma-Kovuşturma Evreleri, 5. Baskı, Seçkin Yayıncılık, 2014, Ankara.

Course Contribution to Program Qualifications

Course Contribution to Program Qualifications
NoProgram QualificationContribution Level
12345
1
Has the background in algorithms, programming, and application development in software engineering projects; and has the ability to use them together in business.
X
2
Chooses and uses the proper solution methods and special techniques for programming purpose.
X
3
Uses modern techniques and tools for programming applications.
X
4
Works effectively individually and in teams.
X
5
Implements and follows test cases of developed software and applications.
6
Has the awareness in workplace practices, worker health, environmental and workplace safety, professional and ethical responsibility, and legal issues about programming practices.
X
7
Reaches information, and surveys resources for this purpose.
X
8
Aware of the necessity of life-long learning; follows technological advances and renews him/herself.
X
9
Communicates, oral and written, effectively using modern tools.
X
10
Aware of universal and social effects of software solutions and practices; develops new software tools for solving universal problems and social advance.
X
11
Keeps attention in clean and readable code design.
12
Considers and follows user centered design principles.

Assessment Methods

Contribution LevelAbsolute Evaluation
Rate of Midterm Exam to Success 40
Rate of Final Exam to Success 60
Total 100

Numerical Data

Student Success

Ekleme Tarihi: 05/11/2023 - 20:23Son Güncelleme Tarihi: 05/11/2023 - 20:25