Course Description
Course | Code | Semester | T+P (Hour) | Credit | ECTS |
---|---|---|---|---|---|
INFORMATION TECHNOLOGY LAW | - | Spring Semester | 2+0 | 2 | 3 |
Course Program |
Prerequisites Courses | |
Recommended Elective Courses |
Language of Course | Turkish |
Course Level | Short Cycle (Associate's Degree) |
Course Type | Required |
Course Coordinator | Lect. Beyza KOYULMUŞ |
Name of Lecturer(s) | Lect. Cihan ALP, Lect. Çağrı ÇELİK |
Assistant(s) | |
Aim | It is aimed the students to have information about cyber crimes, the methods on fighting against these crimes and measures that should be taken, even the methods of obtaining the evidence. |
Course Content | This course contains; The definition and history of the computer, concepts related to computer and the information system.,Explanation of IT law in legal order as a law discipline, the relation about basic law disciplines, the concept, history and methods of cyber crimes as well cyber crimes on comparative law.,Explanation and critisizm of the position of cyber crimes in Turkish law and cyber crimes in 765 numbered Turkish Criminal Code.,General explanation on the new Turkish Criminal Code, the system of the cyber crimes stated on the code, logging in the information system illegally, hacking into a computer system and not logging out.,The crime of preventing, disrupting, destroying or changing the functioning of the information system; knows the crime of providing illegal benefit through the information system,Abuse of the bank or credit cards offense.,Offenses against personal data.,Theft and fraud via information systems offenses.,More offenses via information systems.,Criminal procedure protection measures, digital forensics and provisions should be made fighting against there crimes.,Criminal procedure protection measures, digital forensics and provisions should be made fighting against there crimes.,Criminal procedure protection measures, digital forensics and provisions should be made fighting against there crimes.,Relations between cyber crimes and criminology, economical offenses and cyber terrorism.,General Review. |
Dersin Öğrenme Kazanımları | Teaching Methods | Assessment Methods |
1. Define basic concepts of cyber area. | 10, 12, 14, 2, 6, 9 | A, E, F |
1.1. Recognize the computer and derivatives. | 11, 12, 13, 14, 2, 6, 9 | A, E |
1.2. Recognize the infaormation systems. | 10, 14, 23, 4, 6, 9 | A, E, F |
1.3. Recognize the interaction of information systems. | 10, 12, 16, 2, 23, 4, 8, 9 | A, E, F |
2. Analyze systematically the problems on cybercrimes under favour of theoretical background. | 11, 12, 14, 16, 2, 23, 6 | A, E, F |
2.1. Identify relevant Turkish law. | 11, 14, 23, 8, 9 | A, E, F |
2.2. Identify relevant international law. | 12, 14, 2, 23, 9 | A, E |
2.3. Interpret relevant national and international jurisprudence. | 10, 11, 16, 23, 9 | A, E |
3. Resolve problems occured in practice. | 14, 2, 23, 4, 9 | A, E |
3.1. Resolve practical problems. | 11, 14, 2, 23, 9 | A, E |
3.2. Evaluate recent developments. | 10, 13, 23, 4, 9 | A, E |
3.3. Propose solutions for the problems of cyberspace. | 10, 23, 4, 8, 9 | A, E, F |
Teaching Methods: | 10: Discussion Method, 11: Demonstration Method, 12: Problem Solving Method, 13: Case Study Method, 14: Self Study Method, 16: Question - Answer Technique, 2: Project Based Learning Model, 23: Concept Map Technique, 4: Inquiry-Based Learning, 6: Experiential Learning, 8: Flipped Classroom Learning, 9: Lecture Method |
Assessment Methods: | A: Traditional Written Exam, E: Homework, F: Project Task |
Course Outline
Order | Subjects | Preliminary Work |
---|---|---|
1 | The definition and history of the computer, concepts related to computer and the information system. | |
2 | Explanation of IT law in legal order as a law discipline, the relation about basic law disciplines, the concept, history and methods of cyber crimes as well cyber crimes on comparative law. | |
3 | Explanation and critisizm of the position of cyber crimes in Turkish law and cyber crimes in 765 numbered Turkish Criminal Code. | |
4 | General explanation on the new Turkish Criminal Code, the system of the cyber crimes stated on the code, logging in the information system illegally, hacking into a computer system and not logging out. | |
5 | The crime of preventing, disrupting, destroying or changing the functioning of the information system; knows the crime of providing illegal benefit through the information system | |
6 | Abuse of the bank or credit cards offense. | |
7 | Offenses against personal data. | |
8 | Theft and fraud via information systems offenses. | |
9 | More offenses via information systems. | |
10 | Criminal procedure protection measures, digital forensics and provisions should be made fighting against there crimes. | |
11 | Criminal procedure protection measures, digital forensics and provisions should be made fighting against there crimes. | |
12 | Criminal procedure protection measures, digital forensics and provisions should be made fighting against there crimes. | |
13 | Relations between cyber crimes and criminology, economical offenses and cyber terrorism. | |
14 | General Review |
Resources |
Murat Volkan Dülger, Bilişim Suçları ve İnternet İletişim Hukuku, 6. Baskı, Seçkin Yayıncılık, 2015, Ankara. Ali Karagülmez, Bilişim Suçları ve Soruşturma-Kovuşturma Evreleri, 5. Baskı, Seçkin Yayıncılık, 2014, Ankara. |
Course Contribution to Program Qualifications
Course Contribution to Program Qualifications | |||||||
No | Program Qualification | Contribution Level | |||||
1 | 2 | 3 | 4 | 5 | |||
1 | Has the background in algorithms, programming, and application development in software engineering projects; and has the ability to use them together in business. | X | |||||
2 | Chooses and uses the proper solution methods and special techniques for programming purpose. | X | |||||
3 | Uses modern techniques and tools for programming applications. | X | |||||
4 | Works effectively individually and in teams. | X | |||||
5 | Implements and follows test cases of developed software and applications. | ||||||
6 | Has the awareness in workplace practices, worker health, environmental and workplace safety, professional and ethical responsibility, and legal issues about programming practices. | X | |||||
7 | Reaches information, and surveys resources for this purpose. | X | |||||
8 | Aware of the necessity of life-long learning; follows technological advances and renews him/herself. | X | |||||
9 | Communicates, oral and written, effectively using modern tools. | X | |||||
10 | Aware of universal and social effects of software solutions and practices; develops new software tools for solving universal problems and social advance. | X | |||||
11 | Keeps attention in clean and readable code design. | ||||||
12 | Considers and follows user centered design principles. |
Assessment Methods
Contribution Level | Absolute Evaluation | |
Rate of Midterm Exam to Success | 40 | |
Rate of Final Exam to Success | 60 | |
Total | 100 |
ECTS / Workload Table | ||||||
Activities | Number of | Duration(Hour) | Total Workload(Hour) | |||
Course Hours | 14 | 2 | 28 | |||
Guided Problem Solving | 0 | 1 | 0 | |||
Resolution of Homework Problems and Submission as a Report | 14 | 1 | 14 | |||
Term Project | 1 | 10 | 10 | |||
Presentation of Project / Seminar | 1 | 4 | 4 | |||
Quiz | 1 | 2 | 2 | |||
Midterm Exam | 1 | 11 | 11 | |||
General Exam | 1 | 21 | 21 | |||
Performance Task, Maintenance Plan | 0 | 0 | 0 | |||
Total Workload(Hour) | 90 | |||||
Dersin AKTS Kredisi = Toplam İş Yükü (Saat)/30*=(90/30) | 3 | |||||
ECTS of the course: 30 hours of work is counted as 1 ECTS credit. |
Detail Informations of the Course
Course Description
Course | Code | Semester | T+P (Hour) | Credit | ECTS |
---|---|---|---|---|---|
INFORMATION TECHNOLOGY LAW | - | Spring Semester | 2+0 | 2 | 3 |
Course Program |
Prerequisites Courses | |
Recommended Elective Courses |
Language of Course | Turkish |
Course Level | Short Cycle (Associate's Degree) |
Course Type | Required |
Course Coordinator | Lect. Beyza KOYULMUŞ |
Name of Lecturer(s) | Lect. Cihan ALP, Lect. Çağrı ÇELİK |
Assistant(s) | |
Aim | It is aimed the students to have information about cyber crimes, the methods on fighting against these crimes and measures that should be taken, even the methods of obtaining the evidence. |
Course Content | This course contains; The definition and history of the computer, concepts related to computer and the information system.,Explanation of IT law in legal order as a law discipline, the relation about basic law disciplines, the concept, history and methods of cyber crimes as well cyber crimes on comparative law.,Explanation and critisizm of the position of cyber crimes in Turkish law and cyber crimes in 765 numbered Turkish Criminal Code.,General explanation on the new Turkish Criminal Code, the system of the cyber crimes stated on the code, logging in the information system illegally, hacking into a computer system and not logging out.,The crime of preventing, disrupting, destroying or changing the functioning of the information system; knows the crime of providing illegal benefit through the information system,Abuse of the bank or credit cards offense.,Offenses against personal data.,Theft and fraud via information systems offenses.,More offenses via information systems.,Criminal procedure protection measures, digital forensics and provisions should be made fighting against there crimes.,Criminal procedure protection measures, digital forensics and provisions should be made fighting against there crimes.,Criminal procedure protection measures, digital forensics and provisions should be made fighting against there crimes.,Relations between cyber crimes and criminology, economical offenses and cyber terrorism.,General Review. |
Dersin Öğrenme Kazanımları | Teaching Methods | Assessment Methods |
1. Define basic concepts of cyber area. | 10, 12, 14, 2, 6, 9 | A, E, F |
1.1. Recognize the computer and derivatives. | 11, 12, 13, 14, 2, 6, 9 | A, E |
1.2. Recognize the infaormation systems. | 10, 14, 23, 4, 6, 9 | A, E, F |
1.3. Recognize the interaction of information systems. | 10, 12, 16, 2, 23, 4, 8, 9 | A, E, F |
2. Analyze systematically the problems on cybercrimes under favour of theoretical background. | 11, 12, 14, 16, 2, 23, 6 | A, E, F |
2.1. Identify relevant Turkish law. | 11, 14, 23, 8, 9 | A, E, F |
2.2. Identify relevant international law. | 12, 14, 2, 23, 9 | A, E |
2.3. Interpret relevant national and international jurisprudence. | 10, 11, 16, 23, 9 | A, E |
3. Resolve problems occured in practice. | 14, 2, 23, 4, 9 | A, E |
3.1. Resolve practical problems. | 11, 14, 2, 23, 9 | A, E |
3.2. Evaluate recent developments. | 10, 13, 23, 4, 9 | A, E |
3.3. Propose solutions for the problems of cyberspace. | 10, 23, 4, 8, 9 | A, E, F |
Teaching Methods: | 10: Discussion Method, 11: Demonstration Method, 12: Problem Solving Method, 13: Case Study Method, 14: Self Study Method, 16: Question - Answer Technique, 2: Project Based Learning Model, 23: Concept Map Technique, 4: Inquiry-Based Learning, 6: Experiential Learning, 8: Flipped Classroom Learning, 9: Lecture Method |
Assessment Methods: | A: Traditional Written Exam, E: Homework, F: Project Task |
Course Outline
Order | Subjects | Preliminary Work |
---|---|---|
1 | The definition and history of the computer, concepts related to computer and the information system. | |
2 | Explanation of IT law in legal order as a law discipline, the relation about basic law disciplines, the concept, history and methods of cyber crimes as well cyber crimes on comparative law. | |
3 | Explanation and critisizm of the position of cyber crimes in Turkish law and cyber crimes in 765 numbered Turkish Criminal Code. | |
4 | General explanation on the new Turkish Criminal Code, the system of the cyber crimes stated on the code, logging in the information system illegally, hacking into a computer system and not logging out. | |
5 | The crime of preventing, disrupting, destroying or changing the functioning of the information system; knows the crime of providing illegal benefit through the information system | |
6 | Abuse of the bank or credit cards offense. | |
7 | Offenses against personal data. | |
8 | Theft and fraud via information systems offenses. | |
9 | More offenses via information systems. | |
10 | Criminal procedure protection measures, digital forensics and provisions should be made fighting against there crimes. | |
11 | Criminal procedure protection measures, digital forensics and provisions should be made fighting against there crimes. | |
12 | Criminal procedure protection measures, digital forensics and provisions should be made fighting against there crimes. | |
13 | Relations between cyber crimes and criminology, economical offenses and cyber terrorism. | |
14 | General Review |
Resources |
Murat Volkan Dülger, Bilişim Suçları ve İnternet İletişim Hukuku, 6. Baskı, Seçkin Yayıncılık, 2015, Ankara. Ali Karagülmez, Bilişim Suçları ve Soruşturma-Kovuşturma Evreleri, 5. Baskı, Seçkin Yayıncılık, 2014, Ankara. |
Course Contribution to Program Qualifications
Course Contribution to Program Qualifications | |||||||
No | Program Qualification | Contribution Level | |||||
1 | 2 | 3 | 4 | 5 | |||
1 | Has the background in algorithms, programming, and application development in software engineering projects; and has the ability to use them together in business. | X | |||||
2 | Chooses and uses the proper solution methods and special techniques for programming purpose. | X | |||||
3 | Uses modern techniques and tools for programming applications. | X | |||||
4 | Works effectively individually and in teams. | X | |||||
5 | Implements and follows test cases of developed software and applications. | ||||||
6 | Has the awareness in workplace practices, worker health, environmental and workplace safety, professional and ethical responsibility, and legal issues about programming practices. | X | |||||
7 | Reaches information, and surveys resources for this purpose. | X | |||||
8 | Aware of the necessity of life-long learning; follows technological advances and renews him/herself. | X | |||||
9 | Communicates, oral and written, effectively using modern tools. | X | |||||
10 | Aware of universal and social effects of software solutions and practices; develops new software tools for solving universal problems and social advance. | X | |||||
11 | Keeps attention in clean and readable code design. | ||||||
12 | Considers and follows user centered design principles. |
Assessment Methods
Contribution Level | Absolute Evaluation | |
Rate of Midterm Exam to Success | 40 | |
Rate of Final Exam to Success | 60 | |
Total | 100 |