Nevşehir Hacı Bektaş Veli University Course Catalogue

Information Of Programmes

VOCATIONAL SCHOOL OF NEVŞEHİR / BİL118 - COMPUTER PROGRAMMING

Code: BİL118 Course Title: INFORMATICS LAW Theoretical+Practice: 2+0 ECTS: 3
Year/Semester of Study 1 / Spring Semester
Level of Course Short Cycle Degree Programme
Type of Course Optional
Department COMPUTER PROGRAMMING
Pre-requisities and Co-requisites None
Mode of Delivery Face to Face
Teaching Period 14 Weeks
Name of Lecturer KADİR ABA (aba@nevsehir.edu.tr)
Name of Lecturer(s)
Language of Instruction Turkish
Work Placement(s) None
Objectives of the Course
The aim of this course is to provide students with information on the crimes committed in the field of informatics, the methods of combating them and the precautions to be taken; also to provide information about the methods of obtaining evidence on information systems.

Learning Outcomes PO MME
The students who succeeded in this course:
LO-1 Can conclude electronic contracts and distance contracts PO-26 Define the basic concepts of information law
PO-27 Solves problems related to informatics crimes by systematically analyzing them based on the theoretical background
PO-28 Performs the application of information law
Examination
LO-2 Gains knowledge of the protection of domain names, intellectual property rights and unfair competition on the Internet, protection of personal rights on the Internet PO-26 Define the basic concepts of information law
PO-27 Solves problems related to informatics crimes by systematically analyzing them based on the theoretical background
PO-28 Performs the application of information law
Examination
LO-3 Law 5561 and Internet access barriers, knows the responsibility of Internet service providers PO-26 Define the basic concepts of information law
PO-27 Solves problems related to informatics crimes by systematically analyzing them based on the theoretical background
PO-28 Performs the application of information law
Examination
LO-4 To be able to master the laws on the telephone over the Internet (VoIP) PO-26 Define the basic concepts of information law
PO-27 Solves problems related to informatics crimes by systematically analyzing them based on the theoretical background
PO-28 Performs the application of information law
Examination
LO-5 Recognize the innovations brought by information technologies for companies with Turkish Commercial Code PO-26 Define the basic concepts of information law
PO-27 Solves problems related to informatics crimes by systematically analyzing them based on the theoretical background
PO-28 Performs the application of information law
Examination
LO-6 Knows common information crimes and masters related legislation PO-26 Define the basic concepts of information law
PO-27 Solves problems related to informatics crimes by systematically analyzing them based on the theoretical background
PO-28 Performs the application of information law
Examination
PO: Programme Outcomes
MME:Method of measurement & Evaluation

Course Contents
This course; Definition of Computer, Computer Related Concepts and Information System and its History its place in the legal order and the disclosure and criticism of the information crimes in the Turkish Penal Code No. 765, the general explanation about the new TCK, the systematics of the information crimes in this law, the crime of entering and staying in the information system unlawfully, the prevention and disruption of the information system. the crime of destroying or changing the data; offense of illegal use of information via the information system, misuse of bank or credit cards, offenses against personal data, theft and fraud crimes through the use of information systems, other offenses committed with information systems, information offenses in FSEK and Electronic Signature Law , Criminal procedure protection measures in terms of cyber crimes, forensic informatics and measures to be taken in the fight against these crimes, Criminal procedure protection measures in terms of cyber crimes, forensic informatics and measures to be taken in the fight against these crimes, Criminology of cyber terrorism, economic crimes and cyber terrorism relationship, IT crimes in terms of law required; topics.
Weekly Course Content
Week Subject Learning Activities and Teaching Methods
1 Definition and History of Computer, Computer Related Concepts and Information System Expression / Question-Answer
2 The place of informatics law as a discipline of law in the legal order, its relation to the basic legal disciplines, the concept of informatics crimes, the ways of processing, the history, regulation methods and informatics crimes in comparative law Expression / Question-Answer
3 The place of informatics crimes in Turkish legal order and explanation and criticism of informatics crimes in Turkish Penal Code No. 765 Expression / Question-Answer
4 Making a general statement about the new TPC, the systematics of the information crimes in this law, entering into the information system against the law Expression / Question-Answer
5 Prevention, corruption, destruction or alteration of information system; criminal offense Expression / Question-Answer
6 Misuse of debit or credit cards Expression / Question-Answer
7 Offenses against personal data Expression / Question-Answer
8 mid-term exam
9 Theft and fraud crimes through the use of information systems Expression / Question-Answer
10 Other crimes committed with information systems Expression / Question-Answer
11 Informatics crimes regulated in FSEK and the Electronic Signature Law Expression / Question-Answer
12 Criminal procedure protection measures in terms of IT crimes, forensic IT and measures to be taken in the fight against these crimes Expression / Question-Answer
13 Criminal procedure protection measures in terms of IT crimes, forensic IT and measures to be taken in the fight against these crimes Expression / Question-Answer
14 The relation of cyber crimes with criminology, economic crimes and cyber terrorism Expression / Question-Answer
15 Information crimes in terms of law that should be Expression / Question-Answer
16 final exam
Recommend Course Book / Supplementary Book/Reading
1 Murat Volkan Dülger, Bilişim Suçları ve İnternet İletişim Hukuku, 6. Baskı, Seçkin Yayıncılık, 2015, Ankara
2 Ali Karagülmez, Bilişim Suçları ve Soruşturma-Kovuşturma Evreleri, 5. Baskı, Seçkin Yayıncılık, 2014, Ankara
Required Course instruments and materials
Supplementary textbook

Assessment Methods
Type of Assessment Week Hours Weight(%)
mid-term exam 8 1 40
Other assessment methods
1.Oral Examination
2.Quiz
3.Laboratory exam
4.Presentation
5.Report
6.Workshop
7.Performance Project
8.Term Paper
9.Project
final exam 16 1 60

Student Work Load
Type of Work Weekly Hours Number of Weeks Work Load
Weekly Course Hours (Theoretical+Practice) 2 14 28
Outside Class
       a) Reading 2 8 16
       b) Search in internet/Library 2 8 16
       c) Performance Project 0
       d) Prepare a workshop/Presentation/Report 1 8 8
       e) Term paper/Project 1 8 8
Oral Examination 0
Quiz 0
Laboratory exam 0
Own study for mid-term exam 6 1 6
mid-term exam 1 1 1
Own study for final exam 6 1 6
final exam 1 1 1
0
0
Total work load; 90