|
|||||
Year/Semester of Study | 1 / Spring Semester | ||||
Level of Course | Short Cycle Degree Programme | ||||
Type of Course | Optional | ||||
Department | COMPUTER PROGRAMMING | ||||
Pre-requisities and Co-requisites | None | ||||
Mode of Delivery | Face to Face | ||||
Teaching Period | 14 Weeks | ||||
Name of Lecturer | KADİR ABA (aba@nevsehir.edu.tr) | ||||
Name of Lecturer(s) | |||||
Language of Instruction | Turkish | ||||
Work Placement(s) | None | ||||
Objectives of the Course | |||||
The aim of this course is to provide students with information on the crimes committed in the field of informatics, the methods of combating them and the precautions to be taken; also to provide information about the methods of obtaining evidence on information systems. |
Learning Outcomes | PO | MME | |
The students who succeeded in this course: | |||
LO-1 | Can conclude electronic contracts and distance contracts |
PO-26 Define the basic concepts of information law PO-27 Solves problems related to informatics crimes by systematically analyzing them based on the theoretical background PO-28 Performs the application of information law |
Examination |
LO-2 | Gains knowledge of the protection of domain names, intellectual property rights and unfair competition on the Internet, protection of personal rights on the Internet |
PO-26 Define the basic concepts of information law PO-27 Solves problems related to informatics crimes by systematically analyzing them based on the theoretical background PO-28 Performs the application of information law |
Examination |
LO-3 | Law 5561 and Internet access barriers, knows the responsibility of Internet service providers |
PO-26 Define the basic concepts of information law PO-27 Solves problems related to informatics crimes by systematically analyzing them based on the theoretical background PO-28 Performs the application of information law |
Examination |
LO-4 | To be able to master the laws on the telephone over the Internet (VoIP) |
PO-26 Define the basic concepts of information law PO-27 Solves problems related to informatics crimes by systematically analyzing them based on the theoretical background PO-28 Performs the application of information law |
Examination |
LO-5 | Recognize the innovations brought by information technologies for companies with Turkish Commercial Code |
PO-26 Define the basic concepts of information law PO-27 Solves problems related to informatics crimes by systematically analyzing them based on the theoretical background PO-28 Performs the application of information law |
Examination |
LO-6 | Knows common information crimes and masters related legislation |
PO-26 Define the basic concepts of information law PO-27 Solves problems related to informatics crimes by systematically analyzing them based on the theoretical background PO-28 Performs the application of information law |
Examination |
PO: Programme Outcomes MME:Method of measurement & Evaluation |
Course Contents | ||
This course; Definition of Computer, Computer Related Concepts and Information System and its History its place in the legal order and the disclosure and criticism of the information crimes in the Turkish Penal Code No. 765, the general explanation about the new TCK, the systematics of the information crimes in this law, the crime of entering and staying in the information system unlawfully, the prevention and disruption of the information system. the crime of destroying or changing the data; offense of illegal use of information via the information system, misuse of bank or credit cards, offenses against personal data, theft and fraud crimes through the use of information systems, other offenses committed with information systems, information offenses in FSEK and Electronic Signature Law , Criminal procedure protection measures in terms of cyber crimes, forensic informatics and measures to be taken in the fight against these crimes, Criminal procedure protection measures in terms of cyber crimes, forensic informatics and measures to be taken in the fight against these crimes, Criminology of cyber terrorism, economic crimes and cyber terrorism relationship, IT crimes in terms of law required; topics. | ||
Weekly Course Content | ||
Week | Subject | Learning Activities and Teaching Methods |
1 | Definition and History of Computer, Computer Related Concepts and Information System | Expression / Question-Answer |
2 | The place of informatics law as a discipline of law in the legal order, its relation to the basic legal disciplines, the concept of informatics crimes, the ways of processing, the history, regulation methods and informatics crimes in comparative law | Expression / Question-Answer |
3 | The place of informatics crimes in Turkish legal order and explanation and criticism of informatics crimes in Turkish Penal Code No. 765 | Expression / Question-Answer |
4 | Making a general statement about the new TPC, the systematics of the information crimes in this law, entering into the information system against the law | Expression / Question-Answer |
5 | Prevention, corruption, destruction or alteration of information system; criminal offense | Expression / Question-Answer |
6 | Misuse of debit or credit cards | Expression / Question-Answer |
7 | Offenses against personal data | Expression / Question-Answer |
8 | mid-term exam | |
9 | Theft and fraud crimes through the use of information systems | Expression / Question-Answer |
10 | Other crimes committed with information systems | Expression / Question-Answer |
11 | Informatics crimes regulated in FSEK and the Electronic Signature Law | Expression / Question-Answer |
12 | Criminal procedure protection measures in terms of IT crimes, forensic IT and measures to be taken in the fight against these crimes | Expression / Question-Answer |
13 | Criminal procedure protection measures in terms of IT crimes, forensic IT and measures to be taken in the fight against these crimes | Expression / Question-Answer |
14 | The relation of cyber crimes with criminology, economic crimes and cyber terrorism | Expression / Question-Answer |
15 | Information crimes in terms of law that should be | Expression / Question-Answer |
16 | final exam | |
Recommend Course Book / Supplementary Book/Reading | ||
1 | Murat Volkan Dülger, Bilişim Suçları ve İnternet İletişim Hukuku, 6. Baskı, Seçkin Yayıncılık, 2015, Ankara | |
2 | Ali Karagülmez, Bilişim Suçları ve Soruşturma-Kovuşturma Evreleri, 5. Baskı, Seçkin Yayıncılık, 2014, Ankara | |
Required Course instruments and materials | ||
Supplementary textbook |
Assessment Methods | |||
Type of Assessment | Week | Hours | Weight(%) |
mid-term exam | 8 | 1 | 40 |
Other assessment methods | |||
1.Oral Examination | |||
2.Quiz | |||
3.Laboratory exam | |||
4.Presentation | |||
5.Report | |||
6.Workshop | |||
7.Performance Project | |||
8.Term Paper | |||
9.Project | |||
final exam | 16 | 1 | 60 |
Student Work Load | |||
Type of Work | Weekly Hours | Number of Weeks | Work Load |
Weekly Course Hours (Theoretical+Practice) | 2 | 14 | 28 |
Outside Class | |||
a) Reading | 2 | 8 | 16 |
b) Search in internet/Library | 2 | 8 | 16 |
c) Performance Project | 0 | ||
d) Prepare a workshop/Presentation/Report | 1 | 8 | 8 |
e) Term paper/Project | 1 | 8 | 8 |
Oral Examination | 0 | ||
Quiz | 0 | ||
Laboratory exam | 0 | ||
Own study for mid-term exam | 6 | 1 | 6 |
mid-term exam | 1 | 1 | 1 |
Own study for final exam | 6 | 1 | 6 |
final exam | 1 | 1 | 1 |
0 | |||
0 | |||
Total work load; | 90 |