TR EN

ETHICS IN INFORMATION EXCHANGE COURSE IDENTIFICATION AND APPLICATION INFORMATION

Code Name of the Course Unit Semester In-Class Hours (T+P) Credit ECTS Credit
BIL315 ETHICS IN INFORMATION EXCHANGE 5 2 2 2

WEEKLY COURSE CONTENTS AND STUDY MATERIALS FOR PRELIMINARY & FURTHER STUDY

Week Preparatory Topics(Subjects) Method
1 Review of relevant sections of lecture notes Introduction to Cyber ​​Law and Cyber ​​Crimes (Basic Concepts, Definitions) 1: Lecture, 2: Question-Answer, 3: Discussion
2 Review of relevant sections of lecture notes Cyber ​​Crimes and Example Cases 1: Lecture, 2: Question-Answer, 3: Discussion
3 Review of relevant sections of lecture notes Cyber ​​Crimes and Their Types in Turkey and the World 1: Lecture, 2: Question-Answer, 3: Discussion
4 Review of relevant sections of lecture notes Entering the Information System 1: Lecture, 2: Question-Answer, 3: Discussion
5 Review of relevant sections of lecture notes Blocking, Disrupting, Destroying, or Changing the Information System 1: Lecture, 2: Question-Answer, 3: Discussion
6 Review of relevant sections of lecture notes Abuse of Debit and Credit Cards; Online Fraud 1: Lecture, 2: Question-Answer, 3: Discussion
7 Review of relevant sections of lecture notes Search, Copy, and Seizure of Computers, Computer Programs, and Files 1: Lecture, 2: Question-Answer, 3: Discussion
8 - MID-TERM EXAM -
9 Review of relevant sections of lecture notes European Convention on Cybercrime, Council of Europe Digital Evidence Guide and International Legislation 1: Lecture, 2: Question-Answer, 3: Discussion
10 Review of relevant sections of lecture notes Law No. 5561 and Internet Access Blockages, Responsibilities of Internet Service Providers 1: Lecture, 2: Question-Answer, 3: Discussion
11 Review of relevant sections of lecture notes Personal Data Protection Law (Concept of Data and Protection of Personal Data) 1: Lecture, 2: Question-Answer, 3: Discussion
12 Review of relevant sections of lecture notes Electronic Commerce 1: Lecture, 2: Question-Answer, 3: Discussion
13 Review of relevant sections of lecture notes Fundamentals of Computer Forensics, Environments where evidence can be found, Computer Forensics Tools 1: Lecture, 2: Question-Answer, 3: Discussion
14 Review of relevant sections of lecture notes Intervention in Cyber ​​Crimes, and Crime Scene Investigation Expert Witness Legislation B 1: Lecture, 2: Question-Answer, 3: Discussion
15 Review of relevant sections of lecture notes Preparation of Expert Report, Examination of Case Studies 1: Lecture, 2: Question-Answer, 3: Discussion
16 - FINAL EXAM -
17 - FINAL EXAM -