Code | Name of the Course Unit | Semester | In-Class Hours (T+P) | Credit | ECTS Credit |
---|---|---|---|---|---|
BIL315 | ETHICS IN INFORMATION EXCHANGE | 5 | 2 | 2 | 2 |
GENERAL INFORMATION |
|
---|---|
Language of Instruction : | Turkish |
Level of the Course Unit : | BACHELOR'S DEGREE, TYY: + 6.Level, EQF-LLL: 6.Level, QF-EHEA: First Cycle |
Type of the Course : | Compulsory |
Mode of Delivery of the Course Unit | - |
Coordinator of the Course Unit | Assist.Prof. OĞUZHAN ÖZTAŞ |
Instructor(s) of the Course Unit | Assist.Prof. MUSTAFA ŞENOL |
Course Prerequisite | No |
OBJECTIVES AND CONTENTS |
|
---|---|
Objectives of the Course Unit: | The developments in the field of information and technology, especially in recent years, have provided humanity with significant opportunities, but have also created a new environment for criminals. In this area, where various terms such as cyberspace, and cyber environment/area are used, criminals can access vast criminal resources very easily and mostly free of charge. For this reason, criminals are rapidly transitioning from the physical environment to the cyber environment. Among the important factors of this transition are the delay in the creation of legal definitions regarding the new criminal environment, the relatively low number of penal sanctions, and the difficulty of identifying the criminal. In this context, this course aims to provide students with information about crimes committed in the field of information. |
Contents of the Course Unit: | Introduction to cybercrimes, Entering and staying in a computer system, Blocking, disrupting, destroying or changing data in a computer system, Abuse of bank and credit cards, Fraud over the Internet, Searching, copying and seizing computers, computer programs and files, Expertise in the Field of Information Security, Law No. 5561 and Internet access restrictions, Electronic Commerce Law, Personal Data Protection Law (KVKK), Responsibility of Internet service providers, Concept of data and protection of personal data, Comparative examination of computer law, European Cybercrime Convention and Council of Europe Digital Evidence Guide, Fundamentals of computer forensics, Environments where evidence can be found, Computer forensics tools, Traffic analysis; Examination of Case Studies. |
KEY LEARNING OUTCOMES OF THE COURSE UNIT (On successful completion of this course unit, students/learners will or will be able to) |
---|
Has the necessary knowledge in the field of computer engineering and software. |
Can define information systems from technical, organizational, and managerial perspectives and understand their local, national, and global dimensions. |
To be aware that information systems is a multidisciplinary field and can establish its relationship with other disciplines. |
To be able to think analytically, use the knowledge and skills gained in the face of real life problems and produce solutions. |
Can make technical and managerial contributions to informatics projects and take responsibility. |
Follows the rapid change in the field of information technology and systems and constantly renews itself. |
Can generate ideas for interdisciplinary studies and put these ideas into practice. |
Knows programming logic and can use an up-to-date programming language. |
To be able to analyze the needs for an information system and to master the processes in the analysis, design, and implementation stages of the database of the system. |
Master the managerial/functional applications of enterprise information systems. |
Can produce innovative and creative ideas and put these ideas into practice. |
WEEKLY COURSE CONTENTS AND STUDY MATERIALS FOR PRELIMINARY & FURTHER STUDY |
|||
---|---|---|---|
Week | Preparatory | Topics(Subjects) | Method |
1 | Review of relevant sections of lecture notes | Introduction to Cyber Law and Cyber Crimes (Basic Concepts, Definitions) | 1: Lecture, 2: Question-Answer, 3: Discussion |
2 | Review of relevant sections of lecture notes | Cyber Crimes and Example Cases | 1: Lecture, 2: Question-Answer, 3: Discussion |
3 | Review of relevant sections of lecture notes | Cyber Crimes and Their Types in Turkey and the World | 1: Lecture, 2: Question-Answer, 3: Discussion |
4 | Review of relevant sections of lecture notes | Entering the Information System | 1: Lecture, 2: Question-Answer, 3: Discussion |
5 | Review of relevant sections of lecture notes | Blocking, Disrupting, Destroying, or Changing the Information System | 1: Lecture, 2: Question-Answer, 3: Discussion |
6 | Review of relevant sections of lecture notes | Abuse of Debit and Credit Cards; Online Fraud | 1: Lecture, 2: Question-Answer, 3: Discussion |
7 | Review of relevant sections of lecture notes | Search, Copy, and Seizure of Computers, Computer Programs, and Files | 1: Lecture, 2: Question-Answer, 3: Discussion |
8 | - | MID-TERM EXAM | - |
9 | Review of relevant sections of lecture notes | European Convention on Cybercrime, Council of Europe Digital Evidence Guide and International Legislation | 1: Lecture, 2: Question-Answer, 3: Discussion |
10 | Review of relevant sections of lecture notes | Law No. 5561 and Internet Access Blockages, Responsibilities of Internet Service Providers | 1: Lecture, 2: Question-Answer, 3: Discussion |
11 | Review of relevant sections of lecture notes | Personal Data Protection Law (Concept of Data and Protection of Personal Data) | 1: Lecture, 2: Question-Answer, 3: Discussion |
12 | Review of relevant sections of lecture notes | Electronic Commerce | 1: Lecture, 2: Question-Answer, 3: Discussion |
13 | Review of relevant sections of lecture notes | Fundamentals of Computer Forensics, Environments where evidence can be found, Computer Forensics Tools | 1: Lecture, 2: Question-Answer, 3: Discussion |
14 | Review of relevant sections of lecture notes | Intervention in Cyber Crimes, and Crime Scene Investigation Expert Witness Legislation B | 1: Lecture, 2: Question-Answer, 3: Discussion |
15 | Review of relevant sections of lecture notes | Preparation of Expert Report, Examination of Case Studies | 1: Lecture, 2: Question-Answer, 3: Discussion |
16 | - | FINAL EXAM | - |
17 | - | FINAL EXAM | - |
SOURCE MATERIALS & RECOMMENDED READING |
---|
M. Ketizmen, Türk Ceza Hukukunda Bilişim Suçları, Ankara 2008. |
Değirmenci,O. (2014), Ceza Muhakemesinde Sayısal (Dijital) Delil, Seçkin Yayıncılık, Ankara |
Dülger,M.V. (2018), Bilişim, Kişisel Verilerin Korunması ve İnternet Bilişim Mevzuatı, Seçkin Yayıncılık, Ankara |
ASSESSMENT |
|||
---|---|---|---|
Assessment & Grading of In-Term Activities | Number of Activities | Degree of Contribution (%) | Description |
Level of Contribution | |||||
---|---|---|---|---|---|
0 | 1 | 2 | 3 | 4 | 5 |
KNOWLEDGE |
|||||||
---|---|---|---|---|---|---|---|
Theoretical |
|||||||
Programme Learning Outcomes | Level of Contribution | ||||||
0 | 1 | 2 | 3 | 4 | 5 | ||
1 |
Explains the fundamental engineering concepts of computer science and relates them to the groundwork of computer science.
|
5 |
KNOWLEDGE |
|||||||
---|---|---|---|---|---|---|---|
Factual |
|||||||
Programme Learning Outcomes | Level of Contribution | ||||||
0 | 1 | 2 | 3 | 4 | 5 | ||
1 |
Uses theoretical and practical knowledge coming from mathematics, probability, statistics and various other branches of life sciences, to find solutions to engineering problems.
|
1 |
SKILLS |
|||||||
---|---|---|---|---|---|---|---|
Cognitive |
|||||||
Programme Learning Outcomes | Level of Contribution | ||||||
0 | 1 | 2 | 3 | 4 | 5 | ||
1 |
Determines the components and the underlying process of a system and designs an appropriate computational model under reasonable constraints.
|
5 | |||||
2 |
Designs a computer-aided conceptual model with modern techniques.
|
3 |
SKILLS |
|||||||
---|---|---|---|---|---|---|---|
Practical |
|||||||
Programme Learning Outcomes | Level of Contribution | ||||||
0 | 1 | 2 | 3 | 4 | 5 | ||
1 |
Determines, detects and analyzes the areas of computer science applications and develops appropriate solutions.
|
5 | |||||
2 |
Identifies, models and solves computer engineering problems by applying appropriate analytical methods.
|
4 | |||||
3 |
Determines and uses the necessary information technologies in an efficient way for engineering applications.
|
4 |
OCCUPATIONAL |
|||||||
---|---|---|---|---|---|---|---|
Autonomy & Responsibility |
|||||||
Programme Learning Outcomes | Level of Contribution | ||||||
0 | 1 | 2 | 3 | 4 | 5 | ||
1 |
Possess the responsibility and ability to design and conduct experiments for engineering problems by collecting, analyzing and interpreting data.
|
5 | |||||
2 |
Possess the ability to conduct effective individual study.
|
5 | |||||
3 |
Takes responsibility as a team work and contributes in an effective way.
|
4 |
OCCUPATIONAL |
|||||||
---|---|---|---|---|---|---|---|
Learning to Learn |
|||||||
Programme Learning Outcomes | Level of Contribution | ||||||
0 | 1 | 2 | 3 | 4 | 5 | ||
1 |
Monitors the developments in the field of information technologies by means of internet and related journals and possess the required knowledge for the management, control, development and security of information technologies.
|
5 | |||||
2 |
Develops positive attitude towards lifelong learning.
|
4 |
OCCUPATIONAL |
|||||||
---|---|---|---|---|---|---|---|
Communication & Social |
|||||||
Programme Learning Outcomes | Level of Contribution | ||||||
0 | 1 | 2 | 3 | 4 | 5 | ||
1 |
Communicates effectively by oral and/or written form and uses at least one foreign language.
|
4 | |||||
2 |
Possess sufficient consciousness about the issues of project management, practical applications and also environmental protection, worker's health and security.
|
5 |
OCCUPATIONAL |
|||||||
---|---|---|---|---|---|---|---|
Occupational and/or Vocational |
|||||||
Programme Learning Outcomes | Level of Contribution | ||||||
0 | 1 | 2 | 3 | 4 | 5 | ||
1 |
Possess professional and ethical responsibility and willingness to share it.
|
5 | |||||
2 |
Possess sufficient consciousness about the universality of engineering solutions and applications and be well aware of the importance of innovation.
|
5 |
WORKLOAD & ECTS CREDITS OF THE COURSE UNIT |
|||
---|---|---|---|
Workload for Learning & Teaching Activities |
|||
Type of the Learning Activites | Learning Activities (# of week) | Duration (hours, h) | Workload (h) |
Lecture & In-Class Activities | 14 | 2 | 28 |
Preliminary & Further Study | 0 | 0 | 0 |
Land Surveying | 0 | 0 | 0 |
Group Work | 0 | 0 | 0 |
Laboratory | 0 | 0 | 0 |
Reading | 0 | 0 | 0 |
Assignment (Homework) | 2 | 10 | 20 |
Project Work | 0 | 0 | 0 |
Seminar | 0 | 0 | 0 |
Internship | 0 | 0 | 0 |
Technical Visit | 0 | 0 | 0 |
Web Based Learning | 0 | 0 | 0 |
Implementation/Application/Practice | 0 | 0 | 0 |
Practice at a workplace | 0 | 0 | 0 |
Occupational Activity | 0 | 0 | 0 |
Social Activity | 0 | 0 | 0 |
Thesis Work | 0 | 0 | 0 |
Field Study | 0 | 0 | 0 |
Report Writing | 0 | 0 | 0 |
Final Exam | 1 | 1 | 1 |
Preparation for the Final Exam | 1 | 2 | 2 |
Mid-Term Exam | 1 | 1 | 1 |
Preparation for the Mid-Term Exam | 1 | 1 | 1 |
Short Exam | 2 | 1 | 2 |
Preparation for the Short Exam | 2 | 1 | 2 |
TOTAL | 24 | 0 | 57 |
Total Workload of the Course Unit | 57 | ||
Workload (h) / 25.5 | 2,2 | ||
ECTS Credits allocated for the Course Unit | 2,0 |