HOME INSTITUTIONAL INFORMATIONINFORMATION ON DEGREE PROGRAMMES Information Security TechnologyCERTIFICATE PROGRAMMESUSEFUL INFORMATION, RESOURCES & SERVICES FOR STUDENTSUSEFUL LINKS AND DOCUMENTSADITIONAL & SUPPORTING INFORMATION

SECTION I: GENERAL INFORMATION ABOUT THE COURSE

Course Code Course Name Year Semester Theoretical Practical Credit ECTS
50421TATOZ-BIH3031 IT Law 1 Fall 2 0 2 4
Course Type : Compulsory
Cycle: Associate      TQF-HE:5. Master`s Degree      QF-EHEA:Short Cycle      EQF-LLL:5. Master`s Degree
Language of Instruction: Turkish
Prerequisities and Co-requisities: N/A
Mode of Delivery: Face to face
Name of Coordinator: Instructor NİGAR BABAYEVA
Dersin Öğretim Eleman(lar)ı:





Dersin Kategorisi: Field Specific

SECTION II: INTRODUCTION TO THE COURSE

Course Objectives & Content

Course Objectives: At the end of this course, students;
1. Explain the historical development of informatics crimes.
2. Can recognize today's cyber threats.
3. Explain national crime crimes.
4. Knows how to protect personal data.
5. will be able to explain informatics crimes in Turkish Law.
6. Knows the precautions to be taken regarding information crimes.
Course Content: Informatics law is a name given to all legal norms formed by the legislation (international treaties, laws, regulations, etc.) in which economic sanctions are provided for the legal framework and results of communication, information and document sharing, and sanctions for unlawful acts occurring in this environment. The legislation on internet and electronic media and information and communication technologies are the main axis of this field of law.

Course Specific Rules

1. Attendance is 70% compulsory.
2. If you are absent from a course, please inform the instructor by e-mail or other means of communication beforehand.
3. For the courses you have not come to, you can contact the instructor and ask what is being done in that course. It is your responsibility to do the homework and tasks that are not done for that course on time and keep up with the content being processed.

Course Learning Outcomes (CLOs)

Course Learning Outcomes (CLOs) are those describing the knowledge, skills and competencies that students are expected to achieve upon successful completion of the course. In this context, Course Learning Outcomes defined for this course unit are as follows:
Knowledge (Described as Theoritical and/or Factual Knowledge.)
  1) Associate the General Provisions and the general principles of IT Law with legal disputes / problems in other branches of law
  2) Know the rules to be followed in the field of IT law and the application of IT law
  3) Can correctly determine which rules will be applied in the subjects of IT law rules.
Skills (Describe as Cognitive and/or Practical Skills.)
  1) Information about the general content of IT law
Competences (Described as "Ability of the learner to apply knowledge and skills autonomously with responsibility", "Learning to learn"," Communication and social" and "Field specific" competences.)

Weekly Course Schedule

Week Subject
Materials Sharing *
Related Preparation Further Study
1) Introduction to the course and information about the course Explaining the course plan and grading Determination of groups (Orientation) Turan, M. (2019). Bilişim Hukuku. Seçkin Yayıncılık 3. Baskı.
2) Informatics and Historical Development of Informatics Crimes Turan, M. (2019). IT law. Seçkin Publishing 3rd Edition. Course notes
3) Types of Informatics Crimes Turan, M. (2019). Bilişim Hukuku. Seçkin Yayıncılık 3. Baskı. Ders Notları
4) Location Areas Competent and Responsible Internet Management Agency in Turkey Turan, M. (2019). Bilişim Hukuku. Seçkin Yayıncılık 3. Baskı. Ders notları
5) Today's Cyber Threats: “Virus“, “Worm” software and “Hoax” messages Turan, M. (2019). Bilişim Hukuku. Seçkin Yayıncılık 3. Baskı. Ders notları
6) National and International Informatics Crimes Turan, M. (2019). Bilişim Hukuku. Seçkin Yayıncılık 3. Baskı. Ders notları
7) Informatics Crimes in Turkish Law: Informatics, Human Rights and Protection of Personal Data Turan, M. (2019). Bilişim Hukuku. Seçkin Yayıncılık 3. Baskı. Ders notları
8) MIDTERM EXAM WEEK Turan, M. (2019). Bilişim Hukuku. Seçkin Yayıncılık 3. Baskı. Ders notları
9) IT Crimes in Turkish Law: Crimes on Intellectual Property Turan, M. (2019). Bilişim Hukuku. Seçkin Yayıncılık 3. Baskı. Ders notları
10) Informatics Crimes in Turkish Law: Electronic Signature Law, Consumer Protection Law Turan, M. (2019). Bilişim Hukuku. Seçkin Yayıncılık 3. Baskı. Ders notları
11) Digital Evidence Turan, M. (2019). Bilişim Hukuku. Seçkin Yayıncılık 3. Baskı. Ders notları
12) Measures to be taken in the fight against IT crimes Turan, M. (2019). Bilişim Hukuku. Seçkin Yayıncılık 3. Baskı. Ders notları
13) The Latest in Informatics Law Improvements Turan, M. (2019). Bilişim Hukuku. Seçkin Yayıncılık 3. Baskı. Ders notları
14) Crimes of Informatics in the Light of Supreme Court Decisions Turan, M. (2019). Bilişim Hukuku. Seçkin Yayıncılık 3. Baskı. Ders notları
15) Project presentation (Case Analysis) Turan, M. (2019). Bilişim Hukuku. Seçkin Yayıncılık 3. Baskı. Ders notları
16) Final exam
*These fields provides students with course materials for their pre- and further study before and after the course delivered.

Recommended or Required Reading & Other Learning Resources/Tools

Course Notes / Textbooks: Ders Notları
References: Turan, M. (2019). Bilişim Hukuku. Seçkin Yayıncılık 3. Baskı.
Dülger, M. V. ve Tevetoğlu, M. (2014). Bilişim Hukuku Mevzuatı. Adalet Yayınevi
Gül, A. (2018). Bilişim Suçları. Seçkin Yayıncılık 2. Baskı.
Bük, A. (2018). Bilişim Alanında Kişisel Verilerin Korunması. Seçkin Yayıncılık 1. Baskı.
Doğu, A. H. (2017). Bilişim Hukuku. Ekin Basım Yayın.

Level of Contribution of the Course to PLOs

No Effect 1 Lowest 2 Low 3 Average 4 High 5 Highest
           
Programme Learning Outcomes Contribution Level (from 1 to 5)
1) Defines the corporate cyber security rules and guidelines. 5
1) Acquires competency of analyzing and solving the problems. 1
1) Experiences all processes in business life. 1
1) Explains the basic, theoretical and practical information in the field of information security technology.
1) Follow the patches of information technology systems published against known cyber security gaps. 1
1) Lists the tasks and responsibilities required to identify and prevent any exploitation of hardware. 2
2) Know and analyze cyber assets in terms of information security.
2) Lists the tasks and responsibilities required to identify and prevent any abuse that may occur in software components. 1
2) Explains the importance of authorizing users as much as they can. 2
2) Has awareness for ethical and social responsibility. 1
2) Information Security Creates procedure and control components 2
2) Takes part in activities related to the field of education in a business operating in the field. 1
3) Explains the necessary policies and processes for effective event management. 4
3) Questions the application with theoretical knowledge. 1
3) Takes responsibility as a team member in works and operations of his/her field. 1
3) Lists the tasks and responsibilities required to identify and prevent any abuse that may occur in local area networks. 1
3) Identify non-technological tools and methods against cyber attack. 3
3) Experience the cyber security risk management system.
4) Applies the theoretical knowledge learned in business life for a semester.
4) Identifies the methods and methods of technological methods against cyber attack. 1
4) Compiles the knowledge and experience gained in the field. 1
4) Is aware of written, verbal communication and interaction. 1
4) Explains the importance of monitoring the cyber systems for the correct structuring of the powers, the realization of the realized, failed or failed cyber attacks, the timely response to the protection and the fulfillment of the legal requirements. 5
5) Follows the developments of advanced technology and digital transformation. 1
5) User training and security awareness describes the importance of cyberspace. 5
5) Acquires the competencies defined as the institutional outcomes of Beykoz University on the basic level, inline with the expectations of business world and the society.
6) Acquires the awareness for lifelong learning. 1
6) Recall national and international legislation and regulations related to the field of Information Security Technology. 5
7) Defines the fundamentals of programming and algorithm information. 1
7) Has awareness about citizenship competency. 1
8) Evaluates the developments of his/her field with the understanding of an entrepreneur. 1
9) Acquires communication in a Foreign Language (English) competence defined on the level of at least A2 in European Language Portfolio. (In programs whose medium of instruction is English, on the level of B1). 1

SECTION IV: TEACHING-LEARNING & ASSESMENT-EVALUATION METHODS OF THE COURSE

Teaching & Learning Methods of the Course

(All teaching and learning methods used at the university are managed systematically. Upon proposals of the programme units, they are assessed by the relevant academic boards and, if found appropriate, they are included among the university list. Programmes, then, choose the appropriate methods in line with their programme design from this list. Likewise, appropriate methods to be used for the course units can be chosen among those defined for the programme.)
Teaching and Learning Methods defined at the Programme Level
Teaching and Learning Methods Defined for the Course
Lectures
Discussion
Problem Solving

Assessment & Evaluation Methods of the Course

(All assessment and evaluation methods used at the university are managed systematically. Upon proposals of the programme units, they are assessed by the relevant academic boards and, if found appropriate, they are included among the university list. Programmes, then, choose the appropriate methods in line with their programme design from this list. Likewise, appropriate methods to be used for the course units can be chosen among those defined for the programme.)
Aassessment and evaluation Methods defined at the Programme Level
Assessment and Evaluation Methods defined for the Course
Midterm
Presentation
Final Exam
Quiz
Homework Evaluation

Contribution of Assesment & Evalution Activities to Final Grade of the Course

Measurement and Evaluation Methods # of practice per semester Level of Contribution
Quizzes 1 % 10.00
Homework Assignments 1 % 10.00
Midterms 1 % 30.00
Semester Final Exam 1 % 50.00
Total % 100
PERCENTAGE OF SEMESTER WORK % 50
PERCENTAGE OF FINAL WORK % 50
Total % 100

SECTION V: WORKLOAD & ECTS CREDITS ALLOCATED FOR THE COURSE

WORKLOAD OF TEACHING & LEARNING ACTIVITIES
Teaching & Learning Activities # of Activities per semester Duration (hour) Total Workload
Course 14 2 28
Laboratory 0 0 0
Application 0 0 0
Special Course Internship (Work Placement) 0 0 0
Field Work 0 0 0
Study Hours Out of Class 0 0 0
Presentations / Seminar 0 0 0
Project 0 0 0
Homework Assignments 1 5 5
Total Workload of Teaching & Learning Activities - - 33
WORKLOAD OF ASSESMENT & EVALUATION ACTIVITIES
Assesment & Evaluation Activities # of Activities per semester Duration (hour) Total Workload
Quizzes 2 5 10
Midterms 1 5 5
Semester Final Exam 1 10 10
Total Workload of Assesment & Evaluation Activities - - 25
TOTAL WORKLOAD (Teaching & Learning + Assesment & Evaluation Activities) 58
ECTS CREDITS OF THE COURSE (Total Workload/25.5 h) 4